By default, Public is made a trustee of the tree root during installation and granted the __________ right to it.
You're implementing iFolder in your company. You've already configured the user contexts to be serviced by iFolder. Now you need to configure LDAP to authenticate users to the iFolder server. Click on the option in the iFolder Management Console you would use to do this.
Hot Area:
Which is the third file processed as the OES NetWare operating system boots?
A. SERVER.EXE
B. CONFIG.NCF
C. STARTUP.NCF
D. STARTUP.CFG
E. AUTOEXEC. BAT
F. AUTOEXEC. NCF
Which OES NetWare service can be used to synchronize the information stored in your eDirectory tree with a Microsoft Active Directory domain?
A. iSCSI
B. Clustering
C. Identity Manager
D. Archive and Version Services
E. Service Location Protocol (SLP)
You're implementing OES NetWare for a small business client: Jessica's Bakery. There is only one server in the network. You've named the server BAKERY1 and installed it into an eDirectory tree named JESSICASBAKERY-TREE. You've
used a random password generator to create a password for the tree's Admin user.
You've placed the server hardware next to the point-of-sale system in the customer area of the bakery. All workstations have the latest Novell Client installed on them. You created a directory named SHARED on the server's DATA volume
where employees can share files. Does this configuration meet Novell's security recommendations?
A. Yes, all Novell Security guidelines have been met.
B. No, you shouldn't use shared directories.
C. No, the server should be located in a locked room.
D. No, passwords created with a random password generator aren't complex enough.
E. No, you shouldn't use the business name in the server or eDirectory tree names.
Given that your workstation's CD drive is assigned drive letter D, which is the correct path and filename for the NetWare Deployment Manager utility?
A. D:\NWDEPLOY.EXE
B. D:\NWDEPMAN.EXE
C. D:\DEPLOYMAN.EXE
D. D:\INSTALL\NWDEPLOY.EXE
E. D:\INSTALL\NWDEPMAN.EXE
F. D:\INSTALL\DEPLOYMAN.EXE
G. D:\PRODUCTS\INSTALL\NWDEPLOY.EXE
H. D:\PRODUCTS\INSTALL\NWDEPMAN.EXE
I. D:\PRODUCTS\INSTALL\DEPLOYMAN.EXE
Which utilities can be used to manage the eDirectory database? (Choose 2.)
A. CONFIG
B. MONITOR
C. iManager
D. iMonitor
E. Deployment Manager
F. Archive and Version Services
Which eDirectory component represents logical or physical network resources?
A. DIB
B. Object
C. Schema
D. Replica
E. Partition
Which component determines the type of access a user has to network directories and files on an OES NetWare server?
A. Entry rights
B. Attribute rights
C. Novell Client properties
D. File and directory rights
In your eDirectory tree, user DCoughanour is given an explicit trustee assignment to the IS.SYD. DA Organizational Unit object. He is granted Browse and Rename rights to this container. DCoughanour has no explicit assignments anywhere
higher in the tree.
User JJackson is given an explicit trustee assignment to the SYD. DA Organizational Unit. He is granted Browse, Create, and Rename rights to the container. You make DCoughanour security equivalent to JJackson. What effective rights
does DCoughanour have to IS.SYD. DA?
A. Browse
B. Supervisor
C. Browse and Rename
D. Browse, Create, and Rename
E. Supervisor, Browse, Create, and Rename
F. DCoughanour has no rights to the container.