Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which option is NOT supported when defining an Active Directory server?

A.

Domain/NetBIOS Name

B.

Directory filter

C.

Kerberos realm

D.

Container path

Which two statements about certificate-based user authentication are true? (Choose two.)

A.

Certificate-based user authentication may not require user input during the authentication exchange.

B.

Certificate attributes can be used to determine the correct sign-in page.

C.

Certificate attributes can be used to assign users to roles.

D.

Certificate-based user authentication requires the use of OCSP.

Which statement accurately describes resource profiles?

A.

Resource profiles are a collection of resources and ACLs.

B.

Resource profiles are a collection of resources and their descriptions.

C.

Resource profiles are where the resources, roles, and ACLs are in one location.

D.

Resource profiles are where ACLs are set up for resources.

To forward all logs to a single syslog server, how many syslog server customizations must be configured?

A.

1

B.

2

C.

4

D.

8

PSA-V is officially supported in which cloud infrastructures? (Choose two.)

A.

Rackspace

B.

AWS

C.

Azure

D.

IBM

E.

DELL EMC

Which method of access can be used to support Microsoft Remote Desktop (RDP) access from internet kiosks?

A.

Microsoft RDP client

B.

Pulse SAM

C.

Core HTML5

D.

SAML

Four PSA7000 devices form a multi-unit cluster. They each have 100 user licenses locally installed. If one device fails, how many users are supported by the remaining three live cluster members?

A.

100

B.

200

C.

300

D.

400

Which of these cluster types requires the use of a Virtual IP (VIP) address to be configured on the PCS?

A.

Multi-Unit

B.

Active/Passive

C.

Active/Active

D.

Load Balanced

Which two options must be verified on the PCS device so that only trusted SSL Web sites can be viewed? (Choose two.)

A.

Verify that the certificate is associated with a virtual port.

B.

Verify that the certificate is installed under Trusted Client CAs.

C.

Verify that Allow browsing untrusted SSL websites is not selected under Web options.

D.

Verify that the certificate is installed under Trusted Server CAs.

The following needs to be defined prior to configuring role-mapping:

A.

Sign-in Policies

B.

Authentication Servers

C.

Sign-in Notification

D.

User Roles