1 / 29

lf admin i certification review

Agenda. Format of the TestTypes of QuestionsReview of all Key Topics in Admin ISample QuestionsResourcesQuestions. Format of the Admin I Test. 38 QuestionsMultiple ChoiceEstimated Length of Preparation

Audrey
Download Presentation

lf admin i certification review

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. LF Admin I Certification Review Chad Rodriguez Technical Manager

    2. Agenda Format of the Test Types of Questions Review of all Key Topics in Admin I Sample Questions Resources Questions

    3. Format of the Admin I Test 38 Questions Multiple Choice Estimated Length of Preparation – 8 Hours Passing Score: 70% Test time: 1hr 30 min 2 Opportunities to take the test

    5. Types of Questions: Volumes LF8 volume data Read only volumes Permanent volumes Size limit LF8 volumes store – Images, text, electronic documents, thumbnails, word locations Read only volumes – Prevents changes to existing data in a volume. A read only edoc cannot be updated NOR can text or metadata, Is reversible through the Admin Console Permanent volumes – Prevents changes from being made to images, text, or edocs, but still allows you to add additional information and modify metadata. A volume set to permanent, CANNOT be reversed. Size limit – Once a volume reaches its limit, it will stop accepting new documents. It will also prevent the documents form having new pages added. LF8 volumes store – Images, text, electronic documents, thumbnails, word locations Read only volumes – Prevents changes to existing data in a volume. A read only edoc cannot be updated NOR can text or metadata, Is reversible through the Admin Console Permanent volumes – Prevents changes from being made to images, text, or edocs, but still allows you to add additional information and modify metadata. A volume set to permanent, CANNOT be reversed. Size limit – Once a volume reaches its limit, it will stop accepting new documents. It will also prevent the documents form having new pages added.

    6. Types of Questions: Volumes Rollovers Exported Volumes Encrypted vs. Secured Volume Backing Up Volumes Rollover volumes – It makes the system easier to work with. It makes backups easier to work with. Exported volumes – Contains templates and fields, folder structure, and document annotations. It does not include security information. Encrypted - An encrypted volume is an archival volume whose files have been encrypted in the Windows file system, but that can still be accessed through Laserfiche applications, such as the Client, by users with sufficient rights. Secured – A secured volume is a volume whose files are encrypted but cannot be accessed through Laserfiche client applications. You cannot secure a volume until you have encrypted it. If a user opens a document from that volume, they’ll get a message that the volume is in a secured state and can’t be accessed. Until an admin uses the encryption password to unlock the secured volume, users will be unable to access its contents. Backing up Volumes Considerations – Keep them synchronized with the repository database. Make sure no one has a document open in the volume currently being backed up. Rollover volumes – It makes the system easier to work with. It makes backups easier to work with. Exported volumes – Contains templates and fields, folder structure, and document annotations. It does not include security information. Encrypted - An encrypted volume is an archival volume whose files have been encrypted in the Windows file system, but that can still be accessed through Laserfiche applications, such as the Client, by users with sufficient rights. Secured – A secured volume is a volume whose files are encrypted but cannot be accessed through Laserfiche client applications. You cannot secure a volume until you have encrypted it. If a user opens a document from that volume, they’ll get a message that the volume is in a secured state and can’t be accessed. Until an admin uses the encryption password to unlock the secured volume, users will be unable to access its contents. Backing up Volumes Considerations – Keep them synchronized with the repository database. Make sure no one has a document open in the volume currently being backed up.

    7. Types of Questions: Data Recovery Main components to recover: Volume Files Database

    8. Types of Questions: Data Recovery Subcomponents to recover: The Laserfiche Search Index Requires VSS Volume Shadow Copy service can be used with a third-party backup utility to backup the Search Index.Volume Shadow Copy service can be used with a third-party backup utility to backup the Search Index.

