|
Question 1. Smart Upgrade failover utilizes what search order? A. By document link in the Notes client B. By server name and hard-coded path to the Smart Upgrade database C. By database replica ID and database name in the home server cluster D. By notes.ini variable on the client listing all servers in the domain the Smart Upgrade database may be found on Answer: C Question 2. When setting up automatic diagnostic collection for clients, you can designate which of the following? A. Whether this feature should log the fault recovery into the local log.nsf database on the client B. Whether this feature should export the document into an Excel spreadsheet to categorize the fault C. Whether this feature is invisible to users or users should be prompted to designate if they want to send a diagnostic report to the mail-in database D. Whether this feature should create a file that gets automatically uploaded to the Domino HTTP server to allow client reporting from any location over any connection speed Answer: C Question 3. When installing the Notes client, what documents are created by default that contain communication, Java applet security and port information? A. Account B. Location C. Connection D. Certificate Answer: B Question 4. A Security Policy Settings document controls which of the following? A. The Notes and Internet passwords B. None of the above C. The administration ECL as well as Notes and Internet passwords D. The administration ECL as well as Internet passwords Answer: C Question 5. Liz wishes to disable transaction logging for a particular database on a server with transaction logging enabled. However, she cannot see the Advanced Database Properties to do so. What is the cause of this? A. She is not in the Administrators field on the server document B. She cannot selectively turn off transaction logging for individual databases C. She must add the notes.ini line to the server Disable Trans Log=name of database D. Transaction logging can only be disabled per document, not for an entire database Answer: A Question 6. The AutoSave feature of Domino uses the database with which of the following names? A. autosave.nsf B. safecopy.nsf C. autosave_xx.nsf where xx is the user's initials D. as_xxxxxxxxxx.nsf where xx is the user's abbreviated name Answer: D Question 7. Which task performs the operation of obtaining diagnostic data after server and client crashes? A. Fault Analyzer B. Fault Recovery C. Event Handler Notification D. Automatic Diagnostic Collection Answer: D Question 8. The Smart Upgrade function can be configured to adjust an installation between just the Notes client or all clients automatically. Where is the parameter read to make this automatic adjustment? A. The Notes client notes.ini file B. The Domino server notes.ini file that holds the Smart Upgrade database C. The server document for the server that holds the Smart Upgrade database D. The server configuration document for the server that holds the Smart Upgrade database Answer: A Question 9. Cherelle, the Domino administrator, is launching Server Health Monitoring for the first time. What tasks are monitored by default for each server? A. HTTP, SMTP, Adminp and the Amgr B. The core server task, HTTP, SMTP and Adminp C. No tasks until the administrator configures the monitoring for each server D. All tasks currently running when the Server Health Monitor is first launched Answer: D Question 10. The condensed Directory Catalog is created from which template? A. dircat.ntf B. dircat5.ntf C. dircat7.ntf D. catalog.ntf Answer: B Question 11. The Calendar Cleanup tool is available in which policy setting document? A. Archive B. Desktop C. Security D. Registration Answer: A Question 12. What Domino feature must be enabled to monitor the number of active Domino Web Access users? A. Activity logging B. Server health reports C. Domino Domain Monitoring D. Server monitoring in the Domino Administration client Answer: A Question 13. How often does the Administration Process check to update the Mail Policy for each user? A. Every hour B. Every 4 hours C. Every 12 hours D. Every 24 hours Answer: C Question 14. Which one of the following best describes how you start the server controller? A. c:\lotus\domin\nserver.exe -jc B. c:\lotus\domin\nserver.exe -controller C. c:\lotus\domin\nserver.exe -java D. c:\lotus\domin\nserver.exe -jcontroller Answer: A Question 15. Cindy, the Domino administrator, is having issues with numerous mail rules acting sequentially on a message. What should she do to interrupt the mail rules from being processed? A. Create a 'stop processing' action in the rules B. Issue a 'stop processing' command on the server console C. Issue a 'stop processing' command on the server through a program document D. Create an agent in mail.box to stop all rule processing after a certain time Answer: A Question 16. DaJuan, the Domino administrator, has made changes to the TCPIP port setting on the server to enable encryption. What server console command must he run to have the changes take effect immediately? A. Port TCPIP -reset B. Restart port TCPIP C. Encrypt port TCPIP D. Port TCPIP -encrypt Answer: B Question 17. What step is required before creating a resources document? A. A mail document B. A site document C. A mail-in database for the resources D. A hub server running the RnRMgr task Answer: B
|
Question 1. The Radius Filter-ID Parameter is used to A. Authenticate Users B. Authenticate a Radius Client C. Pass Policy information to a switch to authorize an authenticate user with a level of network access. D. Discard traffic destined for a RADIUS server. Answer: C Question 2. If ingress filtering is enabled on a port, then the switch A. Discard all tagged frames received on the port. B. Allow tagged frames received on a port if the port is on the egress list of the VLAN specified in the packets VLAN tag. B. Discards tagged frames received on a port if the port is on the egress list of the VLAN specified in the packets VLAN tag. D. Uses tagged frames received on a port to add the port to the egress list of the VLAN specified in the packets VLAN tag. Answer: B Question 3. What is the default VLAN on all Enterasys switches? A. 10 B. 4095 C. 0 D. 1 Answer: D Question 4. To prevent a port on a Matrix N-Series from being automatically added to a VLAN via GVRP, what would you configure the ports VLAN egress setting as? A. Forbidden B. Untagged C. GVRP stop D. Tagged Answer: A Question 5. What feature is available that implements CLI-Based switch management and provides an alternative to TELNET for increased switch administration security? A. MD5 authentication B. Secure Shell C. Secure Socket Layer D. Access Control List Answer: B Question 6. Which is not an authentication method used by Enterasys switches? A. IPSEC B. 802.1X C. PWA D. MAC based Answer: A Question 7. What must you configure on a device before it can be managed with NetSight or Telnet? A. MAC Address B. Passwords C. 802.1X authentication parameters D. IP address Answer: D Question 8. The SecureStack family of products? A. Do not support closed loop stacking B. Use the shortest path algorithm to forward traffic in between devices within a stack C. Support internal redundant power supplies D. Use the same type of redundant power supplies for PoE and non-PoE devices Answer: B Question 9. How does MAC locking prevent the connection of unauthorized devices to the network? A. It restricts one or more MAC addresses to a port. B. It provides a mechanism whereby network administrators can securely authenticate source MAC addresses. C. It uses a web browser to verify a users MAC address. D. It does not allow the port to learb an MAC address. Answer: A Question 10. Which of the following is/are true about Exterasys support for spanning tree protocol? A. All Enterasys swithces support the basic IEEE 802.1D Spanning B. Only the Matrix E1 support IEEE 802.1D Spanning Tree by default. C. RSTP is the defdault spanning tree on the Matrix N-Series and SecureStack B2 D. Both A & C Answer: D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.