Question 25

- (Topic 2)
Several Security Policies can be used for different installation targets. The Firewall protecting Human Resources’ servers should have its own Policy Package. These rules must be installed on this machine and not on the Internet Firewall. How can this be accomplished?

Correct Answer:C

Question 26

CORRECT TEXT - (Topic 14)
Type the command and syntax that you would use to view the virtual cluster interfaces of a ClusterXL environment.
Solution:
cphaprob -a if

Does this meet the goal?

Correct Answer:A

Question 27

- (Topic 8)
Users with Identity Awareness Agent installed on their machines login with , so that when the user logs into the domain, that information is also used to meet Identity Awareness credential requests.

Correct Answer:D

Question 28

- (Topic 7)
What happens if the identity of a user is known?

Correct Answer:C

Question 29

- (Topic 7)
What happens if the identity of a user is known?

Correct Answer:D

Question 30

- (Topic 16)
If Jack was concerned about the number of log entries he would receive in the SmartReporter system, which policy would he need to modify?

Correct Answer:D

START 156-915.77 EXAM