What encryption standard has been introduced in IBM Domino 9.0 Social Edition?
A. Secure Hash Algorithm (SHA-2)
B. Wired Equivalent Privacy (WEP)
C. Advanced Encryption Standard (AES)
D. Federal Information Processing Standard (FIPS)
What is used to determine the level of access users and servers have to a database?
A. Policy settings
B. Server document
C. Access Control List
D. Execution Control List
Charles is the ID Vault administrator. What role in the ID Vault database would allow Charles to extract ID files and gain access to users' encrypted data?
A. [Auditor]
B. [User Access]
C. [Password reset]
D. [Vault Administrator]
The administrator has been asked to move a user's mail file because the user has moved to a different office. When the mail file is moved, the Administration Process first moves it to the new server, then issues a request to delete the old mail file from its original mail server. Which statement defines what must be performed to complete the deletion process?
A. The administrator must approve this mail file deletion.
B. The mail file owner must approve the old mail file deletion.
C. The mail file owner must accept the changes when prompted.
D. The administrator must notify the mail file owner to accept the deletion.
Cindy would like to create an additional policy for laptop users, but this policy will only have a few differences from the parent policy. In what way could she do this that would ensure she would only have to make a few changes?
A. She can create a new policy with all new policy and settings documents.
B. She can create a new policy with all new policy documents, and copy and paste values from a parent setting.
C. She can use policy inheritance to inherit values from a parent policy and change only the items she wishes in the child.
D. She can create a new policy with a new policy document, reuse existing settings document, and create new settings for changes.
A failover occurs when a user tries to open a database that is unavailable. The Cluster Manager looks in the Cluster Database Directory for a replica of the database. To find the replica, the Cluster Manager looks for a database that has the same replica ID as the original database. What are two properties that are also checked for before using the replica? (Choose two.)
A. Out of service
B. File is Corrupt
C. Pending delete
D. File is locked for Archive
E. Temporarily disable replication
What is the correct way to create the credential store application?
A. Use Keymgmt commands.
B. Use Cstoremgmt commands.
C. Create the application manually using the credstore.ntf template.
D. Create the application manually using the websecuritystore.ntf template.
What security feature protects user workstations against active content from unknown or suspect sources?
A. policies
B. Access Control List
C. notes.ini parameters
D. Execution Control List
An administrator can move a mail database archive when he moves a mail database to another server. Which statement defines when the archive database can be moved with the user's mail file?
A. if the archive is located in the same path as the mail file
B. if the archive is located on the same server as the mail file
C. if the archive is located on the same domain as the mail file
D. if the archive file is not larger than the defined mail quota size
Which feature allows an administrator to dynamically update group members based on their home mail server?
A. Dynamic policy
B. Directory catalog
C. Address book sync
D. Auto-populated group