Identity Manager Administrator

Giovanni Gonzalez Moreno
Quiz by , created over 2 years ago

IDM Quiz on Identity Manager Administrator, created by Giovanni Gonzalez Moreno on 03/16/2017.

11
0
0
Tags
Giovanni Gonzalez Moreno
Created by Giovanni Gonzalez Moreno over 2 years ago
PMP Prep quiz
Andrea Leyden
AS Biology- OCR- Module 1 Cells Specification Analysis and Notes
Laura Perry
IGCSE Physics formulas
Imani :D
An Inspector Calls - Quotes
jaynejuby
1PR101 2.test - Část 13.
Nikola Truong
Characters in "King Lear"
eleanor.gregory
Mapa Mental - Como Criar um Mapa Mental
miminoma
THE CASES - GERMAN
Holly Miles
BIOLOGY B1 4
x_clairey_x
GCSE Revision: Christianity
Andrea Leyden

Question 1

Question
When data changes in the Identity Vault or a connected application, which processes the changes?
Answer
  • Drivers
  • Remote Loader
  • Identity Vault
  • Metadirectory Engine
  • Connected application

Question 2

Question
Which statement is true?
Answer
  • When an event occurs in the Identity Vault, Identity Manager creates an XML document that describes the Identity Vault event and submits it through the Publisher channel to a driver shim.
  • When an event occurs in the Identity Vault, Identity Manager creates an XML document that describes the Identity Vault event and submits it through the Subscriber channel to a driver shim.
  • When an event occurs in a connected system, Identity Manager creates an XML document that describes the Identity Vault event and submits it through the Subscriber channel to a driver shim.
  • When an event occurs in the Identity Vault, a driver shim creates an XML document that describes the Identity Vault event and submits it through the Subscriber channel to Identity Manager.
  • When an event occurs in a connected system, a Driver Shim creates an XML document that describes the Identity Vault event and submits it through the Subscriber channel to Identity Manager.

Question 3

Question
Which statements are true? (Choose 2.)
Answer
  • When an event is being sent to a driver, it is a notification.
  • When an event is being sent to a driver, it is a command.
  • When an event is being sent to Identity Manager, it is a command.
  • When an event is being sent to Identity Manager, it is a notification.
  • Events and commands are handled the same way within an IDM 4 environment.

Question 4

Question
What does a Driver object contain? (Choose 2.)
Answer
  • Packages
  • Driver Set
  • Policy Objects
  • Application driver shim
  • Subscriber and Publisher objects

Question 5

Question
Identity Manager uses a MetaDirectory Engine to process Identity Vault data and events. What component assures changes in the Identity Vault are not lost if a connected system goes offline?
Answer
  • Partition
  • Obit flag
  • Change Log
  • Event Cache

Question 6

Question
An Identity Manager Job can only interact with which driver channel?
Answer
  • Input
  • Sender
  • Output
  • Receiver
  • Publisher
  • Placement
  • Subscriber

Question 7

Question
Which installation mode is supported by the integrated installer?
Answer
  • Silent mode
  • Non-root mode
  • Console mode
  • AutoYaST mode
  • Standalone mode

Question 8

Question
Which statements about the Integrated Installer are true? (Choose 2.)
Answer
  • It automatically handles dependencies
  • It automatically installs all of the drivers
  • The iManager plug-in needs to be manually installed
  • It exists only for the Windows operating system family

Question 9

Question
Which task within Novell iManager allows administrators to view all objects that are associated with a particular Novell IDM driver?
Answer
  • Object Inspector
  • Driver Inspector
  • DriverSet Inspector
  • Driver Cache Inspector

Question 10

Question
What is the minimum RAM system requirement for Designer?
Answer
  • 128 MB
  • 256 MB
  • 512 MB
  • 1024 MB
  • 2048 MB

Question 11

Question
When using Designer, which modeling mode is used to do all low-level operations with driver sets, drivers, policies and applications?
Answer
  • Table Mode
  • System Mode
  • DataFlow Mode
  • Architect Mode
  • Developer Mode

Question 12

Question
Which view enables you to view the filters that allow the data to flow between all of the systems and the Identity Vaults as well as view how passwords flow through the different systems?
Answer
  • Project view
  • Outline view
  • Dataflow view
  • Navigator view
  • Policy Set view

Question 13

Question
When using Designer, a perspective is a collection of related views and editors. Which perspective should be open the first time you run the application?
Answer
  • Debug perspective
  • Designer perspective
  • Java/Java Browsing perspective
  • Java Type Hierarchy perspective
  • Plug-in Development perspective

Question 14

Question
Which view do you use to access Policy Simulator? (Choose 2.)
Answer
  • The Tasks view
  • The Outline view
  • The Project view
  • The Navigator view
  • The Policy Flow view

Question 15

Question
When you start Designer for the first time or start Designer without a project listed, which should you first do?
Answer
  • Make sure that the Debug perspective is selected.
  • Make sure that the Plug-in perspective is selected.
  • Make sure that the Designer perspective is selected.
  • Make sure that the Java/Java Browsing perspective is selected.
  • Make sure that the Java Type Hierarchy perspective is selected.

