|
Question 1.
Which one of the following database elements is not updated when the DESIGN task is run?
A. Forms
B. Views
C. Roles
D. Agents
Answer: C
Question 2.
If the Extended Directory Catalog functions as a remote primary Domino Directory used by servers with Configuration Directories, what domain should be specified in Directory Assistance configuration?
A. The domain ibm.com should always be specified
B. The domain of the servers with the Configuration Directories
C. Always input the domain name as a Fully Qualified Domain Name (FQDN)
D. A unique domain name for each Extended Directory Catalog being utilized
Answer: B
Question 3.
A DDM Security probe generates an event when it finds which of the following?
A. An expired certifier for a person
B. A problematic database or server configuration
C. A monitored database has a local copy created by a user
D. An attempted database access by a person or server not authorized
Answer: B
Question 4.
A client wishes to enable stronger encryption for their user id file.
Which of the following are the proper steps to enable this?
A. In User Preferences, change your mail settings to 'local encryption'
B. In User Security, change your name and choose the higher encryption rate
C. In User Security, change your password and choose the higher encryption rate
D. In User Preferences, change your location document to the 'stronger encryption' location
Answer: C
Question 5.
What is the Database Instance ID (DBIID) used for?
A. It ensures that replica IDs aren't duplicates.
B. It identifies design elements within a database.
C. It is used in replication to identify common databases.
D. It matches changes with a specific database for transaction logging.
Answer: D
Question 6.
You have started multiple replicator tasks on the server application1/company.
What is the Domino server console command to have the second replicator task quit?
A. Tell replica quit
B. Tell 2 replica quit
C. Tell replica 2 quit
D. Tell replica quit 2
Answer: A
Question 7.
Jose wants to see the replication topology map of his Notes domain. To see this topology, what must he do?
A. Load the MAPS server task
B. Load the TOPMAP server task
C. Load the MAPTOP server task
D. Load the TOPOLOGY server task
Answer: A
Question 8.
Barbara wishes to migrate her company's Notes certifier to the new Certificate Authority process. She has chosen to encrypt the certifier id with the server id.
What Domino server console command must be issued next?
A. load unlock ca <idfile>
B. load ca <password> unlock
C. tell ca activate <password>
D. tell ca unlock <idfile><password>
Answer: C
Question 9.
Richard wants to issue Internet certificates to his current Notes users. He wants to do this step without having the users submit an Internet certificate request and merge the certificate into the ID file.
What steps must he perform to have the certificates issued and automatically placed into the users' id files?
A. Paste the Internet Certificate into each person record manually
B. Select the action 'Embed new Internet Cert to All' from the Domino Administrator
C. It is not possible to have the certifier automatically inserted into the Notes id files
D. Select the action 'Add Internet Cert to Selected People.' from the Domino Administrator
Answer: D
Question 10.
Lisa, the Domino administrator, has enabled port encryption for the server on the WIFI port.
What server console command can she utilize to have the port encryption take effect immediately?
A. wifi port reset
B. restart port wifi
C. encrypt port wifi
D. port wifi encrypt
Answer: B
Question 11.
By default, all TCP/IP-based services on a Domino server listen for network connections on which NICs and IP addresses?
A. The NIC with the lowest, and only that, IP address
B. The first NIC and all IP addresses assigned to that NIC
C. The first NIC and first IP address assigned to that NIC
D. All NICs and on all configured IP addresses on the server
Answer: D
Question 12
Which one of the following directory structures is supported by Lotus Domino?
A. A central directory structure only
B. A distributed directory structure only
C. A remote and foreign directory structure
D. A distributed or central directory structure
Answer: D
Question 13.
What are the two types of DDM Web probes?
A. Uptime and Failure
B. Logging and Failure
C. Performance and Enabled
D. Best Practices and Configuration
Answer: D
Question 14.
You must create a DDM collection hierarchy to initiate which of the following?
A. Data roll-up
B. Probe initiation
C. Probe interface
D. Data interface
Answer: A
Question 15.
A DDM application probe performs which of the following?
A. Checks Web settings
B. Probes agent schedules
C. Checks server replication
D. Probes database operations
Answer: B
Question 16.
Jose set up Web authentication using primary and secondary directories. Which one of the following describes the order in which he set up directories to be searched?
A. Domino primary directory, then Domino secondary directories. This is the only option available.
B. Domino primary directory, then either Domino or LDAP secondary directories.
The administrator can specify the order of secondary searches.
C. LDAP primary directory, then LDAP secondary directory, and then Domino secondary
directories. This is the order in which secondary searches must be made.
D. Domino primary directory, then Domino secondary directory, and then LDAP secondary
directories. This is the order in which secondary searches must be made.
Answer: B
Question 17.
Domino Domain Monitoring (DDM) contains how many classes of event information?
A. One
B. Two
C. Three
D. Four
Answer: B
Question 18.
Edison, the Domino Administrator, wants to enforce file security on HTML and Image files.
Which one of the following should he do?
A. Enforce ECLs
B. Create File Protection documents
C. Use Protect Directories in the HTTPD.CNF files
D. Domino does not allow security enforcement on HTML and image files
Answer: B
Question 19.