    9. Types of Questions: Data Recovery Preferred database backup method: Schedule a job to backup database while still online

    10. Types of Questions: Data Recovery Preferred database testing method: Restore the backed up database Verify you can open the LF repository

    11. Types of Questions: Rights Template/Field Rights Volume Rights Tags Entry Access Rights Feature Rights Privileges

    12. Types of Questions: Tags Supplemental markers for documents and folders Classify or securing on a document basis Valuable when searching for documents scattered throughout a repository Tags act as supplemental markings for documents and folders and are useful for classifying and securing on a document-by document basis. Tagging a document with a security tag ensures that only users who have that tag will be able to view it, so by assigning tags for different levels of security you can sort documents into the appropriate category without having to move them to another location in the folder structure. Tagging documents with security tags provides a useful addition to access-rights based security. They may be applied by a user who has the security tag assigned. Tags act as supplemental markings for documents and folders and are useful for classifying and securing on a document-by document basis. Tagging a document with a security tag ensures that only users who have that tag will be able to view it, so by assigning tags for different levels of security you can sort documents into the appropriate category without having to move them to another location in the folder structure. Tagging documents with security tags provides a useful addition to access-rights based security. They may be applied by a user who has the security tag assigned.

    13. Types of Questions: Security Explicit Deny vs. Explicit Allow Order of rights: Denied, Tags, Allowed, Blank Conflicting , explicit rights – This can happen when a user’s rights are different from the rights of a group or when the user is in two different groups, the rights will follow this order: Denied, Tags, Allowed, Blank Denied – Denied rights take precedence Tags – If a security tag is assigned to a document but not to you, you will not be able to see it regardless of the allowed rights. Allowed – Enables a user to perform that action. Blank – By default, not granted. Rights that are specifically allowed or denied take precedence.Conflicting , explicit rights – This can happen when a user’s rights are different from the rights of a group or when the user is in two different groups, the rights will follow this order: Denied, Tags, Allowed, Blank Denied – Denied rights take precedence Tags – If a security tag is assigned to a document but not to you, you will not be able to see it regardless of the allowed rights. Allowed – Enables a user to perform that action. Blank – By default, not granted. Rights that are specifically allowed or denied take precedence.

    14. Types of Questions: Security Template/field security Example – User needs to change a field value Needs: Edit – field access right Needs: Write Metadata – entry access right

    15. Types of Questions: Authentication Windows authentication – no login required What happens when you change your password in Windows? All you need to do is log out of your Windows workstation and log back in. The new credentials will automatically update.All you need to do is log out of your Windows workstation and log back in. The new credentials will automatically update.

    16. Types of Questions: Recycle Bin Purging documents in your recycle bin requires: Purge Entries privilege Purging documents from any recycle bin requires: Manage Entry Access privilege Documents cannot be opened in the recycle bin

    17. Types of Questions: Network Configuration LF Server communicates to SQL database Uses LF Server service account Minimal access to run properly Datareader and Datawriter role Do not use the System Admin Role to increase security. Database Owner will work as well but it will give additional authority. Do not use the System Admin Role to increase security. Database Owner will work as well but it will give additional authority.

    18. Types of Questions: LF Administration System Manager Role Register and Unregister Repositories

    19. Types of Questions: LF Administration Admin Console – Sessions node Shows users logged into the repository Disconnect users Shows the workstation of the user

    20. Types of Questions: Auditing To audit: Enable auditing for users in the Admin Console Configuration under Users>nameofuser>Properties>Auditing tab

    21. Types of Questions: Scanning Rights Scanning requires: LF Scanning is installed Right to create document Feature right to scan

    22. Types of Questions: Text Searching Invalid or inconsistent text searches are resolved by: Re-OCRing the affected documents Recommended Reindex the repository

    23. Types of Questions: Client Problem: A new client machine does not display the repository at the login screen: Attach the repository through the Client Recommended Manually edit the registry to add the repository

    24. Types of Questions: Special Users FTSUSER$ and WFUSER$ Never need to be disconnected Used by Full Text Search Engine Used by Workflow Do not use up a license

    25. Types of Questions: Field Consistency Maintaining field consistency requires: Field constraints Used for dates, SSNs,etc.

    26. Types of Questions: Field Entry Upon document creation, a scanner operator needs to enter field data They cannot access the field at a later time This requires: ‘Create’ field access right

    27. Types of Questions: Field Uses Using fields have the following benefits: Categorize a document Allow users to find documents Help standardize document naming Propagate data to documents from folders

    28. Quick Tips Do not exit out of the test after starting Open book Use the LF Administrator I Manual PDF If you cannot determine the answer, skip and go back

    29. References LFAdmin8 Help File Laserfiche Administrator I Manual (PDF) This Powerpoint! Laserfiche Support Site https://support.laserfiche.com

    30. Questions?

More Related