Question 16

Question
When using Designer, which view do you use to import driver sets, drivers, and channels from the file system?
Answer
  • The Tasks view
  • The Project view
  • The Outline view
  • The Navigator view
  • The Policy Flow view

Question 17

Question
When checking in a project to a Version Control Server, you will need to specify a file path to your Subversion server or a URL to the Subversion server. If you specify a URL, which protocols are supported? (Choose 4.)
Answer
  • FTP
  • NFS
  • SVN
  • HTTP
  • SFTP
  • HTTPS
  • SVN + SSH

Question 18

Question
When is the package catalog created?
Answer
  • When a package is installed
  • When a driver object is created
  • When a Driver Set object is created
  • When a project is created or imported

Question 19

Question
Which statement is true regarding packages?
Answer
  • You can downgrade any package that has been upgraded.
  • You can delete packages from the package catalog at anytime.
  • You can only upgrade packages that have been added to drivers.
  • Before you can import packages into the package catalog, you must install them.

Question 20

Question
When you install Active Directory drivers, you must choose an authentication method. Authentication identifies the driver shim to Active Directory and, potentially, to the local machine. Which statements are true regarding the Negotiate authentication method? (Choose 2.)
Answer
  • This is the preferred authentication method.
  • This can be installed on a server that is not a member of the domain.
  • This uses Kerberos, NTLM, or a pluggable authentication scheme if one is installed.
  • This is used when the server hosting the driver shim is not a member of the domain.
  • When using this, some provisioning services, such as Exchange mailbox provisioning and password synchronization, are unavailable

Question 21

Question
If you map the eDirectory attribute of Login Expiration Time to the Active Directory attribute of accountExpires, when does the account in Active Directory expire?
Answer
  • A day later than the time set in eDirectory
  • A day earlier than the time set in eDirectory
  • An hour later than the time set in eDirectory
  • At the same time as the time set in eDirectory
  • An hour earlier than the time set in eDirectory

Question 22

Question
Which method can be used to start the process of installing Active Directory driver packages?
Answer
  • In the Modeler, right-click the driver set where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
  • In the Modeler, right-click the Identity Vault where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
  • In the Modeler, right-click the server where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
  • In the Modeler, right-click the application where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.
  • In the Modeler, right-click the package catalog where you want to create the driver; then select New > Driver to display the Driver Configuration Wizard.

Question 23

Question
When installing Active Directory driver packages, you can also install optional features for the Active Directory driver. Which feature should you select if you are using the Identity Reporting Module?
Answer
  • Data Collection
  • Account Tracking
  • Default Configuration
  • Password Synchronization
  • Entitlements and Exchange Mailbox Support

Question 24

Question
In which order should you create and start an Active Directory driver?
Answer
  • Import the current driver packages 2) Install the driver packages 3) Deploy the driver 4) Configure the driver 5) Start the driver
  • 1) Install the driver packages 2) Import the current driver packages 3) Deploy the driver 4) Configure the driver 5) Start the driver
  • 1) Install the driver packages 2) Import the current driver packages 3) Deploy the driver 4) Start the driver 5) Configure the driver
  • 1) Import the current driver packages 2) Install the driver packages 3) Configure the driver 4) Deploy the driver 5) Start the driver
  • 1) Import the current driver packages 2) Install the driver packages 3) Deploy the driver 4) Start the driver 5) Configure the driver

Question 25

Question
When installing the Active Directory Driver, which options are available when you are selecting the desired form for the placement of new objects? (Choose 2.)
Answer
  • Flat
  • Level
  • Parallel
  • Mirrored
  • Structured
  • Bi-directional
  • Single Organizational Unit

Question 26

Question
In an Active Directory environment, which tools enable you to view and manage the associations between drivers and objects? (Choose 2.)
Answer
  • Designer
  • Driver Inspector
  • Object Inspector
  • Policy Simulator
  • Active Directory Discovery tool

Question 27

Question
Which allows you to securely store multiple passwords for a driver?
Answer
  • Named Passwords
  • Universal Password
  • Password Policy object
  • Event Auditing Service
  • Password Synchronization

Question 28

Question
To which can you add Named Passwords? (Choose 2.)
Answer
  • Server
  • Drivers
  • Driver Sets
  • Applications
  • Identity Vaults

Question 29

Question
You have noticed that a server is not listed in the Servers tab on the driver or driver set. Which may resolve this issue?
Answer
  • Revert back to an older driver.
  • Revert back to an older driver set.
  • Delete the problem driver and reinstall it.
  • Delete the related driver set and then reinstall it.
  • Disassociate the driver set object and the server and then re-associate them.

