1.
You are using the IVE to provide access to Terminal Service applications. Which statement is true regarding Windows Remote Desktop and Citrix ICA Terminal Services applications?
2.
How do you configure Cache Cleaner to remove temporary files created by other client applications during an IVE session?
3.
You receive an IVE from the factory. Which Web address should you access if you want to initially configure the device using a browser?
4.
Which filter properly searches an AD/NT server directory using LDAP for the user login name and compares it to the user's IVE login name?
5.
You create a set of role mapping rules. You select "Merge settings for all assigned roles." The second role mapping rule has the "Stop processing rules when this rule matches" option selected. A user logs in that matches the first three rules. What happens?
6.
You need to create a very detailed log search and have the Baseline License installed. How would you accomplish this?
7.
You are configuring J-SAM for a customer. The user has administrative access to the workstation. You have properly configured the SAM access control policy. Which additional role option must be turned on for J-SAM to work properly?
8.
What is the function of Web Options when defined as part of a user role?
9.
When using Core Access, what does the IVE do with all cookies generated on internal servers?
10.
Which access method provides Web access for Windows and NFS files?