Which command can be used to require a user to authenticate as an eDirectory user before allowing them to enter commands at the server console?
A. LOCK CONSOLE
B. SECURE CONSOLE
C. LOAD SCRSAVER.NLM
D. LOAD CONSOLELOCK.NLM -EDIR
You suspect that someone has used BURGLAR.NLM to create a rogue admin user and has hidden it in your tree. Which file can you check to see if an unauthorized NLM was loaded?
A. SYSTEM.LOG
B. SYS$LOG.ERR
C. NLMLOAD. LOG
D. CONSOLE. $OG
E. $HISTORY.LOG
F. CONSOLELOG.TXT
G. UNAUTHORIZED. LOG
Which utility can be downloaded from the Internet and run at the server console to change the password of an e Directory user object?
A. SETPASS.NLM
B. BURGLAR.NLM
C. CRACKER.NLM
D. PASSWORD. NLM
E. PASSHACK.NLM
F. ADMINHACK.NLM
Which server console command can be used to disable the loading of NLMs from the floppy drive?
A. SECURE LOAD
B. DISABLE LOAD
C. SECURE FLOPPY
D. SECURE CONSOLE
E. DISABLE FLOPPY
F. DISABLE CONSOLE
One of your clients owns a company that runs three shifts of employees each day. To save money, the client has purchased only enough workstations for a single shift of employees. Each employee shares his or her computer with two other employees who work different shifts. The client has a very high employee turn-over rate. The average employee only works there for 6-9 months. Based on this information, which of the following security policies should you consider implementing? (Choose 2.)
A. Force periodic password changes.
B. Use a volume other than SYS for home directories.
C. Restrict user logins times to the user's shift hours.
D. Avoid assigning rights through the All Properties option.
E. Assign file attributes in addition to file trustee assignments.
You're implementing OES NetWare for a small business client: Jessica's Bakery. There is only one server in the network. You've named the server BAKERY1 and installed it into an eDirectory tree named JESSICASBAKERY-TREE. You've
used a random password generator to create a password for the tree's Admin user.
You've placed the server hardware next to the point-of-sale system in the customer area of the bakery. All workstations have the latest Novell Client installed on them. You created a directory named SHARED on the server's DATA volume
where employees can share files. Does this configuration meet Novell's security recommendations?
A. Yes, all Novell Security guidelines have been met.
B. No, you shouldn't use shared directories.
C. No, the server should be located in a locked room.
D. No, passwords created with a random password generator aren't complex enough.
E. No, you shouldn't use the business name in the server or eDirectory tree names.
You've configured an iPrint printer on your DA2 server, which has an IP address of 10.200.200.2. Your users now need to connect to the server through a web browser and install the printer using the default printer list generated by iPrint. Which URL should they use in their browser window to do this?
A. http://10.200.200.2:631/ipp
B. http://10.200.200.2:631/iPrint.htm
C. http://10.200.200.2/iPrintdocs/ipp
D. http://10.200.200.2/ippdocs/maps.htm
You've just created an A record in your organization's DNS server for your iPrint server. The iprint.myorg.com DNS record resolves to your iPrint server's IP address, which is 10.200.200.1. Your Print Manager's name is PRMAN. You need to
load your Print Manager software on the server with domain name support enabled.
Which server console command will do this?
A. NDPSM PRMAN
B. NDPSM PRMAN iprint.myorg.com
C. NDPSM PRMAN /dnsname=iprint.myorg.com
D. IPRINTMAN PRMAN /dnsname=iprint.myorg.com
You're configuring location-based printing with iPrint. You've uploaded your map image files, now you need to use the iPrint Map Designer tool to create printer locations. If the IP address of your iPrint server is 10.200.200.1, which URL would you enter in your web browser to access this tool?
A. http://10.200.200.1/nps/iManager.html
B. http://10.200.200.1:631/Ippdocs/Maptool.htm
C. http://10.200.200.1:8008/Ippdocs/Maptool.htm
D. http://10.200.200.1:631/Ippdocs/MapDesigner.htm
You're configuring location-based printing with iPrint on your OES NetWare server. You've scanned floor plans of your organization's office suite into JPG files. You now need to upload these images to your server. Which directory should you copy them to?
A. Sys:\System\Ndps\Ippdocs\Images\Maps
B. Sys:\System\iPrint\Ippdocs\Images\Maps
C. Sys:\Apache2\Htdocs\iPrint\Images\Maps
D. Sys:\Apache2\Htdocs\Ippdocs\Images\Maps
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only Novell exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 050-696 exam preparations and Novell certification application, do not hesitate to visit our Vcedump.com to find your solutions here.