Which port number should be used to test LDAP Security Sockets Layer (SSL) traffic?
CORRECT TEXT
Which port number should be used to test LDAP Security Sockets Layer (SSL) traffic?
which option should be used with the TLSVerifyClient directive to ask the client for a valid certificate in or
When configuring LDAP to use certificates, which option should be used with the TLSVerifyClient
directive to ask the client for a valid certificate in order to proceed normally?
Which configuration directive must be used in the example below to setup replication to a slave server?
CORRECT TEXT
Which configuration directive must be used in the example below to setup replication to a slave
server?
_____________ uri=ldaps://slave.example.com:636 binddn=”cn=Replicator,dc=example,dc=com”
bindmethod=simple credentials=secret
Which of the following parameters in slapd.conf are used to tune the database cache size?
Which of the following parameters in slapd.conf are used to tune the database cache size?
(Choose TWO answers.)
which parameter must match the binddn parameter of the master server?
CORRECT TEXT
In an LDAP slave’s slapd.conf configuration file, which parameter must match the binddn
parameter of the master server?
What should be done to speed up the searches?
An administrator notices that searches are being processed sequentially and taking a long time to
complete. What should be done to speed up the searches?
Which command will instruct slurpd to process the replication error log in one-shot mode for the server 192.16
Which command will instruct slurpd to process the replication error log in one-shot mode for the
server 192.168.0.3?
What is the name of this file?
CORRECT TEXT
The following is an excerpt from a replication error log:
ERROR: No such attribute
replica: slave.example.com:389
time: 809618633
dn: uid=bjensen,dc=example,dc=com
changetype: modify
replace: description
description: A dreamer…
-replace: modifiersName
modifiersName: uid=bjensen,dc=example,dc=com
-replace: modifyTimestamp
modifyTimestamp: 20000805073308Z
What is the name of this file? (Enter only the file name and no path information.)
which file should be modified?
To restrict user authentication to ONLY users who belong to a specific organizational unit, which
file should be modified?
Which of the following tools are used to measure memory usage?
Which of the following tools are used to measure memory usage? (Select THREE correct
answers.)