What is assigned to each authentication scheme?
A. A number between 0 and 10 to define the order of access
B. A number between 0 and 1000 to define a protection level
C. A number between 0 and 100 to define a zone of protection
D. A number between 0 and 100 to define a development state
To help prevent performance issues, you want to install Report Server according to the manufacturer's recommendations. For the Report Server hard disk space, at minimum, you require:
A. 1GB
B. 2GB
C. 4GB
D. 10GB
Policies can grant access to users based on user information that exists in the user store. The BEST example of that information is:
A. User permissions
B. User profile attribute values
C. The client machine's IP address
D. CA SiteMinder administrative rights
What are the default session settings in CA SiteMinder? (Choose two)
A. Idle Timeout Enabled
B. Idle Timeout Disabled
C. Max Session Timeout Enabled
D. Max Session Timeout Disabled
Which features characterize the J2EE application server agent? (Choose two)
A. Supports IBM WebSphere and BEA WebLogk
B. Protects J2EE application server-based applications
C. Moves the point of trust from the web server to the ERP/CRM server
D. Makes calls to the Event Manager when authentication credentials are provided
Which log file holds log records for the CA SiteMinder user interface (UI)?
A. SiteMinder trace log
B. Application Server log
C. SiteMinder web agent log
D. SiteMinder Policy Server log
To turn on the tracing facility for all Policy Server actions, you: A. Configure the smtracedefault.txt file.
B. Modify the general_trace.template file.
C. Set the Enable Profiling option on the Policy Server Profiler tab.
D. Configure the Policy Server Management Console logging option.
Two important reasons why password policies are necessary are to:
A. Maintain use of valid passwords and disable user accounts.
B. Increase administrative involvement and disable user accounts.
C. Disable user accounts and minimize administrative involvement.
D. Prevent access when passwords have expired and ensure users cannot create week passwords.
Where are named expressions stored?
A. In cookies
B. In user classes
C. In the policy store
D. In the Administrator Group
Examples of Web Agent interactions with a Policy Server include: (Choose three)
A. isSecure
B. isProtected
C. isAuthorized
D. isAuthenticated