To modify the cookie domain you use the:
A. Policy Agent
B. Directory Server
C. Host Configuration Object (HCO)
D. Agent Configuration Object (ACO)
What is assigned to each authentication scheme?
A. A number between 0 and 10 to define the order of access
B. A number between 0 and 1000 to define a protection level
C. A number between 0 and 100 to define a zone of protection
D. A number between 0 and 100 to define a development state
You are configuring cache and thread settings on the Policy Server Management Console Settings tab. Which Policy Server Operational Settings group do you need to configure?
A. RADIUS group
B. Performance group
C. Administration group
D. Access Control group
Which database model does the Policy Server require?
A. Flat model
B. Network model
C. Relational model
D. Hierarchical model
Which types of configuration files are stored locally on the web server and can be created, modified, and viewed using a text editor? (Choose two)
A. Host configuration file
B. Web Agent configuration file
C. Web server configuration file
D. Policy store configuration file
You successfully install a CA SiteMindcr Web Agent. Then, if you perform the host registration process:
A. A Trusted Host Object is created.
B. A Web Agent Trace File is produced.
C. An Affiliate Agent calls the Policy Server.
D. An Agent Configuration Object (ACO) is updated.
Two important reasons why password policies are necessary are to:
A. Maintain use of valid passwords and disable user accounts.
B. Increase administrative involvement and disable user accounts.
C. Disable user accounts and minimize administrative involvement.
D. Prevent access when passwords have expired and ensure users cannot create week passwords.
In relation to Agents, what does central configuration indicate?
A. The Web Agent is configured from the Policy Server.
B. The Web Agent is configured from a local configuration file.
C. The Web Agent holds the initialization parameters for trusted hosts.
D. The Web Agent overrides the configuration parameters of trusted hosts.
One of the three cryptographic operating modes for securing CA SiteMinder data is Federal Information Processing Standards (RPS)-compatibility. This mode:
A. Only uses FIPS 140-2 algorithms.
B. Is only used for CA SiteMinder rl2.
C. Uses classic CA SiteMinder 6.x cryptography.
D. Is used where version 6.x and rl2 of CA SiteMinder co-exist.
Which statement about the audit log is TRUE?
A. The default auditing option is asynchronous logging.
B. By default, the audit log is stored in an encrypted text file.
C. Asynchronous logging consumes no resources on the Policy Server.
D. You can specify whether changes made to policy store objects by administrators will be recorded in the Web Access Management (WAM) audit logs.
When using the CA SiteMinder Web Agent to protect resources, the three resource action rules available are: (Choose three)
A. GET
B. PUT
C. SET
D. POST
E. MAKE
Examples of Web Agent interactions with a Policy Server include: (Choose three)
A. isSecure
B. isProtected
C. isAuthorized
D. isAuthenticated
When you install a CA SiteMinder Policy Server, you need to configure two service accounts.
Which service account has privileges to create, read, modify, and delete objects in the LDAP tree underneath the policy store root object?
A. smHOST
B. DN System
C. Administrative DN
D. Database Administrative Account
Which statement about the CA SiteMinder Extensible Policy Store (XPS) is TRUE?
A. It exports to .dtd files.
B. It cannot co-exist with legacy policy stores.
C. New applications can be added without altering the schema.
D. It uses the new CA SiteMinder Data Interchange Format (SMDIF).