An administrator is not able to access a database on an IBM Domino server as he/she receives the error "You are not authorized to access that database". What can the administrator do to access that database?
ASwitch IDs to the server ID then try to access the database.
BTurn on "Full Access Administration" then try to access the database.
CRun maintenance (fixup, compact, updall) against the database in question.
DTry to modify the Access Control List of the database by selecting the database in the Files tab of the administrator client.
What is used to determine the level of access users and servers have to a database?
APolicy settings
BServer document
CAccess Control List
DExecution Control List
Other than the IBM Domino Directory, what happens to documents in databases when the Administration Process performs a Rename Person or a Delete Person request?
ANames in all fields are updated.
BNothing. Only the Domino Directory is updated.
CNames in Readers and Authors fields are updated where the Administration server has been defined.
DNames in Readers and Authors fields are updated where the Administration server has been defined and where the server setting "Modifyfields of type Reader
Charles is the ID Vault administrator. What role in the ID Vault database would allow Charles to extract ID files and gain access to users' encrypted data?
A[Auditor]
B[User Access]
C[Password reset]
D[Vault Administrator]
When would an administrator typically need to adjust the java.policy file?
Awhen an administrator wants to control what JVM version is installed on the client machine
Bwhen an administrator wants to control updates to the JVM version on an IBM Domino server
Cwhen an administrator needs to adjust the permissions for a Java applet running within a webpage
Dwhen an administrator needs to adjust the permissions for a Java agent, process or XPage running Java code
Where is username and password information stored following successful session authentication?
Abrowser cache
Bbrowser cookie
Cbrowser volatile memory
Dnowhere, as this would be a security risk
What is a limitation of implementing IBM Notes Shared Login (NSL)?
ANSL cannot be implemented on 64-bit operating systems.
BWhen NSL is enabled, Notes ID vault cannot be implemented.
CNSL cannot be implemented through the use of a security policy.
DWhen NSL is enabled, IBM Domino password policies cannot be implemented.
The idpcat.nsf will contain which document(s) with the SAML configuration?
AIdP assertion document(s)
BSAML assertion document(s)
CIdP configuration document(s)
DSAML configuration document(s)
Which minimum access level must a user have in order to view a database ACL?
AEditor
BAuthor
CReader
DManager
What is the minimum level of access that a CA administrator must have to the IBM Domino Directory?
AEditor
BAuthor
CManager
DDesigner
How does the Protected Groups feature work?
AThe defined group(s) will be protected from receiving mail with attachments.
BThe defined group(s) cannot be accidentally deleted from the user's local directory.
CThe defined group(s) cannot be accidentally deleted from the IBM Domino Directory.
DThe defined group(s) will be protected from mass mailings originating from their home server.
What two statements are true about the ID recovery process? (Choose two.)
ACan be used to recover user ID files.
BCan be used to recover certifier ID files.
CCan be used to recover internet passwords.
DIt removes the need for IDs to be stored on the local user's machine.
EID recovery administrators do not have to be IBM Domino administrators.
An administrator would like to secure internet passwords in his IBM Domino environment. Which feature can the administrator implement to secure access to internet passwords stored in the Domino Directory?
AUse the ACL.
BConfigure an internet site.
CEnforce internet password expiration.
DUse the more secure internet password format.
What is a credential store?
AThe credential store is a secure repository where IBM Notes ID files are stored for roaming users.
BThe credential store is a secure repository for encryption keys necessary for IBM Domino to set up SSO with other applications.
CThe credential store is a secure repository for encryption keys necessary for Notes client users to be able to send and receive encrypted mailmessages.
DThe credential store is a secure repository for document encryption keys and other tokens necessary for Notes client users to grant access toapplications that
How can an administrator allow two IBM Domino organizations to trust one another?
AEnable key rollover
BCreate a cross-certificate
CEnable certificate authority
DAdd the organization into the ACL of the Domino Directory
What is the highest level of bit encryption that IBM Domino can generate SSL certificate requests in?
A512
B1,024
C2,048
D4,096
When replacing a database design, what does the "Hide formulas and LotusScript" option do?
AHides the design of all elements from the user.
BPrevents the user from running agents in debug mode only.
CHides the design of formula and LotusScript agents only from the user.
DRemoves the source code of all agents and script libraries from the database.
What does an IBM Domino administrator use to configure server key rollover?
Aserver's ID properties dialog
BAdministration tab of the Server document
CKeys and Certificates tab of the Security Settings document
DCertify New Key Requests view of the Administration Requests database
Trisha has created an ID vault on one of the servers that is not the IBM Domino Directory Administration server. Why is she unable to see the Vault document and other vault-related documents in the Domino Directory?
AShe should refresh the view for the documents to show up immediately.
BThose documents will not be added to the Domino Directory until the AdminP task is run manually.
CThose documents will not be added to the Domino Directory until they have replicated from the Domino Directory Administration server.
DThose documents will not be added to the Domino Directory until they have replicated from the hub server, which does not have to be theDomino Directory
Jeff is a developer and would like to sign an XPage to run on an IBM Domino server. What is the lowest level of access privilege he needs in order for the XPage to run?
ARun restricted LotusScript/Java agents.
BSign agents to run on behalf of someone else.
CSign XPages to run on behalf of the builder of the XPage.
DSign agents or XPages to run on behalf of the invoker of the agent.
In the context of certificates and designing certificate structures, can there be multiple Organizations in an IBM Domino domain?
AYes.
BNo, this can only be done with multiple domains.
CYes, however the Organizations need to be cross-certified with each other.
DNo, only one Organization can be used. However, multiple Organizational Units may be used with it.
Which task is responsible for updating the CA registration authorities in the Certificate document in the IBM Domino Directory?
AMonitoring process
BRegistration process
CAdministration process
DCertificate Authority process
How are encrypted messages handled by SMTP mail rules?
ASMTP mail rules are unable to process encrypted messages.
BSMTP messages cannot be encrypted so this is never an issue.
CEncrypted mail is decrypted using information stored in the ID Vault, processed, then re-encrypted.
DSMTP mail rules can process encrypted messages, but only using information stored in the unencrypted portion of the message.