Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Novell 050-719 Exam - Cheat-Test.com

Free 050-719 Sample Questions:

Q: 1
You experienced a sudden power outage and your UPS unit failed. As a result, your Linux system went down without shutting down cleanly. Now your system won't boot. To fix the problem, what should you do to start fixing the problem?
A. Boot from your CD or DVD and select Memory Test
B. Boot from your CD or DVD and select Rescue System
C. Boot from your CD or DVD and select Installation - Safe Settings
D. Boot from your CD or DVD and select Installation - ACPI Disabled
E. Boot from your CD or DVD and select Installation - Local APIC Disabled
Answer: B

Q: 2
On a SLED 10 workstation, how many primary partitions are you limited to per hard disk?
A. Two
B. Three
C. Four
D. Five
E. Six
Answer: C

Q: 3
You are looking at the partition space of your partitions on your third SCSI hard disk on your SLED 10 workstation. Which device identifies the first partition on your third SCSI hard disk?
A. /dev/sdc1
B. /dev/sdc2
C. /dev/sdc3
D. /root/sdc1
E. /root/sdc2
F. /root/sdc3
Answer: A

Q: 4
When does a SLED session begin?
A. When a user logs in
B. When the computer reboots
C. Each time the screen unlocks
D. When a user switches desktops
E. Every time Session Manager performs a system action
Answer: A

Q: 5
If your Identity Vault doesn't contain the classes or attributes required by other applications, what can you do?
A. Disable the bidirectional framework.
B. Extend the eDirectory schema to include them.
C. Run Identity Manager and edit the metadirectory.
D. Run the applications and select the classes or attributes you want to share.
Answer: B

Q: 6
How should Identity Manager's seven services be installed and configured?
A. On a single computer
B. Only on the Novell Audit Server
C. With as many instances of the metadirectory engine as systems on a network
D. One or more services per computer, but not recommended to have all seven on a single computer in a production environment
Answer: D

Q: 7
You work in an organization that maintains many different levels of restricted information. When someone requests access to certain information, individuals with approval rights approve or deny the request. What Identity Manager component streamlines this process?
A. JBoss
B. Event Cache
C. Novell Audit Agent
D. Role-based entitlements
E. The Metadirectory engine
F. Workflow-based provisioning
Answer: F

Q: 8
You are the architect of an identity management solution for your company. What component of Identity Manager would you use to create a big picture view of the identity management solution?
A. Designer
B. Provisioning Module
C. Identity Manager Architect
D. Novell Identity Manager User Application
Answer: A

Q: 9
Which is a startup option for Identity Vault Driver Objects?
A. Manual: The driver must be started through iManager.
B. SafE.The driver starts with a driver shim to allow for troubleshooting.
C. XML: The driver allows you to directly edit the XML scripts while it is running.
D. Subscriber: The driver only sends events from the connected system to the Identity Vault.
E. Extend SchemA.The driver detects classes and attributes that aren't yet in eDirectory and prompts you as to whether to extend the schema to include them.
Answer: A

Q: 10
How are Identity Vault objects mapped to a connected system?
A. Each connected system is assigned a distinguished name each time Identity Manager is launched.
B. Each object in the Identity Vault contains an association table that maps to the connected systems.
C. Each connected system already contains a reverse-indexed table that supplies an identifier to the Identity Vault.
D. An association table is created if matching policies detect at least 90% of the attributes are the same on the connected system.
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved