Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Novell 050-683 Exam - Cheat-Test.com

Free 050-683 Sample Questions:

1. Which eDirectory design guidelines are important for ZENworks to perform at its best? (Choose 2.)
A. Design the tree to maximize tree walking.
B. Create partitions according to geographic location.
C. Place application objects close to the users that access them.
D. Associate policy package objects at the OU level and higher in the eDirectory tree.
Answer: BC

2. Which eDirectory design guidelines for NetWare should you follow when implementing ZENworks for Desktops? (Choose 2.)
A. Tier design guidelines
B. Tree design guidelines
C. Policy design guidelines
D. Server design guidelines
E. Replica design guidelines
Answer: BE

3. What are the benefits of an efficient eDirectory design? (Choose 2.)
A. It minimizes tree walking.
B. It provides efficient user access through global groups.
C. It allows ZENworks for Desktops to access users in multiple domains.
D. It allows ZENworks for Desktops to quickly locate and access eDirectory objects.
Answer: AD

4. The ZENworks for Desktops 4 web services architecture eliminates the need for which component?
A. Firewall
B. Novell Client
C. ZENworks middle tier
D. ZENworks back-end server
Answer: B

5. What makes ZENworks for Desktops 4 firewall friendly? (Choose 2.)
A. It uses the NCP port.
B. It uses the SMB port.
C. It uses the HTTP port.
D. It uses the HTTPS port.
Answer: CD

6. The ZENworks for Desktops 4 web services architecture is comprised of the ZfD back-end server and which other components? (Choose 2.)
A. Middle tier
B. Novell Client
C. Workstation agents
D. VPN (Virtual Private Network)
Answer: AC

7. Which of the following are part of ZENworks for Desktops 4 (ZfD4) back-end services? (Choose 4.)
A. Imaging
B. IIS web server
C. Apache web server
D. Workstation inventory
E. Application management
F. Workstation management
Answer: ADEF

8. What must you do prior to installing ZENworks for Desktops 4 (ZfD4) back-end services? (Choose 3.)
A. Make sure you are authenticated as an Administrator.
B. Unload JAVA.NLM from the NetWare server where you are installing back-end services.
C. Verify that the Novell Client is installed on the workstation you use to install back-end services.
D. Verify that the ZfD middle tier is installed on the server where you are installing back-end services.
E. Verify that the eDirectory schema has previously been extended to accommodate the ZfD4 objects.
Answer: ABC

9. Which ZENworks for Desktops 4 (ZfD4) workstation agent distributes, installs, and uninstalls applications?
A. Workstation Imaging
B. Workstation Manager
C. Workstation Inventory
D. Remote Management
E. Novell application launcher (NAL)
Answer: E

10. You are installing ZENworks workstation agents and need functionality for distributing and managing applications to associated users. Which feature should you select during installation to obtain this functionality?
A. Workstation Imaging
B. Workstation Manager
C. Workstation Inventory
D. Remote Management
E. Application Management
Answer: E

11. When installing ZENworks for Desktops (ZfD4) workstation agents, which information must be configured if the Novell Client is not being used to access policies and applications? (Choose 2.)
A. The Workstation Manager agent
B. The Remote Management agent
C. The HTTP port number used by the ZfD4 middle tier
D. The DNS name or IP address of the ZfD4 back-end server
E. The DNS name or IP address of the ZfD4 middle tier server
Answer: CE

12. You need to use ConsoleOne to administer the ZENworks for Desktops (ZfD) server you just installed. ConsoleOne was installed on your workstation previously. What do you need to do to use ConsoleOne for the ZfD administration?
A. Copy the ZfD snap-in files to the ConsoleOne directory.
B. Run C1.EXE from the ZfD companion CD to install the ZfD snap-ins on the workstation.
C. Run C1UPDATE.EXE from the ZfD server to update the snap-ins on the workstation with those that are present on the server.
D. Remove the previous ConsoleOne installation from the workstation and run WINSETUP.EXE from the ZfD 4 CD to install ConsoleOne with the ZfD snap-ins.
Answer: C

