1Y0-327 - Citrix Password Manager 4.5: Administration

Go back to Citrix

Example Questions

Which two components are required to configure data integrity assurance? (Choose two.) You are managing the network. One of your administrators is configuring a Windows application definition and only a few of the Control ID fields are recognized. How can the administrator complete the configuration of the application definition? A user is manually adding a logon form for a web-based application through Logon Manager. The application is not included in the predefined list. Which two steps must the user perform before the user ID and password can be stored? (Choose two.) When a doctor is in the office, the doctor uses an Active Directory password to authenticate to the agent machine. The doctor then moves to the patient bedside and logs into an agent machine with a smart card. For this scenario, what is true about key recovery? You work as a network engineer at . One of your administrators created an application definition for a web site. Users in the environment begin to complain that every time they log off from this web site, Password Manager logs them back on immediately. As a short term solution, users are resolving the problem by closing their browsers. This is not convenient because the browser is published on Presentation Server and each time users close their browsers, they must restart their sessions. When editing the application definition, which step should an administrator take to resolve the problem? You work as a network engineer at . One of your administrators installs the Password Manager Service and implements data integrity in an environment where the central store data is required to be digitally signed. Which information must the administrator provide when configuring the Password Manager Service? What is the purpose of application groups? When an NTFS Network Share is used as the central store, on which server should the file share be located? You work as a network engineer at . One of your administrators in an environment with multiple operating systems is considering the implementation of the Hot Desktop feature. On which two operating systems can the administrator install Hot Desktop? (Choose two.) In which location is the disconnected mode period for the licensing model configured? Where should the Password Manager agent software be installed? You work as a network engineer at . One of your administrators created an application definition and wants to test the password change for the application. Everything is working until the administrator selects "Create Your Own Password" in the Password Change Wizard. The administrator types "111" and confirms the password. The application returns a message that the password is not accepted because a minimum of 8 characters, including letters and numbers is required. Which two steps can an administrator complete in order to solve this problem? (Choose two.) is implementing Citrix Password Manager and management gives the Network Administrator a list of tasks to accomplish. Which of these specifications requires that the administrator configure question-based authentication? A large, international bottling company deployed and used Citrix Password Manager successfully in all of its worldwide offices for the past six months. This deployment includes the Account Self-Service feature, with a policy that the question-based authentication questionnaire should be changed every six months. After the Citrix Administrator changes the questionnaire, which statement describes the user experience? You are managing the network. One of your administrators of an enterprise is configuring password sharing groups in an effort to reduce the number of calls placed to the help desk for resetting passwords. Which statement regarding the configuration of password sharing groups in an environment is true? You work as a network engineer at . One of your administrators just created a web application definition using the Password Manager Console and deployed it on systems running the agent software. In which two .INI files are the configurations stored? (Choose two.) Which two steps must be completed in order to implement Account Self-Service? (Choose two.) You work as a network engineer at . One of your administrators creates and processes the necessary provisioning file using the Provisioning Wizard in the Password Manager Console. Which statement best describes the provisioning process that will follow? To enable data integrity on a central store with pre-existing data that has never been signed, the administrator must _____ before _____. (Fill in the blanks with the correct pair of options.) Which two elements are used by the agent software to recognize a web application? (Choose two.) You work as a network engineer at . One of your administrators discovers that many users are including the company name in their passwords. In accordance with best practice, which rules should an administrator use to prevent users from including a specific word in their passwords? Which two object types are used together to manage password expiration? (Choose two.) What are two justifications for using an NTFS shared folder as the central store in an environment that has Active Directory implemented? (Choose two.) You work as a network engineer at . One of your administrators configured an application definition for a "New CRM Database" Windows application. The administrator tested the application on a computer that had the Citrix Password Manager agent software installed. The agent software correctly detected and submitted credentials for the application. Now the administrator is configuring a second form for this application definition to allow Password Manager to recognize and interact with the Change Password window for this application. When the administrator reached the "Identify form" step, he noticed the following window title for the change password form of the