Question 30

Question
Which statements are true regarding Global Configuration Values (GCVs)? (Choose 2.)
Answer
  • GCVs are variables.
  • GCVs are constant values.
  • GCVs can be changed at runtime.
  • GCVs are accessible to the tree and network.
  • GCVs are globally accessible to the driver and driver set.

Question 31

Question
Which correctly shows the precedence of Global Configuration Values (GCVs)?
Answer
  • 1) GCVs from the driver set Global Configuration list 2) GCVs from the driver Global Configuration list 3) GCVs from the driver 4) GCVs from the driver set
  • 1) GCVs from the driver set Global Configuration list 2) GCVs from the driver Global Configuration list 3) GCVs from the driver set 4) GCVs from the driver
  • 1) GCVs from the driver 2) GCVs from the driver set 3) GCVs from the driver Global Configuration list 4)GCVs from the driver set Global Configuration list
  • 1) GCVs from the driver 2)GCVs from the driver Global Configuration list 3) GCVs from the driver set 4)GCVs from the driver set Global Configuration list

Question 32

Question
Which drivers have Remote Loader capability? (Choose 3.)
Answer
  • JDBC
  • LDAP
  • eDirectory
  • Active Directory
  • Entitlement Services

Question 33

Question
Which pre-defined jobs operate at the driver set level? (Choose 2.)
Answer
  • Driver Health
  • Schedule Driver
  • Subscriber Channel Trigger
  • Random Password Generator
  • Password Expiration Notification

Question 34

Question
What type of Identity Manager Event does a Subscriber Trigger Event Job create?
Answer
  • sync
  • query
  • modify
  • status
  • trigger
  • triggerless

Question 35

Question
Using iManager, what do you need to select to allow you to see the Filter icons so that you can edit filters?
Answer
  • The Driver
  • The Driver Set
  • The Application
  • The Identity Vault

Question 36

Question
Which statements about filters are true? (Choose 2.)
Answer
  • You cannot export a filter from a driver.
  • You can configure a filter policy for a driver set.
  • You can add a class or attribute to a filter policy.
  • There are separate filter policies for the Publisher and the Subscriber channels.
  • The same filter policy is used for both the Publisher and the Subscriber channels.

Question 37

Question
Which policy primarily handles the conversion of data formats from data that the Metadirectory engine provides to data that the application shim expects?
Answer
  • Creation policy
  • Matching policy
  • Placement policy
  • Input Transformation policy
  • Event Transformation policy
  • Output Transformation policy

Question 38

Question
When an XML document has an input tag type, which are supported inputs? (Choose 4.)
Answer
  • <add>
  • <copy>
  • <find>
  • <delete>
  • <format>
  • <modify>
  • <rename>

Question 39

Question
What is wrong with this add event? <nds> <input> <add class-name="" event-id="idv-jdbc-staff#Publisher#696" qualified-src-dn="O=vault\OU=employees\CN=overtestra" src-dn="\IDVVAULT\vault\employees\overtestra" src-entry-id="136443"> <association state="pending"></association> <add-attr attr-name="CN"> <value naming="true" timestamp="1206986293#34" type="string">overtestra</value> </add-attr> </add> </input> </nds>
Answer
  • The Class name is missing.
  • The timestamp is incorrect
  • The association state is pending.
  • The src-dn is improperly formatted.

Question 40

Question
Which Policy Sets are applied only during an add event?
Answer
  • Matching, Create, and Placement
  • Input Transformation, Matching, and Create
  • Matching, Create, and Schema Transformation
  • Input Transformation, Schema Transformation, and Command Transformation

Question 41

Question
When creating an argument within a rule, which is an example of a noun token?
Answer
  • Map
  • Join
  • Class Name
  • Lowercase
  • Escape Source DN

Question 42

Question
Which types of tokens are in the Argument Builder? (Choose 2.)
Answer
  • Verb
  • Noun
  • Action
  • Change
  • Attribute
  • Placement
  • Replacement

Question 43

Question
What are benefits of using Policy Builder? (Choose 2.)
Answer
  • It is built on open standards.
  • It enforces password complexity.
  • It is a GUI with command line capabilities.
  • It minimizes the need for XLST stylesheets.
  • It provides a graphical interface to help data cleansing.
  • It provides a graphical interface for rapid development of policies.

