Creating an ID vault on your Domino server requires administrator access to the server on which you create it, Editor access to the Domino Directory, and which of the following?
A. Create databases and templates access
B. Membership of the ID Vault Admins group
C. The ID Vault Admin role in the Domino Directory
D. The ID Vault secret key generated from the server ID file
Which of the following are options utilized to provide the communication mechanism used by the server to exchange automatic synchronization messages with the device client?
A. UDP or ICMP
B. ICMP or SMS
C. SMS or TCP Network
D. TCP Network or ICMP
By default, in which of the following ways is the DAOS storage encrypted?
A. No encryption is applied
B. Medium encryption by the server ID file
C. Strong encryption by the server ID file
D. Medium encryption for each user linked to an attachment
Abby, the Domino administrator, issued the following Domino server command: tell DAOSmgr listnlo. Which of the following results were provided from this command?
A. Cleaned unused attachment files
B. Displayed status of all DAOS-enabled databases
C. Resynchronized DAOS-enabled databases with DAOS objects in the storage repository
D. Allowed her to identify documents whose objects might be missing after a server restore
While installing Lotus Traveler, Mitch wanted to provide only the client installation files on his external Web server for his mobile users. Which of the following installation types offers this ability?
A. Complete
B. Server only
C. Web site only
D. Client files only
One of your Lotus Traveler users has misplaced a mobile device. You cannot delete this person's Internet password, as it is used for Domino Web Access, nor can you delete the person record for this person. Which of the following will still allow the user to utilize Domino Web Access and NOT Lotus Traveler?
A. Remove the Lotus Traveler policy for the user
B. Place the user in a secondary directory on all the servers
C. Place the user in the "Not access server" field in the server document
D. Place the device ID in the restricted access field in the Lotus Traveler configuration database
You are in the process of upgrading your Domino environment to version 8.5 and have implemented the ID vault on one of the servers as well as some of the deployed clients. The clients are attempting to upload their ID files to the vault on home servers that are not version 8.5 yet. Which of the following will the client experience next?
A. The Notes client presents an error that an ID vault is not available on the home server
B. The Notes client asks its home server for a list of servers that have a replica of the vault
C. The Notes client does NOT present an error but will not be able to upload the ID file to a vault
D. The Notes client will generate a notification to the ID vault managers notifying themof thefailed attempt
You have inherited a Domino domain with multiple vault servers. Which of the following designates the primary vault server in your ID Vaults - Manage tool?
A. A star
B. A flag
C. A checkmark
D. An alternate color
The following command was issued by a Domino administrator on the Lotus Traveler server: tell traveler log remove user. Which of the following occurs after this command is issued?
A. It removes the user policy from the assigned device
B. It removes all users from the list of users that are logging
C. It logs the removal of all users from the Lotus Traveler server
D. It removes the individual log of each user's synchronization history
You completed the process of upgrading your Domino server, and you are in the process of enabling DAOS for your user mail files. When can you enable the DAOS feature for mail files that will not be upgraded until a later date?
A. Immediately
B. After themail fileupgrade
C. When users approve the mailfileupgrade
D. After running the required compact task
Marion is having issues with a particular Lotus Traveler user and needs to extract all user information to a file. Which of the following server commands will obtain this information?
A. tell traveler dump
B. tell traveler show
C. tell traveler obtain
D. tell travelerShow Stats
Which of the Administration Process statistics would represent timed requests and quick retry requests?
A. ADMINP.ReqMsgQueue.GeneralPurpose
B. ADMINP.RequestIdTables.BatchRequest
C. ADMINP.RequestIdTables.PrimaryRequest
D. ADMINP.RequestIdTables.SecondaryRequest
James is the administrator of ABC company and wants to deploy ID vault. In which order should he perform the steps:
i. Use policies to assign user IDs to the vault
ii. Create the vault database on a server,
iii. Specify which user organizations trust the vault and assign password reset authority.
iv.
Create the vault ID file and specify at least one vault administrator.
A.
ii,iv,iii,i
B.
iii, ii, iv, i
C.
ii, iii, iv, i
D.
Steps not complete
How does custom Java code and standard Java API libraries differ from Signed Agents when executing in a Notes client?
A. There is no difference. The signer of the XPage application will be checked against the ECL of the local workstation.
B. The permissions of the XPage application signer are checked against the Java Security Manager FCL to determine if the signer has permission to perform the operation.
C. When the code is executed the Java Security Manager passes a permission check to the Notes Client ECL to see if the XPage application signer has permission to perform the operation.
D. Custom Java code and standard Java API libraries are not bound by the local ECL like Signed Agents are. The runtime permissions are based on the XPage ECL which is contained in the XPage application.
In a multi-user installation of Lotus Notes in Citrix, a specific path location of Client Data Directory may be specified. Which version of Lotus Notes allows the custom data directories during installation or upgrade?
A. Lotus Notes 8.5
B. Lotus Notes 7.0.3
C. Lotus Notes 8.0.2
D. Lotus Notes 8.5.1