13. Which file launches the ZENworks scheduler for policy management?
A. SCHED.EXE
B. PMSCH.EXE
C. ZENMAN.EXE
D. WMSCHED.EXE
E. SCHEDULR.EXE
Answer: D

14. Which statements are true regarding ZENworks for Desktops 4 (ZfD 4) policies? (Choose 2.)
A. Policies are stored on the workstations.
B. Policies are grouped according to functional area.
C. Policies allow you to assign file system rights to users.
D. ZfD 4 allows the same type of policy to perform various actions according to a specified schedule.
Answer: BD

15. By default, which policy package has highest precedence?
A. A policy package associated with a group object
B. A policy package associated with the root object
C. A policy package associated with an organization (O) object
D. A policy package associated with an organizational unit (OU) object
Answer: A

16. When configuring Windows Group policies, which workstation policy state uses the policy setting that it previously had?
A. Ignore
B. Accept
C. Default
D. Enabled
E. Disabled
Answer: A

17. Which ZENworks for Desktops 4 (ZfD4) policies are cumulative policies? (Choose 2.)
A. Windows Group policies
B. Dynamic Local User policies
C. Computer Extensible policies
D. Windows Desktop Preferences policies
Answer: AC

18. Which object do you use to enable and configure a search policy?
A. Group object
B. Search object
C. Container object
D. Server policy package
E. Container policy package
F. Workstation policy package
Answer: E

19. What is the benefit of implementing a search policy?
A. It allows you to search eDirectory for a specified user.
B. It limits how far up the tree ZENworks looks for effective policies.
C. It allows outdated workstations to be easily located and removed.
D. It allows you to monitor events from outside the organization's network.
Answer: B

20. You created a server policy package and associated it with a server object. Where are the policies applied?
A. To all ZENworks for Desktops back-end servers
B. To all objects in the tree that are valid types for the package
C. To all objects on the server that are valid types for the package
D. To all objects in the container that are valid types for the package
Answer: C

21. Which server package policy should you use to automatically place and name workstation objects in the eDirectory tree?
A. Rollup policy
B. Wake-on-LAN policy
C. Imaging server policy
D. Workstation import policy
Answer: D

22. Which object can a service location package be associated with?
A. User object
B. Root object
C. Group object
D. Server object
E. Container object
F. Workstation object
Answer: E

23. Which object can a service location package be associated with? (Choose 2.)
A. User object
B. Root object
C. Group object
D. Server object
E. Country object
F. Workstation object
G. Organizational unit object
Answer: EG

24. Using ConsoleOne, how do you enable policies in a service location package?
A. Add the policy you want to enable to the service location package schedule.
B. In the properties of the service location package, select Enabled next to the policy you want.
C. Right-click the service location package, select New > Policy, and choose the policy you want.
D. Click the policy package wizard tab, select Service Location Package, and select the policy you want.
Answer: B

25. Which service location package policy should you enable to report application events from any location?
A. XSLT policy
B. SMTP Host policy
C. XML Target policy
D. ZENworks Database policy
Answer: C

26. You have a critical application that is being deployed to workstations and you want to receive notification if any workstation fails to install the application. You also want a list of workstations that the application is delivered to. Which service location package policies should you configure to receive this information? (Choose 2.)
A. XSLT policy
B. SMTP host policy
C. SNMP trap targets policy
D. ZENworks database policy
Answer: CD

27. If the information a user prints is confidential and needs to be printed to her office no matter where she logs in, what type of iPrint policy should be used?
A. User
B. Secure
C. Container
D. Workstation
E. Service Location
Answer: A

28. Which policy can have multiple instances for the same user policy package?
A. Novell iPrint policy
B. Remote control policy
C. User extensible policy
D. Scheduled action policy
E. Dynamic local user policy
Answer: D

29. What can the user package Novell iPrint policy do? (Choose 3.)
A. Set a printer as a default printer
B. Install NIPP.EXE on the workstation
C. Configure a printer for a workstation
D. Install the iPrint client on a workstation
Answer: ACD

30. Which user policy package should you configure to restrict user desktop settings on Windows XP and 2000 workstations?
A. User extensible policy
B. Windows group policy
C. Scheduled action policy
D. Dynamic local user policy
E. Windows desktop preferences policy
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved