C2040-407 - IBM Notes and Domino 9.0 Social Edition System Administration B Exam
Go back to IBM
Which Programmability Restriction grants the highest level of access?
Sign or run unrestricted methods and operations
Which two statements are true regarding IBM Notes and Internet certificates? (Choose two.)
A user can have only one Notes certificate.
A user can have multiple Internet certificates.
Which is an advantage of session-based web authentication over browser-based name and password authentication?
Name and password-based authentication needs to transmit credentials every time the server is accessed, session-based does not.
Why would an IBM iNotes user ever require an IBM Notes user ID?
A Notes user ID is required for iNotes users who wish to work offline or read encrypted mail.
What is the purpose of the "BatchRegFile=C:\temp\serverA.txt" entry in the notes.ini file?
When registering users from a text file, the administrator can import them through the Import Text File button on the Register Person dialogbox, and Notes will not prompt him to browse for the text file.
What should happen when Troy, the IBM Domino administrator, renames an IBM Notes user?
When Troy renames a Notes user, all occurrences of that user or name should be updated in the Domino Directory and other databases bythe Domino Administration Process on the Domino server.
Josh has been asked to rename a user as well as changing the user's Internet address. Which statement is true?
When a user is renamed, Josh can change the user's Internet address as part of a change to the user's common or alternate name, but hecannot use this rename procedure to change only the Internet address.
What is the correct way to create the credential store application?
Use Keymgmt commands.
An IBM Domino administrator would like to synchronize IBM Notes client password changes with internet passwords. How can she do this?
a security policy
The idpcat.nsf will contain which document(s) with the SAML configuration?
IdP configuration document(s)
The administrator has been asked to move a user's mail file because the user has moved to a different office. When the mail file is moved, the Administration Process first moves it to the new server, then issues a request to delete the old mail file from its original mail server. Which statement defines what must be performed to complete the deletion process?
The administrator must approve this mail file deletion.
If a document contains one Readers field containing the name "Martin", another Readers field which is blank, and an Authors field containing the name "David", who can read the document?
both Martin and David
A failover occurs when a user tries to open a database that is unavailable. The Cluster Manager looks in the Cluster Database Directory for a replica of the database. To find the replica, the Cluster Manager looks for a database that has the same replica ID as the original database. What are two properties that are also checked for before using the replica? (Choose two.)
Out of service
What document can be used to allow IBM Domino to receive e-mail addressed to more than one SMTP domain?
Global Domain document
Victoria has forgotten the password for her IBM Notes ID. What is the process she can follow to recover her ID from a backup using ID recovery?
Get the recovery passwords from the administrators, select Recover Password in Notes, enter the recovery passwords, and create a newpassword for her ID.
What feature can be implemented to allow users to access their customized settings and personal information automatically from any IBM Notes client in the domain?
A user has Author access in a database. What is he able to do?
Create documents only if he also has the "Create documents" access level privilege.
Craig has noticed a lot of incoming unsolicited e-mail is being generated from IP addresses beginning with the numbers 214.132.55. What should the entry in the "Deny connections from the following SMTP internet hostnames/IP addresses" field in the server's Configuration document be to prevent all of these IP addresses from connecting?
John created a dynamic policy that will be applied to a group of top executives in the organization. How can John ensure that settings from other assigned dynamic policies do not conflict with this policy?
Increase the precedence for this dynamic policy to a value higher than any other.
When do servers within the same IBM Notes Named Network require Connection documents to allow native Notes mail routing?
Connection documents are never required.
Sophia is applying ID encryption. What is the strongest level of ID encryption Sophia can mandate through a policy?
What security feature protects user workstations against active content from unknown or suspect sources?
Execution Control List
What does an IBM Domino administrator use to configure server key rollover?
Administration tab of the Server document
Other than the IBM Domino Directory, what happens to documents in databases when the Administration Process performs a Rename Person or a Delete Person request?