Question 44

Question
What is a purpose of the DAL (Directory Abstraction Layer)?
Answer
  • To process work flows
  • To grant/revoke entitlements
  • To store entities attribute data for use in work flows
  • To provide a customized view of objects and their attributes that are stored in the Identity Vault

Question 45

Question
Which options might you find in a Role Membership? (Choose 2.)
Answer
  • End Date
  • Start Date
  • Proxy User
  • Workflow Status
  • Separation of Duties

Question 46

Question
Which User Application configuration object contains Provisioning Request Definitions?
Answer
  • AppDefs
  • ServiceDefs
  • RequestDefs
  • ResourceDefs
  • WorkFlowDefs

Question 47

Question
Which aspects of the User Application can be controlled by customizing the themes in the User Application?
Answer
  • Modifying the HTML layouts for individual portlets.
  • Assigning different themes to different users upon login to the User Application.
  • Changing the colors and logos used by the User Application pages, headers, footers and tabs.
  • Restricting the pages and tabs that are available to a particular user upon login to the User Application.

Question 48

Question
Which allows you to delete, activate, inactivate and retire existing provisioning request definitions?
Answer
  • User Application Driver
  • User Application Portlets
  • Workflow Administration plug-in
  • Provisioning Request Configuration plug-in

Question 49

Question
The User Application Security Model uses domains to create sets of configurations and permissions that can be assigned to different user types. Under the Provisioning domain, which permission allows the user to retract selected provisioning requests when they are in progress?
Answer
  • Retract PRD
  • Initiate PRD
  • Configure Delegate
  • View Running PRD
  • Configure Availability

Question 50

Question
The Requests & Approvals tab in the Identity Manager user application includes a group of actions called My Settings. The My Settings actions give you the ability to view your proxy and delegate assignments. What is the difference between a proxy and a delegate?
Answer
  • A delegate assignment is independent of process requests.
  • A delegate assignment applies to a particular type of request.
  • A delegate assignment can only be given to a Team Manager.
  • A Provisioning Manager can only define delegate assignments
  • A delegate assignment can only be given to a Provisioning Manager.

Question 51

Question
The Roles hierarchy supports three levels. Which represents the highest role level?
Answer
  • Kaiser Role
  • Business Role
  • Resource Role
  • Technical Role
  • Workflow Role

Question 52

Question
Which System Role allows members to create, remove, or modify SoD constraints?
Answer
  • Role Auditor
  • Role Manager
  • Security Officer
  • Provisioning Administrator
  • User Application Administrator

Question 53

Question
Which statement is true regarding role relationships?
Answer
  • Roles cannot contain other roles.
  • Mid-level roles can contain lower-level and higher-level roles.
  • Bottom-level roles can be contained by higher-level roles and other bottom-level roles.
  • Top-level roles can contain lower-level roles, but they cannot be contained by other roles.

Question 54

Question
What role does NMAS play in synchronizing passwords in an Identity Manager solution?
Answer
  • NMAS controls the flow of synchronizing passwords within Identity Vault.
  • NMAS controls the flow of password synchronization in a connected system, based on NMAS driver settings.
  • NMAS prevents legacy utilities that are not Universal Password-enabled from updating an NDS password directly.
  • NMAS controls the flow of password synchronization, and prevents legacy utilities that are not Universal Password-enabled from updating a password directly.
  • NMAS controls the flow of password synchronization in a connected system, and prevents legacy utilities that are not Universal Password-enabled from updating an NDS password directly.

