Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "190-721" Exam

Passed today with an 875

 

Question 1.
Which one of the following database elements is not updated when the DESIGN task is run?

A. Forms
B. Views
C. Roles
D. Agents

Answer: C

Question 2.
If the Extended Directory Catalog functions as a remote primary Domino Directory used by servers with Configuration Directories, what domain should be specified in Directory Assistance configuration?

A. The domain ibm.com should always be specified
B. The domain of the servers with the Configuration Directories
C. Always input the domain name as a Fully Qualified Domain Name (FQDN)
D. A unique domain name for each Extended Directory Catalog being utilized

Answer: B

Question 3.
A DDM Security probe generates an event when it finds which of the following?

A. An expired certifier for a person
B. A problematic database or server configuration
C. A monitored database has a local copy created by a user
D. An attempted database access by a person or server not authorized

Answer: B

Question 4.
A client wishes to enable stronger encryption for their user id file.

Which of the following are the proper steps to enable this?

A. In User Preferences, change your mail settings to 'local encryption'
B. In User Security, change your name and choose the higher encryption rate
C. In User Security, change your password and choose the higher encryption rate
D. In User Preferences, change your location document to the 'stronger encryption' location

Answer: C

Question 5.
What is the Database Instance ID (DBIID) used for?

A. It ensures that replica IDs aren't duplicates.
B. It identifies design elements within a database.
C. It is used in replication to identify common databases.
D. It matches changes with a specific database for transaction logging.

Answer: D

Question 6.
You have started multiple replicator tasks on the server application1/company.

What is the Domino server console command to have the second replicator task quit?

A. Tell replica quit
B. Tell 2 replica quit
C. Tell replica 2 quit
D. Tell replica quit 2

Answer: A

Question 7.
Jose wants to see the replication topology map of his Notes domain. To see this topology, what must he do?

A. Load the MAPS server task
B. Load the TOPMAP server task
C. Load the MAPTOP server task
D. Load the TOPOLOGY server task

Answer: A

Question 8.
Barbara wishes to migrate her company's Notes certifier to the new Certificate Authority process. She has chosen to encrypt the certifier id with the server id.

What Domino server console command must be issued next?

A. load unlock ca <idfile>
B. load ca <password> unlock
C. tell ca activate <password>
D. tell ca unlock <idfile><password>

Answer: C

Question 9.
Richard wants to issue Internet certificates to his current Notes users. He wants to do this step without having the users submit an Internet certificate request and merge the certificate into the ID file.

What steps must he perform to have the certificates issued and automatically placed into the users' id files?

A. Paste the Internet Certificate into each person record manually
B. Select the action 'Embed new Internet Cert to All' from the Domino Administrator
C. It is not possible to have the certifier automatically inserted into the Notes id files
D. Select the action 'Add Internet Cert to Selected People.' from the Domino Administrator

Answer: D

Question 10.
Lisa, the Domino administrator, has enabled port encryption for the server on the WIFI port.

What server console command can she utilize to have the port encryption take effect immediately?

A. wifi port reset
B. restart port wifi
C. encrypt port wifi
D. port wifi encrypt

Answer: B

Question 11.
By default, all TCP/IP-based services on a Domino server listen for network connections on which NICs and IP addresses?

A. The NIC with the lowest, and only that, IP address
B. The first NIC and all IP addresses assigned to that NIC
C. The first NIC and first IP address assigned to that NIC
D. All NICs and on all configured IP addresses on the server

Answer: D

Question 12
Which one of the following directory structures is supported by Lotus Domino?

A. A central directory structure only
B. A distributed directory structure only
C. A remote and foreign directory structure
D. A distributed or central directory structure

Answer: D

Question 13.
What are the two types of DDM Web probes?

A. Uptime and Failure
B. Logging and Failure
C. Performance and Enabled
D. Best Practices and Configuration

Answer: D

Question 14.
You must create a DDM collection hierarchy to initiate which of the following?

A. Data roll-up
B. Probe initiation
C. Probe interface
D. Data interface

Answer: A

Question 15.
A DDM application probe performs which of the following?

A. Checks Web settings
B. Probes agent schedules
C. Checks server replication
D. Probes database operations

Answer: B

Question 16.
Jose set up Web authentication using primary and secondary directories. Which one of the following describes the order in which he set up directories to be searched?

A. Domino primary directory, then Domino secondary directories. This is the only option available.
B. Domino primary directory, then either Domino or LDAP secondary directories.
The administrator can specify the order of secondary searches.
C. LDAP primary directory, then LDAP secondary directory, and then Domino secondary
directories. This is the order in which secondary searches must be made.
D. Domino primary directory, then Domino secondary directory, and then LDAP secondary
directories. This is the order in which secondary searches must be made.

Answer: B

Question 17.
Domino Domain Monitoring (DDM) contains how many classes of event information?

A. One
B. Two
C. Three
D. Four

Answer: B

Question 18.
Edison, the Domino Administrator, wants to enforce file security on HTML and Image files.

Which one of the following should he do?

A. Enforce ECLs
B. Create File Protection documents
C. Use Protect Directories in the HTTPD.CNF files
D. Domino does not allow security enforcement on HTML and image files

Answer: B

Question 19.
The Domino administrator is attempting to verify that IMAP requests are being processed correctly. Which probe should be created to monitor those types of requests?