application: "Change Password - 10:30PM", where the time represents real time. How can the administrator configure this change password form so that it is recognized by Password Manager? You work as a network engineer at . One of your administrators creates an application definition for a host-based application. The administrator adds the host application definition to an application group in a user configuration. The administrator starts the agent software on a workstation and then starts the host-based application, but the agent software does not respond. Which step can the administrator use to troubleshoot this problem? You work as a network engineer at . One of your administrators is planning an implementation of Password Manager 4.5. The administrator recently obtained a new software with a custom graphical identification and authentication (GINA) DLL that needs to be deployed to users in the Drafting department. Which two statements are true about installing the agent software for this environment? (Choose two.) When configuring a host application, how can the administrator configure the definition to submit an "Enter" before submitting credentials to the host? purchases 99 named user licenses for Citrix Password Manager Advanced Edition. The administrator installs the license file and launches the License Management Console to ensure that the license file is properly installed. The administrator also sets up the Citrix Password Manager environment and launches the Password agent software. When the agent software starts, the following error message is displayed: "Cannot acquire a license. The required license is not installed. Citrix Password Manager Agent is disabled." Which two misconfigurations for the user configuration could be the possible cause of this problem? (Choose two.) Which two statements regarding the central store are true? (Choose two.) The signing tool uses the _____ to sign the data on the central data store and the _____ to verify the data on the central data store. (Fill in the blanks with the correct pair of options.) You work as a network engineer at . One of your administrators wants to create a password policy for the Finance group. This policy will ensure that passwords are eight characters in length, with at least one uppercase and one numeric character. In addition, only two retries will be allowed for an incorrect password, and users will be forced to re-authenticate before submitting application credentials. Which three controls will allow the administrator to create a password policy to meet the requirements of this scenario? (Choose three.) Which action can an administrator take to disable data integrity on a central store containing pre-existing data that is signed? Which user account requires rights and privileges to manage communication among the central store, automatic key recovery, and the Self-Service module? Which statement about application definitions is true? During the setup of a user configuration, an administrator chooses the previously used password key recovery method. The administrator changed a user's primary password because the user could not remember his password. What will happen the first time the user tries to launch the Password Manager agent software after his password has been changed? Which statement regarding the disabling of security questions and subsequent user verification using a previous password is true? You work as a network engineer at . One of your administrators is configuring a Windows application definition for an application that does not have a Windows title. What should the administrator specify as the Windows title? When creating an application definition for a host-based application, in which .INI file should the host emulator program be defined? When installing the Password Manager Service, which type of certificate is required for SSL communication? What are two best practices for creating security questions? (Choose two.) Which two features of the Password Manager agent software require the location of the Password Manager Service to be specified during agent software installation? (Choose two.) Which statement is true regarding the Password Manager Self-Service Registration Wizard? Which two steps must an administrator take to implement certificate-based smart cards with a Password Manager deployment? (Choose two.) You work as a network engineer at . One of your administrators configured the Hot Desktop feature for an environment so that Microsoft Excel resides in the transient process list and Wordpad resides in the persistent process list. User1 logs on to a Hot Desktop session and launches Microsoft Excel, Wordpad, PowerPoint, and Word. User1 logs off and User2 logs on. Which application will still be running when User2 logs on? When creating a Windows application definition, which identification feature provides anti-phishing protection for the application? A Citrix Administrator who is planning a large Password Manager deployment, decides to include the Account Self-Service feature and let users choose between their previous primary password and question-based authentication questionnaire after a primary password change. Which two steps are required to implement this? (Choose two.) Which two criteria should a server meet before the Password Manager Service is installed? (Choose two.) You work as a network engineer at . One of your administrators, creating a password policy for the Marketing group, wants to ensure that passwords are six to eight characters in length, with no repeated characters. In addition, when a password change is requested, users will be required to create a new password. Which two controls will allow the administrator to create the password policy to meet the requirements of this scenario? (Choose two.) Which two options can be configured using the Password Policy Wizard? (Choose two.) Which user account needs rights and privileges to manage passwords for every user in the domain?