Names in Readers and Authors fields are updated where the Administration server has been defined and where the server setting "Modifyfields of type Reader or Author" is set.
Carol is using the Assign Policy tool to assign an explicit policy to a selected group and chooses the options to allow replacement of policies and to apply policies in the Policy document. What is the result of this action?
This migrates existing explicit policy assignments to a dynamic policy assignment for the group members and removes any explicit policyassignments from their Person document.
Where is the display name portion of a sender's SMTP e-mail address set?
This is assigned by the "RFC822 phrase handling" setting on the Configuration Settings document of the server.
What is a credential store?
The credential store is a secure repository for document encryption keys and other tokens necessary for Notes client users to grant access toapplications that use the OAuth protocol.
In addition to having permission to create databases and templates access to the server on which she will create the ID vault, what permission must Emma, the IBM Domino administrator, have in order to create an ID vault?
Editor access to the Domino Directory
Kim is configuring key rollover settings for users in the organization. She has already specified the existing key strength and age that will trigger a user key rollover. What is another trigger Kim can set to initiate user key rollover?
The creation date of the existing key.
What task has to be running in order to be able to register users using the CA process?
An administrator would like to secure internet passwords in his IBM Domino environment. Which feature can the administrator implement to secure access to internet passwords stored in the Domino Directory?
Use the more secure internet password format.
Adam has a report from an end user concerning his private folders. Adam has determined that the server has become unavailable and the end user was accessing the failover server. Which statement is true regarding private folders?
Private folders do replicate to other replicas within the cluster.
What does the Protected Groups feature allow?
Protects specified groups from being accidentally deleted.
Jeff is a developer and would like to sign an XPage to run on an IBM Domino server. What is the lowest level of access privilege he needs in order for the XPage to run?
Sign agents or XPages to run on behalf of the invoker of the agent.
What is the highest level of bit encryption that IBM Domino can generate SSL certificate requests in?
How can the multi-user migration assistant be configured?
modifying the MUMigrationAssistant.ini
What two statements are true about the ID recovery process? (Choose two.)
Can be used to recover user ID files.
ID recovery administrators do not have to be IBM Domino administrators.
Following the recertifying of a user, which server process handles the renaming of entries of Readers and Authors fields in documents?
What is a requirement for implementing the IBM Notes password expiration of Notes users?
Password checking must be enabled on the IBM Domino server.
James has been asked to configure a desktop policy in a new Domino environment. When the server is first installed, what should James expect to see before he starts configuring any of the policies?
All settings are set to their default configuration.
Trisha has created an ID vault on one of the servers that is not the IBM Domino Directory Administration server. Why is she unable to see the Vault document and other vault-related documents in the Domino Directory?
Those documents will not be added to the Domino Directory until they have replicated from the Domino Directory Administration server.
Which feature allows an administrator to enable desktop settings based on a version and type of operating system?
Machine-specific policy settings
The action component of an SMTP mail rule instructs the server to 'change routing state'. If triggered, what will happen?
The e-mail is held within the mail.box, pending further action by the administrator.
Alex would like to configure a new Mail Policy. How would a Mail policy settings document help him?
A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Mail, Calendaring andScheduling.
What is the easiest method to disable read return receipts for all incoming emails on a server?
Disable the "Return receipts" option in the Configuration Settings document of the server.
What is a requirement to be able to utilize file server roaming on users' machines?
Only the IBM Notes Standard client is supported.
Janie is an IBM iNotes user and her mail file has an imported copy of her IBM Notes ID. The administrator has completed a request to change the name on her Notes ID. What will Janie need to do to in order to use the new name?
Janie can either decrypt an encrypted message, or send an encrypted message to complete the rename process.
How does the Protected Groups feature work?
The defined group(s) cannot be accidentally deleted from the IBM Domino Directory.
When replacing a database design, what does the "Hide formulas and LotusScript" option do?
Hides the design of all elements from the user.
What is used to determine the level of access users and servers have to a database?
Access Control List