Question 55

Question
Only one policy is effective for a user at a time. Novell Modular Authentication Services (NMAS) determines which policy is effective for a user by looking for policies in the following order and applying the first one it finds. In which order does NMAS look for password policies?
Answer
  • 1) Partition root container 2) Container 3) Specific user assignment 4) Login Policy Object
  • 1) Specific user assignment 2) Login Policy Object 3) Partition root container 4) Container
  • 1) Login Policy Object 2) Specific user assignment 3) Container 4) Partition root container
  • 1) Specific user assignment 2) Container 3) Partition root container 4) Login Policy Object
  • 1) Login Policy Object 2) Partition root container 3) Container 4) Specific user assignment

Question 56

Question
Which are advantages of using NDS password to synchronize passwords between two Identity Vaults? (Choose 2.)
Answer
  • Simple configuration.
  • Universal and Distribution password updates
  • E-mail notifications for password synchronization failures
  • Enforcement of the basic password restrictions you can set for NDS Password
  • Password reset on the connected Identity Vault if the passwords don't comply with NMAS password policy

Question 57

Question
Which allows you to change Universal Password in eDirectory? (Choose 2.)
Answer
  • iFilter
  • Designer
  • iManager
  • NWAdmin
  • IDM User Application

Question 58

Question
Which Identity Manager reporting component retrieves the data needed for report generation from the Identity Information Warehouse?
Answer
  • Reporting Service
  • Report Packaging Tool
  • Data Collection Service
  • Identity Vault Data Sources
  • Data Collection Service Driver

Question 59

Question
Which report cannot be deleted and should not be run by itself?
Answer
  • Template
  • Identity Vault User Report
  • Identity Vault Driver Associations Report
  • Correlated Resource Assignment Events by User

Question 60

Question
What does the Calendar page of the Reporting Module show? (Choose 2.)
Answer
  • Report size
  • Report settings
  • Deleted reports
  • Finished reports
  • Reports that failed

Question 61

Question
Which statement is true regarding the token timeout strategy that is implemented by the Identity Reporting Module?
Answer
  • The token associated with each user login times out automatically after a specific period of idle time.
  • The token associated with each user login times out automatically after each event that affects the user object.
  • The token associated with each user login times out automatically after a specific period of time, after the user logs out.
  • The token associated with each user login times out automatically after a specific period of time, regardless of what the user does.

Question 62

Question
Which Identity Manager component allows your organization to assure that user access to resources does not break any corporate or government regulations?
Answer
  • Workflow
  • Attestation
  • Self Service
  • Data Synchronizing
  • Auditing and Reporting

Question 63

Question
When using Designer, what option allows you to manage and view the file resources that are in your workspace?
Answer
  • Outline View
  • Project View
  • Dataflow View
  • Properties View
  • Navigation View

Question 64

Question
When using Designer, what option allows you to modify projects or other items that are listed in the Navigator or Project view?
Answer
  • Views
  • Editors
  • Builders
  • Wizards

Question 65

Question
Which contains the components of Identity Manager drivers organized according to the functionality you want to provide to a driver?
Answer
  • Driver Set
  • Packages
  • Entitlements
  • User Application
  • Roles Based Provisioning Module

Question 66

Question
Which statement is true regarding creating packages?
Answer
  • Packages can be created using Designer or iManager.
  • Packages must be created before a Driver can function.
  • Packages can only be created for Drivers and Driver Sets.
  • Packages can only be created in environments that have IDM 3.0 or later.
  • Packages can only be created when the Identity Vault is in development mode.

Question 67

Question
You are trying to add content to a package. You have created content in an item. You right-click that item and select Add to Package; however, no packages are showing in the list. What is the cause of this problem?
Answer
  • You must build a package before you can add content to it.
  • You must version a package before you can add content to it.
  • You must create a package in Designer before you can add content to it.
  • You must import a package into Designer before you can add content to it.

Question 68

Question
Which packages can be published?
Answer
  • Packages that have been built
  • Packages that have been created
  • Packages that have been imported
  • Packages that have been localized

Question 69

Question
When installing the Active Directory Driver, which options can you choose when selecting the desired form for the placement of new objects? (Choose 2.)
Answer
  • Flat
  • Level
  • Parallel
  • Mirrored
  • Structured
  • Bi-directional
  • Single Organizational Unit

Question 70

Question
Which entitlement agent is ideal for simple automation?
Answer
  • Workflow
  • DIRXML-EntitlementRef
  • Role-Based Entitlement
  • Roles-Based Provisioning Module

Question 71

Question
Which statement about entitlements is true?
Answer
  • Entitlements are used as the association key for the user objects.
  • eDirectory schema is extended the first time Entitlements are invoked.
  • The DirXML-EntitlementRef attribute keeps track of the entitlements that a user has been granted or revoked.
  • Entitlements that grant or revoke Group Membership will always take precedence over policies that grant or revoke Group Memberships.

Question 72

Question
Which statement is true when creating your own Entitlements?
Answer
  • You create Entitlements using iMonitor.
  • You can only create Entitlements on the Publisher channel.
  • You must add the Entitlements to a driver set for them to work.
  • You must add a policy to the driver for the Entitlements to work.

