Latest Braindump2go Microsoft 70-158 Exam Dumps Free Download (21-30)

Braindump2go Updates Microsoft 70-158 Exam Dumps Questions, adds some new changed questions from Microsoft Official Exam Center. Want to know 2015 70-158 Exam test points? Download the following free Braindump2go Latest Exam Questions Today!

Vendor: Microsoft
Exam Code: 70-158
Exam Name: Forefront Identity Manager 2010, Configuring

Keywords: 70-158 Exam Dumps,70-158 Practice Tests,70-158 Practice Exams,70-158 Exam Questions,70-158 PDF,70-158 VCE Free,70-158 Book,70-158 E-Book,70-158 Study Guide,70-158 Braindump,70-158 Prep Guide

QUESTION 21
Your company network contains Forefront Identity Manager (FIM) 2010. Your company wants to extend the contracts of several groups of temporary employees through the next quarter.
You need to identify the security groups that will expire in the next three days.
Which XPath query should you use?

A.    /Group[Type= ‘Security’ and ExpirationTime <= op:add-dayTimeDuration-to-dateTime(fn:current- dateTime(),
xs:dayTimeDuration(‘P3D’))]
B.    /Group[Type= ‘Distribution’ and ExpirationTime >= op:add-dayTimeDuration-to- dateTime(fn:current-dateTime(),
xs:dayTimeDuration(‘P3D’))]
C.    /Group[Type= ‘Security’ and ExpirationTime == op:add-dayTimeDuration-to-dateTime(fn:current- dateTime(),
xs:dayTimeDuration(‘P3D’))]
D.    /Group[Type= ‘Security’ and ExpirationTime >= op:add-dayTimeDuration-to-dateTime(fn:current- dateTime(),
xs:dayTimeDuration(‘P3D’))]

Answer: A

QUESTION 22
You administer a Forefront Identity Manager (FIM) 2010 server for your company named Contoso, Ltd.
You discover that several users have not been assigned to a manager within the FIM metaverse. You need to identify the users who have no manager within the metaverse.
What should you do?

A.    Create the following XPath query:
/Person[Manager != /Person]
B.    Create the following XPath query:
/Person[Manager = /Person]
C.    Create the following LDAP query:
managedBy=”OU=Users,DC=Contoso,DC=com”
D.    Create a custom Active Directory Users and Computers search filter for the security principles of all users
who do not have the Manager attribute.

Answer: A

QUESTION 23
Your company network includes Forefront Identity Manager (FIM) 2010.
The FIM server has the following XPath query:
/Request[Target = /Group[Type = ‘Security’] and Operation = ‘Put’ and CreatedTime >= op:subtract- dayTimeDuration-from-dateTime(fn:current-dateTime(), xs:dayTimeDuration(‘P7D’))]
What is the function of the XPath query?

A.    To identify security groups created within the last 7 days.
B.    To identify security groups modified within the last 7 days.
C.    To identify requests made to modify a security group more than 7 days ago.
D.    To identify requests made to modify a security group within the last 7 days.

Answer: D

QUESTION 24
Your company network includes Forefront Identity Manager (FIM) 2010.
You implement several authoritative Management Agents (MAs) for employee metaverse objects. You need to ensure that whenever a connector object is removed from an authoritative MA, the employee metaverse object that is connected is deleted.
What should you do?

A.    Create an object deletion rule, and select the Delete metaverse object when last connector is
disconnected option.
B.    Create an object deletion rule, and select the Delete metaverse object when connector from any
of the following management agents is disconnected option.
C.    Select the Make them disconnectors option in the deprovisioning rules.
D.    Select the Determine with a rules extension option in the deprovisioning rules.

Answer: B

QUESTION 25
Your company network includes Forefront Identity Manager (FIM) 2010.
You use the Management Agent (MA) for delimited text files. The import and export flows of these text files must be successful. An example of the delimited text files that will be used is shown below.
 
You need to ensure that the MA for delimited text files will function correctly.
What should you do? (Choose all that apply.)

