|
Question 1. Which one of the following database elements is not updated when the DESIGN task is run? A. Forms B. Views C. Roles D. Agents Answer: C Question 2. If the Extended Directory Catalog functions as a remote primary Domino Directory used by servers with Configuration Directories, what domain should be specified in Directory Assistance configuration? A. The domain ibm.com should always be specified B. The domain of the servers with the Configuration Directories C. Always input the domain name as a Fully Qualified Domain Name (FQDN) D. A unique domain name for each Extended Directory Catalog being utilized Answer: B Question 3. A DDM Security probe generates an event when it finds which of the following? A. An expired certifier for a person B. A problematic database or server configuration C. A monitored database has a local copy created by a user D. An attempted database access by a person or server not authorized Answer: B Question 4. Which option will prevent someone from using the ID on Hedi's stolen laptop? A. Change the password on a copy of the ID file B. Set a parameter to compare public keys against her public key stored in the Domino Directory C. Select the parameter check passwords on Notes IDs D. Reset the ID to hold multiple passwords, all of which must be entered Answer: C Question 5. What is the Database Instance ID (DBIID) used for? A. It ensures that replica IDs aren't duplicates. B. It identifies design elements within a database. C. It is used in replication to identify common databases. D. It matches changes with a specific database for transaction logging. Answer: D Question 6. You have started multiple replicator tasks on the server application1/company. What is the Domino server console command to have the second replicator task quit? A. Tell replica quit B. Tell 2 replica quit C. Tell replica 2 quit D. Tell replica quit 2 Answer: A Question 7. Jose wants to see the replication topology map of his Notes domain. To see this topology, what must he do? A. Load the MAPS server task B. Load the TOPMAP server task C. Load the MAPTOP server task D. Load the TOPOLOGY server task Answer: A Question 8. Barbara wishes to migrate her company's Notes certifier to the new Certificate Authority process. She has chosen to encrypt the certifier id with the server id. What Domino server console command must be issued next? A. load unlock caB. load ca unlock C. tell ca activate D. tell ca unlock Answer: C Question 9. Richard wants to issue Internet certificates to his current Notes users. He wants to do this step without having the users submit an Internet certificate request and merge the certificate into the ID file. What steps must he perform to have the certificates issued and automatically placed into the users' id files? A. Paste the Internet Certificate into each person record manually B. Select the action 'Embed new Internet Cert to All' from the Domino Administrator C. It is not possible to have the certifier automatically inserted into the Notes id files D. Select the action 'Add Internet Cert to Selected People.' from the Domino Administrator Answer: D Question 10. Lisa, the Domino administrator, has enabled port encryption for the server on the WIFI port. What server console command can she utilize to have the port encryption take effect immediately? A. wifi port reset B. restart port wifi C. encrypt port wifi D. port wifi encrypt Answer: B Question 11. By default, all TCP/IP-based services on a Domino server listen for network connections on which NICs and IP addresses? A. The NIC with the lowest, and only that, IP address B. The first NIC and all IP addresses assigned to that NIC C. The first NIC and first IP address assigned to that NIC D. All NICs and on all configured IP addresses on the server Answer: D Question 12 Which one of the following directory structures is supported by Lotus Domino? A. A central directory structure only B. A distributed directory structure only C. A remote and foreign directory structure D. A distributed or central directory structure Answer: D Question 13. Cluadia wants her Notes application HR.NSF to be accessed by both the Notes client and Web clients. What task must be running on the Domino server for Web clients to access HR.NSF? A. DIIOP B. WEB C. HTTP D. HTML Answer: C Question 14. You must create a DDM collection hierarchy to initiate which of the following? A. Data roll-up B. Probe initiation C. Probe interface D. Data interface Answer: A Question 15. A DDM application probe performs which of the following? A. Checks Web settings B. Probes agent schedules C. Checks server replication D. Probes database operations Answer: B Question 16. Jose set up Web authentication using primary and secondary directories. Which one of the following describes the order in which he set up directories to be searched? A. Domino primary directory, then Domino secondary directories. This is the only option available. B. Domino primary directory, then either Domino or LDAP secondary directories. The administrator can specify the order of secondary searches. C. LDAP primary directory, then LDAP secondary directory, and then Domino secondary directories. This is the order in which secondary searches must be made. D. Domino primary directory, then Domino secondary directory, and