Question 73

Question
Which domain defines rights to launch attestation requests and view the status of attestation requests?
Answer
  • Role Domain
  • Resource Domain
  • Compliance Domain
  • Provisioning Domain
  • Configuration Domain

Question 74

Question
For which domains is it not possible to create Domain Managers? (Choose 3.)
Answer
  • Role
  • Resource
  • Security
  • Compliance
  • Configuration

Question 75

Question
Which users have access to the team configuration page? (Choose 2.)
Answer
  • Role Manager
  • Team Manager
  • Security Administrator
  • Resource Manager
  • Provisioning Manager

Question 76

Question
Which of the following can create teams? (Choose 3.)
Answer
  • Team Manager
  • Role Administrator
  • Security Administrator
  • Provisioning Manager
  • Resource Administrator
  • Compliance Administrator

Question 77

Question
In the Navigation Access Permissions page, who has access to the administration tab? (Choose 2.)
Answer
  • Security Administrator
  • Resource Administrator
  • Compliance Administrator
  • Provisioning Administrator
  • Configuration Administrator

Question 78

Question
At runtime, which performs all of the User Application’s LDAP queries against the Identity Vault?
Answer
  • The publisher filter
  • The Role Catalogue
  • The Abstraction Layer Protocol
  • User Application Administration
  • The Directory Abstraction Layer

Question 79

Question
Which defines the Provisioning request categories the user application can display?
Answer
  • Driver Filter
  • Role Catalog
  • Package Catalog
  • Global Configuration Values
  • The Directory Abstraction Layer

Question 80

Question
In which of the following is the directory abstraction layer editor plug-in available?
Answer
  • iMonitor
  • Designer
  • iManager
  • Role Mapping Administrator
  • User Application Administrator

Question 81

Question
Which is used to define Directory Abstraction Layer definitions?
Answer
  • Filter Editor
  • Policy Editor
  • Integration Activity Editor
  • Directory Abstraction Layer Editor
  • Provisioning Request Definition Editor

Question 82

Question
Which do you use to create and deploy provisioning requests to the User Application driver?
Answer
  • Filter Editor
  • Policy Editor
  • User Application Editor
  • Directory Abstraction Layer Editor
  • Provisioning Request Definition Editor

Question 83

Question
Which are directory objects that encapsulate the business rules for granting or revoking a corporate resource or role, and binding the corporate resource or role to a workflow?
Answer
  • Role Mapping Definitions
  • Provisioning Request Definitions
  • Data Abstraction Layer Definitions
  • Global Configuration Values Definitions

Question 84

Question
When adding a control to a form that is being created, Designer adds a control-named Field to the bottom line of the form. Where is the name that is entered into this field used? (Choose 3.)
Answer
  • The ECMA expression builder dialog box
  • The Create Resource Wizard’s General tab
  • The Workflow tab’s Data Item Mapping dialog box
  • In the Role Mapping Administration Authorization panel
  • An internal XML reference in the provisioning request definition file

Question 85

Question
Which statements are true regarding workflows? (Choose 3.)
Answer
  • An activity represents a task.
  • A process consists of activities and flow paths.
  • A flow path ties activities in a workflow together.
  • An activity represents the work to be processed.
  • An activity can have only one incoming and one outgoing flow path.

Question 86

Question
Which rules need to be followed when adding activities to a workflow? (Choose 3.)
Answer
  • A workflow cannot contain a condition activity.
  • Each Approval activity must have a Condition activity.
  • Each Branch activity must have a corresponding Merge activity.
  • Each workflow must have at least one Entitlement or Entity activity.
  • Each workflow must have only one Start activity and only one Finish activity.

Question 87

Question
Which rules need to be followed when adding flow paths to a workflow? (Choose 3.)
Answer
  • There can be multiple flow paths out of the Start activity.
  • There can be only one flow path out of the Merge activity.
  • There can be only one flow path out of the Branch activity.
  • There can be only one flow path out of the Entitlement activity.
  • There can be between one and five flow paths out of the Approval activity.

Question 88

Question
The Integration activity automatically creates an action model for working with a Web service based on which document format?
Answer
  • CSV
  • TXT
  • XMI
  • XML
  • WSDL

Question 89

Question
In the Standard SoD Constraint Exception Approval Workflow Activity, which Activity Name determines whether the approval is a quorum condition?
Answer
  • Localize SoD Name
  • Approve SoD Conflict
  • Check for Processing Type
  • Approve SoD Conflict (Serial)
  • Approve SoD Conflict (Quorum)

Question 90

Question
Which statement is true regarding the Novell Identity Manager Role Mapping Administrator?
Answer
  • If you have both Role Manager and Resource Manager roles, you can create, edit, and delete mappings.
  • If you have both Role Manager and Resource Administrator roles, you can create, edit, and delete mappings.
  • If you have both Role Administrator and Resource Manager roles, you can create, edit, and delete mappings.
  • If you have both Role Administrator and Resource Administrator roles, you can create, edit, and delete mappings.

