Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "190-722" Exam

IBM Lotus Notes Domino 7 Managing Servers and Users

 Question 1.
Smart Upgrade failover utilizes what search order?

A. By document link in the Notes client
B. By server name and hard-coded path to the Smart Upgrade database
C. By database replica ID and database name in the home server cluster
D. By notes.ini variable on the client listing all servers in the domain the Smart Upgrade database  
    may be found on

Answer: C

Question 2.
When setting up automatic diagnostic collection for clients, you can designate which of the following?

A. Whether this feature should log the fault recovery into the local log.nsf database on the client
B. Whether this feature should export the document into an Excel spreadsheet to categorize the 
    fault
C. Whether this feature is invisible to users or users should be prompted to designate if they want  
    to send a diagnostic report to the mail-in database
D. Whether this feature should create a file that gets automatically uploaded to the Domino HTTP 
     server to allow client reporting from any location over any connection speed

Answer: C

Question 3.
When installing the Notes client, what documents are created by default that contain communication, Java applet security and port information?

A. Account
B. Location
C. Connection
D. Certificate

Answer: B

Question 4.
A Security Policy Settings document controls which of the following?

A. The Notes and Internet passwords
B. None of the above
C. The administration ECL as well as Notes and Internet passwords
D. The administration ECL as well as Internet passwords

Answer: C

Question 5.
Liz wishes to disable transaction logging for a particular database on a server with transaction logging enabled.

However, she cannot see the Advanced Database Properties to do so. What is the cause of this?

A. She is not in the Administrators field on the server document
B. She cannot selectively turn off transaction logging for individual databases
C. She must add the notes.ini line to the server Disable Trans Log=name of database
D. Transaction logging can only be disabled per document, not for an entire database

Answer: A

Question 6.
The AutoSave feature of Domino uses the database with which of the following names?

A. autosave.nsf
B. safecopy.nsf
C. autosave_xx.nsf where xx is the user's initials
D. as_xxxxxxxxxx.nsf where xx is the user's abbreviated name

Answer: D

Question 7.
Which task performs the operation of obtaining diagnostic data after server and client crashes?

A. Fault Analyzer
B. Fault Recovery
C. Event Handler Notification
D. Automatic Diagnostic Collection

Answer: D

Question 8.
The Smart Upgrade function can be configured to adjust an installation between just the Notes client or all clients automatically. 

Where is the parameter read to make this automatic adjustment?

A. The Notes client notes.ini file
B. The Domino server notes.ini file that holds the Smart Upgrade database
C. The server document for the server that holds the Smart Upgrade database
D. The server configuration document for the server that holds the Smart Upgrade database

Answer: A

Question 9.
Cherelle, the Domino administrator, is launching Server Health Monitoring for the first time. What tasks are monitored by default for each server?

A. HTTP, SMTP, Adminp and the Amgr
B. The core server task, HTTP, SMTP and Adminp
C. No tasks until the administrator configures the monitoring for each server
D. All tasks currently running when the Server Health Monitor is first launched

Answer: D

Question 10.
The condensed Directory Catalog is created from which template?

A. dircat.ntf
B. dircat5.ntf
C. dircat7.ntf
D. catalog.ntf

Answer: B

Question 11.
The Calendar Cleanup tool is available in which policy setting document?

A. Archive
B. Desktop
C. Security
D. Registration

Answer: A

Question 12.
What Domino feature must be enabled to monitor the number of active Domino Web Access users?

A. Activity logging
B. Server health reports
C. Domino Domain Monitoring
D. Server monitoring in the Domino Administration client

Answer: A

Question 13.
How often does the Administration Process check to update the Mail Policy for each user?

A. Every hour
B. Every 4 hours
C. Every 12 hours
D. Every 24 hours

Answer: C

Question 14.
Which one of the following best describes how you start the server controller?

A. c:\lotus\domin\nserver.exe -jc
B. c:\lotus\domin\nserver.exe -controller
C. c:\lotus\domin\nserver.exe -java
D. c:\lotus\domin\nserver.exe -jcontroller

Answer: A

Question 15.
Cindy, the Domino administrator, is having issues with numerous mail rules acting sequentially on a message.

What should she do to interrupt the mail rules from being processed?

A. Create a 'stop processing' action in the rules
B. Issue a 'stop processing' command on the server console
C. Issue a 'stop processing' command on the server through a program document
D. Create an agent in mail.box to stop all rule processing after a certain time

Answer: A

Question 16.
DaJuan, the Domino administrator, has made changes to the TCPIP port setting on the server to enable encryption. 

What server console command must he run to have the changes take effect immediately?

A. Port TCPIP -reset
B. Restart port TCPIP
C. Encrypt port TCPIP
D. Port TCPIP -encrypt

Answer: B

Question 17.
What step is required before creating a resources document?

A. A mail document
B. A site document
C. A mail-in database for the resources
D. A hub server running the RnRMgr task

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 2B0-100 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "2B0-100" Exam

ESE Recertification

 Question 1.
The Radius Filter-ID Parameter is used to

A. Authenticate Users
B. Authenticate a Radius Client
C. Pass Policy information to a switch to authorize an authenticate user with a level of network 
    access.
D. Discard traffic destined for a RADIUS server.

Answer:  C

Question 2.
If ingress filtering is enabled on a port, then the switch

A. Discard all tagged frames received on the port.
B. Allow tagged frames received on a port if the port is on the egress list of the VLAN specified in 
    the packets VLAN tag.
B. Discards tagged frames received on a port if the port is on the egress list of the VLAN 
    specified in the packets VLAN tag.
D. Uses tagged frames received on a port to add the port to the egress list of the VLAN specified 
    in the packets VLAN tag.

Answer:  B

Question 3.
What is the default VLAN on all Enterasys switches?

A. 10
B. 4095
C. 0
D. 1

Answer:  D

Question 4. 
To prevent a port on a Matrix N-Series from being automatically added to a VLAN via GVRP, what would you configure the ports VLAN egress setting as?

A. Forbidden
B. Untagged
C. GVRP stop
D. Tagged

Answer:  A

Question 5.
What feature is available that implements CLI-Based switch management and provides an alternative to TELNET for increased switch administration security?

A. MD5 authentication
B. Secure Shell
C. Secure Socket Layer
D. Access Control List

Answer:  B

Question 6.
Which is not an authentication method used by Enterasys switches?

A. IPSEC
B. 802.1X
C. PWA
D. MAC based

Answer:  A

Question 7.
What must you configure on a device before it can be managed with NetSight or Telnet?

A. MAC Address
B. Passwords
C. 802.1X authentication parameters
D. IP address

Answer:  D

Question 8.
The SecureStack family of products?

A. Do not support closed loop stacking
B. Use the shortest path algorithm to forward traffic in between devices within a stack
C. Support internal redundant power supplies
D. Use the same type of redundant power supplies for PoE and non-PoE devices

Answer:  B

Question 9.
How does MAC locking prevent the connection of unauthorized devices to the network?

A. It restricts one or more MAC addresses to a port.
B. It provides a mechanism whereby network administrators can securely authenticate source 
    MAC addresses.
C. It uses a web browser to verify a users MAC address.
D. It does not allow the port to learb an MAC address.

Answer:  A

Question 10.
Which of the following is/are true about Exterasys support for spanning tree protocol?

A. All Enterasys swithces support the basic IEEE 802.1D Spanning
B. Only the Matrix E1 support IEEE 802.1D Spanning Tree by default. 
C. RSTP is the defdault spanning tree on the Matrix N-Series and SecureStack B2
D. Both A & C

Answer:  D



Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.