then LDAP secondary directories. This is the order in which secondary searches must be made. Answer: B Question 17. Domino Domain Monitoring (DDM) contains how many classes of event information? A. One B. Two C. Three D. Four Answer: B Question 18. Edison, the Domino Administrator, wants to enforce file security on HTML and Image files. Which one of the following should he do? A. Enforce ECLs B. Create File Protection documents C. Use Protect Directories in the HTTPD.CNF files D. Domino does not allow security enforcement on HTML and image files Answer: B Question 19. The Domino administrator is attempting to verify that IMAP requests are being processed correctly. Which probe should be created to monitor those types of requests? A. SMTP Process State B. POP3 Process State C. Message access TCP Port Health D. Message retrieval TCP Port Health Answer: D Question 20. Mike, the Domino administrator, has configured Rooms & Resources across a cluster. When multiple replicas of the resource database exist in the cluster, where is processing handled if all the servers are available? A. The user's home server B. The resource's home server C. The first cluster server available D. The server closest to the physical location of the resource Answer: B Question 21. Jemiah has a request from management to stop sending delivery status notifications for failed or delayed messages to sending SMTP hosts. What must be set to disabled in the server configuration document? A. HELP command B. DSN extension C. Denied command D. Pipelining extension Answer: B Question 22. There are two methods available for journaling messages. Which of the following describe those two methods? A. Monthly journaling and hourly journaling B. Daily journaling and weekly journaling C. Local journaling and remote journaling D. Domain journaling and organization journaling Answer: C
|
Question 1. Which SAS Management Console definitions are required on the source and target servers for replication and promotion? A. Source: SAS Metadata Server, SAS Workspace Server, Target: SAS Metadata Server, SAS\CONNECT Server, IOM Spawner B. Source: SAS Metadata Server, SAS\CONNECT Server Target: SAS Metadata Server, SAS Workspace Server, IOM Spawner C. Source: SAS Metadata Server, SAS Workspace Server, IOM Spawner Target: SAS Metadata Server, SAS\CONNECT Server D. Source: SAS Metadata Server, SAS\CONNECT Server, IOM Spawner Target: SAS Metadata Server, SAS Workspace Server Answer: C Question 2. How can custom transformation objects be integrated into the Process Library within SAS ETL Studio? A. implement as Java plug-ins or SAS code transformation templates B. implement as macro calls within a user exit C. implement as Java plug-ins only D. implement as SAS code transformation templates or macro calls within a user exit Answer: A Question 3. In SAS ETL Studio, what is stored as a metadata identity? A. a user or a group of users of the metadata environment B. a list of the warehouse server names and port numbers C. the libraries containing the data in the warehouse D. the location of the SAS Metadata Server Answer: A Question 4. In SAS ETL Studio, which alert actions can be selected from the Status Handling tab as a property of the job? I.Send email. II.Abort the process. III.Send the entry to a dataset. IV.Call a macro from a SAS Autocall Library. A. I, II, III and IV B. I and II only C. III and IV only D. I, II and III only Answer: A Question 5. In SAS ETL Studio, what does a Transformation Template contain? A. a transformation object and one or more drop zones for tables and/or transformations B. sources and/or targets C. the process flow diagram for a job D. a transformation object and the process flow diagram for a job Answer: A Question 6. Which wizards are used by SAS ETL Studio to define and load star schemas in a data warehouse? A. Metadata Designer and Source Designer B. Source Designer and Process Designer C. Target Designer and Metadata Designer D. Target Designer and Process Designer Answer: D Question 7. What happens when a job is deployed for scheduling in SAS ETL Studio? A. The job appears in the Flow Manager as ready for scheduling. B. The source code is generated and saved as a SAS program. C. The Job Dependencies window opens to allow user input. D. A scheduler system receives information on when to run the job. Answer: B Question 8. In SAS ETL Studio, which action generates and stores code to a file, which allows the job to be included in a job flow in SAS Management Console? A. Register to Metadata B. Publish to Deployment Directory C. Export Job to File D. Deploy for Scheduling Answer: D Question 9. Click the Exhibit button to view a table that was created as a result of performing an Integration action from within dfPower Studio. What is represented by the column labeled "???" in the exhibit? A. Match Code B. Name Encryption C. Merge Identifier D. Cluster Group Answer: A Question 10. When using SAS ETL Studio to import metadata with a MITI model bridge plug-in, which metadata are captured from the model file in addition to column type and column length? I.keys II.integrity constraints III.schema information IV.connection information A. II and IV only B. I, II and III C. I and III only D. II, III and IV Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.