Question 91

Question
Within the Role Mapping Administrator, which displays the roles that you are authorized to manage?
Answer
  • Systems list
  • Mappings list
  • Authorization list
  • Identity Vault Roles list

Question 92

Question
Which application is used to map authorizations to Identity Vault Roles?
Answer
  • iFilter
  • iManager
  • Designer
  • User Applications
  • Role Mapping Administrator

Question 93

Question
Using regular expressions, which will the following expression match? (Choose 2.) of*
Answer
  • of
  • off
  • often
  • offset
  • offers

Question 94

Question
Using regular expressions, which matches ‘a’ or ‘b’?
Answer
  • “a\b”
  • “a.b”
  • “a*b”
  • “a|b”
  • “a:b”

Question 95

Question
Using regular expressions, which phone number should the following match? .*[89]00.*[0-9]{3}.*[0-9]{4}
Answer
  • 800-123-4567
  • 901-123-4567
  • 701-123-4567
  • 808-123-4567
  • 809-123-4567

Question 96

Question
What version of the W3C XPATH Recommendation does Identity Manager use?
Answer
  • 1.0
  • 1.1
  • 1.5
  • 2.0
  • 2.1
  • 3.5

Question 97

Question
Which XPATH operator is used to select all descendent nodes at any depth below the current stated node?
Answer
  • *
  • |
  • @
  • &
  • //

Question 98

Question
If there is a name conflict between different variable sources in an XPATH statement, what is the order of precedence?
Answer
  • Local (policy scope), Global, Local (driver scope)
  • Global, Local (driver scope), Local (policy scope)
  • Local (driver scope), Local (policy scope), Global
  • Global, Local (policy scope), Local (driver scope)
  • Local (policy scope), Local (driver scope), and global

Question 99

Question
Which are some best practices for using version control with Designer? (Choose 2.)
Answer
  • Use the Tortoise Subversion client.
  • Use the Subversion command line when possible.
  • Enable Subclipse before using version control with Designer.
  • Assign one person to deploy a project to a production environment.
  • Assign one team member to a policy rather than having multiple team members work on one policy.

Question 100

Question
The following options are found within the forms tab of the Provisioning Request Definition Editor: Form Selection Fields tab Actions tab Events tab Scripts tab Which option allows you to add, delete, and change the data type, control type, and layout order of the controls on the form?
Answer
  • Fields tab
  • Events tab
  • Scripts tab
  • Actions tab
  • Form Selection

Question 101

Question
Which default URL is used to access the iManager web application at 192.168.1.1?
Answer
  • http://192.168.1.1/
  • http://192.168.1.1/nps/iManager.html
  • https://192.168.1.1/nps/iManager.html
  • https://192.168.1.1:8443/iManager.html
  • https://192.168.1.1:8443/nps/iManager.html

Question 102

Question
Which statements are true regarding Designer? (Choose 2.)
Answer
  • Designer allows you to test policies off-line.
  • Designer allows you to perform any task on the live system.
  • Designer allows you to test and deploy solutions to production or test environments.
  • Designer does not allow existing solutions to be imported from the network into Designer.

Question 103

Question
When using Designer, what you can import at the Driver level?
Answer
  • Policies only
  • Channels and policies only
  • Driver sets and drivers only
  • A project from an Identity Vault
  • Driver sets, drivers, channels, and policies only

Question 104

Question
What is the naming convention for a Global Configuration Value (GCV)?
Answer
  • <name>.<group>.[<subgroup>.][<purpose/scope>]
  • <group>.[<subgroup>.][<purpose/scope>.]<name>
  • <group>.[<subgroup>.]<name>.[<purpose/scope>]
  • [<purpose/scope>.]<group>.[<subgroup>.]<name>
  • <name>.[<purpose/scope>.][<subgroup>.]<group>

Question 105

Question
You want to see password synchronization information when running a trace. What is the minimum trace level that will provide this information?
Answer
  • Level 0
  • Level 1
  • Level 2
  • Level 3
  • Level 4
  • Level 5

Question 106

Question
Which statements are true when using Global Configuration Values (GCVs)? (Choose 2.)
Answer
  • GCVs can only be set on the Driver Set.
  • If you set GCVs on the Driver Set object, those values cannot be inherited by a driver.
  • If you set GCVs on the Driver Set object, those values are inherited by a driver and replace any existing values.
  • If a driver has no settings of its own and inherits the GCVs from the driver set, iManager does not display them.
  • If you set GCVs on the Driver Set object, those values are inherited by a driver in that driver set if the driver does not have values of its own.