The Domino administrator is attempting to verify that IMAP requests are being processed correctly. Which probe should be created to monitor those types of requests?
A. SMTP Process State
B. POP3 Process State
C. Message access TCP Port Health
D. Message retrieval TCP Port Health
Answer: D
Question 20.
Mike, the Domino administrator, has configured Rooms & Resources across a cluster.
When multiple replicas of the resource database exist in the cluster, where is processing handled if all the servers are available?
A. The user's home server
B. The resource's home server
C. The first cluster server available
D. The server closest to the physical location of the resource
Answer: B
Question 21.
Jemiah has a request from management to stop sending delivery status notifications for failed or delayed messages to sending SMTP hosts.
What must be set to disabled in the server configuration document?
A. HELP command
B. DSN extension
C. Denied command
D. Pipelining extension
Answer: B
Question 22.
There are two methods available for journaling messages. Which of the following describe those two methods?
A. Monthly journaling and hourly journaling
B. Daily journaling and weekly journaling
C. Local journaling and remote journaling
D. Domain journaling and organization journaling
Answer: C
Question 23.
In order to specify connecting hosts to be excluded from blacklist checks, which filter should be utilized?
A. Public spam lists
B. Private blacklists
C. Private white lists
D. Public allow lists
Answer: C
Question 24.
Edward is configuring a custom SMTP error response message for hosts found in DNS blacklists.
What is the variable to include the IP address of the connecting host in the error response message?
A. %b
B. %h
C. %s
D. %t
Answer: C
Question 25.
Chris has enabled Message Tracking for his domain. He has left the field 'Allowed to track messages' blank.
With no entry in this field who is allowed to track messages?
A. No one
B. Administrators
C. Local Domain Servers
D. All users in the domain
Answer: C
Question 26.
The No Spam domain has configured the usage of DNS white lists. If a connecting host is not found in a DNS white list, what is the next step of mail processing?
A. SMTP Amgr filters
B. DNS blacklist filters
C. Private blacklist filters
D. Private white list filters
Answer: B
Question 27.
Private server blacklists are stored in what database?
A. names.nsf
B. blacklist.nsf
C. smtpconf.nsf
D. A Domino administrator defined database
Answer: A
|
Question 1. Of the three mechanisms Check Point uses for controlling traffic, which enables firewalls to incorporate layer 4 awareness in packet inspection? A. IPS B. Packet filtering C. Stateful Inspection D. Application Intelligence Answer: C Explanation: Question 2. Which of the following statements about Bridge mode is TRUE? A. When managing a Security Gateway in Bridge mode, it is possible to use a bridge interface for Network Address Translation. B. Assuming a new installation, bridge mode requires changing the existing IP routing of the network. C. All ClusterXL modes are supported. D. A bridge must be configured with a pair of interfaces. Answer: D Explanation: Question 3. Which SmartConsole component can Administrators use to track remote administrative activities? A. WebUI B. Eventia Reporter C. SmartView Monitor D. SmartView Tracker Answer: D Explanation: Question 4. Which of the following statements is TRUE about management plug-ins? A. The plug-in is a package installed on the Security Gateway. B. A management plug-in interacts with a Security Management Server to provide new features and support for new products. C. Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in. D. Installing a management plug-in is just like an upgrade process. (It overwrites existing components.) Answer: B Explanation: Question 5. UDP packets are delivered if they are _________. A. A legal response to an allowed request on the inverse UDP ports and IP B. A Stateful ACK to a valid SYN-SYN-/ACK on the inverse UDP ports and IP C. Reference in the SAM related Dynamic tables D. Bypassing the Kernel by the “forwarding layer” of clusterXL Answer: A Explanation: Question 6. The Check Point Security Gateway's virtual machine (kernel) exists between which two layers of the OSI model? A. Session and Network layers B. Application and Presentation layers C. Physical and Datalink layers D. Network and Datalink layers Answer: D Explanation: Question 7. The customer has a small Check Point installation, which includes one Linux Enterprise 3.0 server working as the SmartConsole, and a second server running Windows 2003 as both Security Management Server running Windows 2003 as both Security Management Server and Security Gateway. This is an example of a(n). A. Stand-Alone Installation B. Distributed Installation C. Hybrid Installation D. Unsupported configuration Answer: D Explanation: Question 8. The customer has a small Check Point installation which includes one Windows 2003 server as the SmartConsole and a second server running SecurePlatform as both Security Management Server and the Security Gateway. This is an example of a(n): A. Unsupported configuration. B. Hybrid Installation. C. Distributed Installation. D. Stand-Alone Installation. Answer: D Explanation: Question 9. The customer has a small Check Point installation which includes one Windows XP workstation as the SmartConsole, one Solaris server working as Security Management Server, and a third server running SecurePlatform as Security Gateway. This is an example of a(n): A. Stand-Alone Installation. B. Unsupported configuration C. Distributed Installation. D. Hybrid Installation. Answer: C Explanation: Question 10. The customer has a small Check Point installation which includes one Windows 2003 server as SmartConsole and Security Management Server with a second server running SecurePlatform as Security Gateway. This is an example of a(n): A. Hybrid Installation. B. Unsupported configuration. C. Distributed Installation. D. Stand-Alone Installation. Answer: C Explanation:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.