If you are an administrator, but not a superuser administrator, you can: (Choose two)
A. Create superuser administrators
B. Access CA SiteMinder objects, tools, and features
C. Change rules, policies, and responses in various domains
D. Instruct the Policy Server to set upa default administrator account
Before an installed Web Agent can be used to protect applications, you must:
A. Verify that the TraceFile is yes, and open the Policy Server interface.
B. Verify that the TraceFile is yes, and edit the Web Agent configuration.
C. Turn on the agent via the WebAgent.conf file and restart the web server.
D. Open the Policy Server interface and restart the web server from a command window.
What is assigned to each authentication scheme?
A. A number between 0 and 10 to define the order of access
B. A number between 0 and 1000 to define a protection level
C. A number between 0 and 100 to define a zone of protection
D. A number between 0 and 100 to define a development state
You are configuring cache and thread settings on the Policy Server Management Console Settings tab. Which Policy Server Operational Settings group do you need to configure?
A. RADIUS group
B. Performance group
C. Administration group
D. Access Control group
To help prevent performance issues, you want to install Report Server according to the manufacturer's recommendations. For the Report Server hard disk space, at minimum, you require:
A. 1GB
B. 2GB
C. 4GB
D. 10GB
Which features characterize the J2EE application server agent? (Choose two)
A. Supports IBM WebSphere and BEA WebLogk
B. Protects J2EE application server-based applications
C. Moves the point of trust from the web server to the ERP/CRM server
D. Makes calls to the Event Manager when authentication credentials are provided
Which log file holds log records for the CA SiteMinder user interface (UI)?
A. SiteMinder trace log
B. Application Server log
C. SiteMinder web agent log
D. SiteMinder Policy Server log
Two important reasons why password policies are necessary are to:
A. Maintain use of valid passwords and disable user accounts.
B. Increase administrative involvement and disable user accounts.
C. Disable user accounts and minimize administrative involvement.
D. Prevent access when passwords have expired and ensure users cannot create week passwords.
Which statement about the audit log is TRUE?
A. The default auditing option is asynchronous logging.
B. By default, the audit log is stored in an encrypted text file.
C. Asynchronous logging consumes no resources on the Policy Server.
D. You can specify whether changes made to policy store objects by administrators will be recorded in the Web Access Management (WAM) audit logs.
When using the CA SiteMinder Web Agent to protect resources, the three resource action rules available are: (Choose three)
A. GET
B. PUT
C. SET
D. POST
E. MAKE