A. SMTP Process State
B. POP3 Process State
C. Message access TCP Port Health
D. Message retrieval TCP Port Health

Answer: D

Question 20.
Mike, the Domino administrator, has configured Rooms & Resources across a cluster.

When multiple replicas of the resource database exist in the cluster, where is processing handled if all the servers are available?

A. The user's home server
B. The resource's home server
C. The first cluster server available
D. The server closest to the physical location of the resource

Answer: B

Question 21.
Jemiah has a request from management to stop sending delivery status notifications for failed or delayed messages to sending SMTP hosts.

What must be set to disabled in the server configuration document?

A. HELP command
B. DSN extension
C. Denied command
D. Pipelining extension

Answer: B

Question 22.
There are two methods available for journaling messages. Which of the following describe those two methods?

A. Monthly journaling and hourly journaling
B. Daily journaling and weekly journaling
C. Local journaling and remote journaling
D. Domain journaling and organization journaling

Answer: C

Question 23.
In order to specify connecting hosts to be excluded from blacklist checks, which filter should be utilized?

A. Public spam lists
B. Private blacklists
C. Private white lists
D. Public allow lists

Answer: C

Question 24.
Edward is configuring a custom SMTP error response message for hosts found in DNS blacklists.

What is the variable to include the IP address of the connecting host in the error response message?

A. %b
B. %h
C. %s
D. %t

Answer: C

Question 25.
Chris has enabled Message Tracking for his domain. He has left the field 'Allowed to track messages' blank.

With no entry in this field who is allowed to track messages?

A. No one
B. Administrators
C. Local Domain Servers
D. All users in the domain

Answer: C

Question 26.
The No Spam domain has configured the usage of DNS white lists. If a connecting host is not found in a DNS white list, what is the next step of mail processing?

A. SMTP Amgr filters
B. DNS blacklist filters
C. Private blacklist filters
D. Private white list filters

Answer: B

Question 27.
Private server blacklists are stored in what database?

A. names.nsf
B. blacklist.nsf
C. smtpconf.nsf
D. A Domino administrator defined database

Answer: A
 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 156-215.75 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "156-215.75" Exam

Certified Security Administrator R75

 Question 1.
Of the three mechanisms Check Point uses for controlling traffic, which enables firewalls to incorporate layer 4 awareness in packet inspection?

A. IPS
B. Packet filtering
C. Stateful Inspection
D. Application Intelligence

Answer: C

Explanation: 

Question 2.
Which of the following statements about Bridge mode is TRUE?

A. When managing a Security Gateway in Bridge mode, it is possible to use a bridge interface for 
    Network Address Translation.
B. Assuming a new installation, bridge mode requires changing the existing IP routing of the 
    network.
C. All ClusterXL modes are supported.
D. A bridge must be configured with a pair of interfaces.

Answer: D

Explanation: 

Question 3.
Which SmartConsole component can Administrators use to track remote administrative activities?

A. WebUI
B. Eventia Reporter
C. SmartView Monitor
D. SmartView Tracker

Answer: D

Explanation: 

Question 4.
Which of the following statements is TRUE about management plug-ins?

A. The plug-in is a package installed on the Security Gateway.
B. A management plug-in interacts with a Security Management Server to provide new features 
    and support for new products.
C. Using a plug-in offers full central management only if special licensing is applied to specific 
    features of the plug-in.
D. Installing a management plug-in is just like an upgrade process. (It overwrites existing  
    components.)

Answer: B

Explanation: 

Question 5.
UDP packets are delivered if they are _________.

A. A legal response to an allowed request on the inverse UDP ports and IP
B. A Stateful ACK to a valid SYN-SYN-/ACK on the inverse UDP ports and IP
C. Reference in the SAM related Dynamic tables
D. Bypassing the Kernel by the “forwarding layer” of clusterXL

Answer: A

Explanation: 

Question 6.
The Check Point Security Gateway's virtual machine (kernel) exists between which two layers of the OSI model?

A. Session and Network layers
B. Application and Presentation layers
C. Physical and Datalink layers
D. Network and Datalink layers

Answer: D

Explanation: 

Question 7.
The customer has a small Check Point installation, which includes one Linux Enterprise 3.0 server working as the SmartConsole, and a second server running Windows 2003 as both Security Management Server running Windows 2003 as both Security Management Server and Security Gateway. This is an example of a(n).

A. Stand-Alone Installation
B. Distributed Installation
C. Hybrid Installation
D. Unsupported configuration

Answer: D

Explanation: 

Question 8.
The customer has a small Check Point installation which includes one Windows 2003 server as the SmartConsole and a second server running SecurePlatform as both Security Management Server and the Security Gateway. This is an example of a(n):

A. Unsupported configuration.
B. Hybrid Installation.
C. Distributed Installation.
D. Stand-Alone Installation.

Answer: D

Explanation: 

Question 9.
The customer has a small Check Point installation which includes one Windows XP workstation as the SmartConsole, one Solaris server working as Security Management Server, and a third server running SecurePlatform as Security Gateway. This is an example of a(n):

A. Stand-Alone Installation.
B. Unsupported configuration
C. Distributed Installation.
D. Hybrid Installation.

Answer: C

Explanation: 

Question 10.
The customer has a small Check Point installation which includes one Windows 2003 server as SmartConsole and Security Management Server with a second server running SecurePlatform as Security Gateway. This is an example of a(n):

A. Hybrid Installation.
B. Unsupported configuration.
C. Distributed Installation.
D. Stand-Alone Installation.

Answer: C

Explanation: 


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.