A.    Modify records to appear as single-line entries.
B.    Edit the schema for use along with the text file.
C.    Remove end-of-line characters between records.
D.    Replace comma with semicolon as the delimiting character.
E.    Arrange multivalued attributes and header names to appear in sequential order.

Answer: AE

QUESTION 26
You use Forefront Identity Manager (FIM) 2010 in your company network.
You integrate a new Microsoft SQL Server database with FIM.
You create a Management Agent (MA) and configure run profiles.
You delete an attribute in the SQL database.
You execute a Full Import run profile on the SQL MA and it fails.
You review the Connection Log and discover a failed-connection error.
You need to ensure that the new SQL database can synchronize with FIM.
What should you do? (Choose all that apply.)

A.    Run iisreset.exe.
B.    Refresh the SQL MA schema.
C.    Configure a connector filter in the SQL MA.
D.    Add a new step to the Full Import run profile.
E.    Configure the schema in Management Agent Designer.

Answer: BE

QUESTION 27
You administer a Forefront Identity Management (FIM) 2010 server in your company network. You need to add a user attribute named AccountStatus to the user interface in the FIM Portal. What should you do?

A.    Modify the web.config file.
B.    Set the Visible attribute of the Grouping element to true.
C.    Set the DisplayAsWizard attribute of the Panel element to false.
D.    Modify the Resource Control Display Configuration (RCDC) XML files.

Answer: D

QUESTION 28
Your company network includes Forefront Identity Manager (FIM) 2010 and Active Directory Domain Services (AD DS).
You create a FIM Management Agent (MA) for AD DS.
You receive the following error message during an import from AD DS:
“Replication access was denied.”
You need to ensure that the import from AD DS is successful.
What permission should you grant to the AD DS MA account?

A.    The Replicate Directory Changes permission on the domain partition in AD DS
B.    The Replication Synchronization permission on the domain partition in AD DS
C.    The Replicate Directory Changes permission on the Configuration container in AD DS
D.    The Replication Synchronization permission on the Configuration container in AD DS

Answer: A

QUESTION 29
Your company network includes Forefront Identity Manager (FIM) 2010.
You are configuring the FIM Management Agent (MA) attribute flows for first-time synchronization between the FIM Service and FIM Synchronization Service.
You map configure object mapping for the person object type.
You need to ensure that proper attribute flows are created for the Person object on the FIM MA . What should you do? (Choose all that apply.)

A.    Add the FIM object IDs.
B.    Add the metaverse object IDs.
C.    Add the expectedRuleEntry metaverse object type.
D.    Add the detectedRuleEntry metaverse object type.

Answer: CD

QUESTION 30
Your company network includes Forefront Identity Manager (FIM) 2010.
You add a new object type from the FIM Portal.
You need to ensure that the new object is managed by the FIM Management Agent (MA).
You include the new object type on the Select Object Types page in the FIM MA properties.
What should you do next?

A.    Refresh the schema.
B.    Create a new FIM Service MA for the new object type.
C.    Map the new object type to an existing metaverse object type in the FIM MA properties.
D.    Add the new object to the ObjectTypeDescription extended attribute of the synchronization filter.

Answer: C


For those who feel the overwhelming anxiety before their 70-158 exam,Braindump2go Latest updated 70-158 Exam Dumps will help you Pass 100% in a short time preparation! 70-158 Exam Dumps PDF & VCE Full Version Instant Download!

http://www.braindump2go.com/70-158.html

Releated

[December-2023]Real Exam Questions-Braindump2go PL-400 Exam PDF and PL-400 VCE PL-400 367Q Download[Q349-Q357]

December/2023 Latest Braindump2go PL-400 Exam Dumps with PDF and VCE Free Updated Today! Following are some new Braindump2go PL-400 Real Exam Questions! QUESTION 349A company designs a Microsoft Dataverse Custom API to encapsulate business logic in it.The Custom API business logic must be encapsulated in a way that does not allow the business logic behavior […]