IBM Notes and Domino 9.0 Social Edition System Administration B v6.0 (C2040-407)

Page:    1 / 8   
Total 118 questions

What needs to be done to an IBM Domino certifier to allow it to be managed by the CA process?

  • A. Nothing, all certifiers are managed by the CA process by default.
  • B. The certifier needs to be generated within the CA application itself.
  • C. Following creation, the certifier needs to be migrated to the CA process.
  • D. A safe copy of the certifier ID needs to be imported into the CA application.


Answer : C

When the administrator uses activity logging for replication, IBM Domino generates one activity logging record for each database replication request that a server initiates. Which statement is true regarding record logging?

  • A. Only the initial replication activity is logged.
  • B. All servers generate activity logging records.
  • C. Only the target server generates activity logging records.
  • D. Only the initiating server generates activity logging records.


Answer : D

Kim is configuring key rollover settings for users in the organization. She has already specified the existing key strength and age that will trigger a user key rollover. What is another trigger Kim can set to initiate user key rollover?

  • A. The location of the stored key set.
  • B. The creation date of the existing key.
  • C. The certifier used to create the original key.
  • D. The IBM Notes client version authenticating with the server.


Answer : B

Where is the display name portion of a sender's SMTP e-mail address set?

  • A. This is assigned in the mail settings policy.
  • B. This is assigned in email preferences in the IBM Notes client.
  • C. This is assigned by the "RFC822 phrase handling" setting in the user's Location document.
  • D. This is assigned by the "RFC822 phrase handling" setting on the Configuration Settings document of the server.


Answer : D

The managed mail replica is intended to be used as an abstraction of the user's server- based mail file. When the user performs mail commands, the Local replica is used. How would the user specifically open the server replica?

  • A. Click on the Mail shortcut button.
  • B. Right-Click the Mail icon and select "Open Server Replica".
  • C. Double-click the desktop icon that reflects the server replica.
  • D. Selecting File > Open > Notes Application, then browsing to the desired server and replica.


Answer : D

The SAML configuration settings are specified in IdP Configuration document(s) in which
IBM Notes database?

  • A. idpcat.nsf
  • B. names.nsf
  • C. samlcfg.nsf
  • D. samlcat.nsf


Answer : A

What should happen when Troy, the IBM Domino administrator, renames an IBM Notes user?

  • A. When Troy renames a Notes user, all occurrences of that user or name should be updated in the Domino Directory and other databases by the Domino Administration Process on the Domino server.
  • B. When Troy renames a Notes user, some occurrences of that user or name should be updated in the Domino Directory and other databases by the Domino Administration Process on the Domino server.
  • C. When Troy renames a Notes user, all occurrences of that user or name should not be updated in the Domino Directory and other databases by the Domino Administration Process on the Domino server.
  • D. When Troy renames a Notes user, all occurrences of that user or name should be updated in the Domino Directory but not in other databases by the Domino Administration Process on the Domino server.


Answer : A

What task has to be running in order to be able to register users using the CA process?

  • A. Monitoring
  • B. Registration
  • C. Certificate Authority
  • D. Administration Process


Answer : C

What is a dynamic policy?

  • A. A dynamic policy is an explicit policy that is assigned to users and groups.
  • B. A dynamic policy is an organizational policy that is assigned to specific groups of the organization.
  • C. A dynamic policy is an explicit policy that is assigned to users with the console command set policy.
  • D. A dynamic policy is an explicit policy that is assigned to groups with the console command set policy.


Answer : A

What file or files need to be copied to the IBM Domino data folder to allow SSL to function?

  • A. keyring file
  • B. keyring and stash file
  • C. certificate file supplied by the certificate issuer
  • D. No files are required to be copied, as SSL is configured through the SSL configuration database and within the Domino Directory.


Answer : B

An administrator has enabled a mail policy on the IBM Domino server. After waiting several hours, the settings have not been reflected in the IBM Notes client. What can the administrator do to ensure that the settings are applied to the users?

  • A. Delete the documents stored in the $policy view and restart the client.
  • B. Check the Location document and verify the "home mail server" field is set up correctly.
  • C. Run maintenance (fixup, compact, updall) against the local address book of the user's Notes client.
  • D. Issue the command on the users' home mail server tell adminp process mail policy.


Answer : D

Which statement is true regarding IBM Domino Off-Line Services (DOLS)?

  • A. A web browser is not required to access IBM Domino web applications offline.
  • B. Users are required to have an IBM Notes client to access Domino web applications offline.
  • C. DOLS provides a way for users to take Notes databases offline, work in them, and copy the databases back to the Domino server.
  • D. DOLS provides a way for users to take Domino web applications offline, work in them, and synchronize the changes with an online replica on the Domino server.


Answer : D

Adam has a report from an end user concerning his private folders. Adam has determined that the server has become unavailable and the end user was accessing the failover server. Which statement is true regarding private folders?

  • A. Private folders must be flagged in the cluster configuration.
  • B. Private folders do replicate to other replicas within the cluster.
  • C. Private folders do not replicate to other replicas within the cluster.
  • D. The cluster server should be included in the ACL in order to replicate private folders.


Answer : B

A user has Author access in a database. What is he able to do?

  • A. He is able to create documents.
  • B. He is able to edit documents he created.
  • C. He is able to delete documents he created.
  • D. Create documents only if he also has the "Create documents" access level privilege.


Answer : D

Alex would like to configure a new Mail Policy. How would a Mail policy settings document help him?

  • A. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Mail only.
  • B. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Calendaring and Scheduling only.
  • C. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Mail, Calendaring and Scheduling.
  • D. A Mail policy settings document will provide a mechanism for setting and enforcing IBM Notes and Web Mail policies and configuring POP3 and SMTP Mail services.


Answer : C

Page:    1 / 8   
Total 118 questions