What is used to determine the level of access users and servers have to a database?
A. Policy settings
B. Server document
C. Access Control List
D. Execution Control List
What it meant by anti-relay protection?
A. The methods used to restrict what hosts can connect to an IBM Domino server for replication.
B. The methods used to restrict what hosts can be accessed via a Domino passthru server.
C. The methods used to restrict how many external e-mails a user can send through a Domino server.
D. The methods used to prevent unauthorized use of the Domino SMTP server for external messaging.
For legal reasons, the IBM Domino system administrator has been asked to retain a secure copy of all e-mails transferred in and out of the company. What Domino technology would be best suited to fulfill this request?
A. SMTP rules
B. Mail journaling
C. User mail rules applied via a Mail Settings Policy document
D. This cannot be done without modifications to the mail template using Domino Designer.
Can an administrator assign a policy to a user by editing his person document?
A. no
B. yes, only explicit policies
C. yes, only organizational policies
D. yes, both organizational and explicit policies
Pedro wants to register 130 new users on the IBM Domino server. Juan has recommended that he should create a User Registration policy. Which statement given by Juan is true with regard to creating a User Registration policy?
A. A User Registration policy will significantly increase the time Pedro spends registering new users.
B. A User Registration policy limits Pedro to only four common options in order to get a new user registered.
C. A User Registration policy will not allow Pedro to set common options to be used while registering a new user within Domino.
D. A User Registration policy will allow Pedro to standardize common options across new users such as internet domain and email address format.
John created a dynamic policy that will be applied to a group of top executives in the organization. How can John ensure that settings from other assigned dynamic policies do not conflict with this policy?
A. Select the "Enforce in child policies" option for the pertinent fields.
B. Deselect the "Inherit from parent policy" option for the pertinent fields.
C. Increase the precedence for this dynamic policy to a value higher than any other.
D. Delete the other assigned dynamic policies from each member's Person document.
Unread marks can be replicated for selected databases. How would the IBM Domino Administrator set this option?
A. Unread marks are on by default in all databases.
B. By selecting the "Include Unread Marks" option in the Create New Replica dialog box.
C. Open the Replication Options for the selected database and select the "Replicate Unread Marks" option.
D. By using the Advanced Database Properties from the Domino Administrator or from the Database Properties box.
Victoria has forgotten the password for her IBM Notes ID. What is the process she can follow to recover her ID from a backup using ID recovery?
A. Use the Notes installation executable to apply the new ID and password obtained from the administrator.
B. Contact an administrator to get a new copy of her ID, requesting what the new password should be set to.
C. Get the recovery passwords from the administrators, select Recover Password in Notes, enter the recovery passwords, and create a new password for her ID.
D. Open Notes, select Recover Password, wait for a message to be sent to her mobile phone, enter the security code from the text message, and create a new password for her ID.
Which two statements are true regarding IBM Notes and Internet certificates? (Choose two.)
A. A user can have only one Notes certificate.
B. A user can have multiple Notes certificates.
C. A user can have only one Internet certificate.
D. A user can have multiple Internet certificates.
E. A user can have only two Internet certificates: one for signing mail and one for encrypting mail.
What is the difference between IBM Domino certificates and Internet certificates?
A. There is no difference and the term is interchangeable.
B. Domino certificates are used to secure e-mail, and Internet certificates are used to secure web browsing.
C. Domino certificates can only be used within the Domino environment, and Internet certificates are used to secure SSL links.
D. Domino certificates are used to secure SSL links between Domino and IBM Notes clients, and Internet certificates are used to secure SSL links between Domino and IBM iNotes clients.