Question 107

Question
What eDirectory entities can Password Policies be assigned to? (Choose 3.)
Answer
  • Roles
  • Users
  • Groups
  • Partition Root Object
  • Login Policy Object

Question 108

Question
Which statements are true about Provisioning Request Definitions? (Choose 2.)
Answer
  • They are used to launch attestation workflows.
  • They are used to grant or revoke corporate roles.
  • They are used to provide policy rules.
  • They are used to filter requests at the driver level.
  • They are used to define Global Configuration Values.

Question 109

Question
Which is most commonly used to access ECMAScript?
Answer
  • iMonitor
  • iManager
  • Expression Builder
  • User Application Manager
  • Directory Abstraction Layer (DAL)

Question 110

Question
The Roles Based Provisioning Module includes a read-only Role Approval workflow. Which option does this Role Approval workflow support? (Choose 2.)
Answer
  • The ability to display the role using localized display names
  • The ability to process SoD conflicts in either serial or quorum mode
  • The ability to process role approvals in either serial or quorum mode
  • The retrieval of SoD approver DNs from the request object (nrfRequest)
  • E-mail notification to all approvers per SoD conflict found for SoD workflow approvals

Question 111

Question
When using the Role Mapping Administrator to create a new role, you will need to select a level for the role. Which level defines lower-level privileges?
Answer
  • IT Role
  • Mapping Role
  • Systems Role
  • Business Role
  • Permission Role

Question 112

Question
Given the XML Document below: <nds dtdversion="3.5" ndsversion="8.x"> <source> <product version="3.5.10.20070918 ">DirXML</product> <contact>Novell, Inc.</contact> </source> <input> <add class-name="User" qualified-src-dn="O=DA\OU=USERS\CN=E123456" src-dn="\DA- TREE\DA\USERS\E123456" src-entry-id="34042" from-merge="true"> <add-attr attr-name="Facsimile Telephone Number"> <value type="structured"> <component name="faxNumber">801-555-1212</component> <component name="faxBitCount">0</component> <component name="faxParameters"/> </value> </add-attr> <add-attr attr-name="Full Name"> <value type="string">Frank Jones</value> </add-attr> <add-attr attr-name="Given Name"> <value type="string">Frank</value> </add-attr> <add-attr attr-name="Internet EMail Address"> <value type="string">Frank.Jones@da.org</value> </add-attr> <add-attr attr-name="Surname"> <value type="string">Jones</value> </add-attr> </add> </input> </nds> Within the Policy Builder Rule Conditions, what value will the XPATH Statement "@from- merge='true'" return?
Answer
  • null
  • true
  • false
  • error
  • success

Question 113

Question
In which order does the metadirectory engine apply policies?
Answer
  • 1) Matching policy 2) Placement policy 3) Creation policy
  • 1) Matching policy 2) Creation policy 3) Placement policy
  • 1) Creation policy 2) Placement policy 3) Matching policy
  • 1) Creation policy 2) Matching policy 3) Placement policy
  • 1) Placement policy 2) Creation policy 3) Matching policy
  • 1) Placement policy 2) Matching policy 3) Creation policy

Question 114

Question
Which statement is true regarding the output that DSTrace generates?
Answer
  • Each policy can have only one rule.
  • Each rule is processed multiple times per event.
  • Rules will only be executed if their condition logic evaluates to be true.
  • IDM engine trace levels 0 through 3 show policies as they are being applied.

Question 115

Question
Which connected systems support bidirectional password synchronization? (Choose 3.)
Answer
  • PeopleSoft
  • Lotus Notes
  • JDBC databases
  • SAP
  • Novell eDirectory
  • Microsoft Active Directory
  • Network Information Services (NIS)

Question 116

Question
Which user type works with the User Application’s Identity Self-Service, Work Dashboard, and Roles and Resource tabs and has no administrative permissions?
Answer
  • Designers
  • Team Manager
  • Business Users
  • Domain Manager

Question 117

Question
Which statement is true regarding regular expressions?
Answer
  • Must be case sensitive
  • Can match entire string
  • Cannot use wildcard characters
  • Cannot be changed by escape characters