Security Administrator, Zhi Wang, creates the CA Identity Minder roles required to implement delegated administration. Two weeks later, one of these new roles requires some changes. These changes should be performed by the:
A. Role Owner
B. Role Manager
C. Role Administrator
D. Access Role Membership Approver
Which statement about CA Identity Minder end points is TRUE?
A. An endpoint type can only contain one instance of an endpoint.
B. They are generally client operating system versions, such as Windows XP and Red Hat Linux.
C. An endpoint type is the lowest unit of organization in the hierarchical structure managed by the provisioning engine.
D. A specific type of endpoint needs to be enabled on the Provisioning Server to enable CA Id entity Minder to communicate to it.
During the installation, CA Identity Minder creates several database schemas. Later, to provide scalability, you can create a separate database to replace any one of these, Use the CreateDatabase script to set up a new:
A. Auditing database instance.
B. Workflow database instance.
C. Object Store database instance.
D. Task persistence database instance.
In an email template, what is the purpose of the <% %> tag?
A. Inserts a static text variable
B. Embeds JavaScript into a template
C. Presents event context information
D. Indicates that the template is invalid
You are implementing CA IdentityMinder at Forward Inc., an international logistics company with headquarters in the United Kingdom. At Forward Inc., a single managed endpoint containing every person does not exist. However all users are contained in a payroll database, which can become the source of the global users for the provisioning directory. In this context, the payroll database is known as a:
A. corporate store.
B. primary endpoint.
C. secondary endpoint.
D. operational database.
When you configure a WorkPoint manual activity, you can specify multiple Participant Resolvers, Using an order of precedence, CA Identity Minder identifies and applies the first resolver and ignores any subsequent resolvers. To select the resolver, which order of precedence does CA IdentityMinder follow?
1.
Role
2.
Filter
3.
Group
4.
Custom
A. 1,3,2,4
B. 2,3,4,1
C. 3,1,2,4
D. 4,1,2,3
In CA IdentityMinder r12.6, the basic access request feature:
A. is fully integrated with CA GovernanceMinder.
B. includes granular filtering and search capabilities.
C. enables bulk definition ofaccess request services objects.
D. can use workflow approval and email notification functionality.
You need to create a CA Identity Manager directory for an LDAP User Store. After you determine the directory structure that you need to use, which file do you modify to describe the objects in the User Store?
A. users.xml
B. config.xml
C. import.xslt
D. directory.xml
Which statement about Task Execution Web Services (TEWS) is TRUE?
A. Its interface is slower than the native web interface due to XML parsing.
B. It enables a CA SiteMinder Policy Server to support CA Identity Minder.
C. It is used by CA IdentityMinder to export data to CA GovernanceMinder.
D. It translates requests into the internal languages of the provisioning software.
Because of a recent acquisition by Forward Inc., which will add 1800 new users to the system, you decide to use the Bulk Loader to feed the information to CA IdentityMinder, You will need to prepare a file for the Bulk Loader, containing the relevant details. Which Bulk Loader input file guidelines do you need to follow? (Choose three)
A. The file should contain no header.
B. A field representing the action is mandatory.
C. Each file must describe a single managed object type.
D. Multivalued attributes must beseparated by a hash (#) symbol.
E. Attribute names should be the physical or well-known names of the managed objects.