Killtest 分享190-521 题库
Killtest 分享190-805 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-805Title :Version : DEMOUsing Web Services in IBM Lotus Domino 8 Applications1. What is the definition of WSDL?A.Web Services Domino LanguageB.Web Services Definition LanguageC.Web Services Description LanguageD.Webservice Specification and Description LanguageWArialZANSWER: C2. Hasad has created a Domino Web service. He has not used any overloaded methods. Hassad is now specifying the Programming model and SOAP message format for the Web service. He needs to ensure that the generated message includes the method name, can be validated with an XML validator, and he must use a scheme that is WS-I compliant. What should Hassad specify for the Programming model and SOAP message format?A.Programming model: RPCSOAP message format: WrappedB.Programming model: RPCSOAP message format: RPC/encodedC.Programming model: MessageSOAP message format: WrappedD.Programming model: MessageSOAP message format: Doc/literalWArialZANSWER: A3. Roosevelt wants to write a Domino Web service that queries the Notes database in which it resides, and returns a String result based on that query. What is the easiest way for him to write this Web service?ing LotusScript or Javaing Formula language with a simple @DbLookuping the "Simple Action" option in the Web service design element that queries a Notes viewD.By customizing one of the default Web services in the database that queries views and returns a resultWArialZANSWER: A4. Taj has rewritten some of the EmployeeInfo Domino Web service. The public methods that correspond to the operations of the Web service used to be contained within the EmployeeInfo public class. Taj has renamed these methods and put them in a new public class called GetEmployeeInfo.What are some of the steps that should be taken in order for the applications that consume this Web service to be able to work?A.Set the PortType class on the basics tab of the Web services properties to "GetEmployeeInfo". The consumer applications will then need to be modified as per the new WSDL.B.No changes are needed. Since the name of the Web service design element has not changed, and the functions and classes are public, the consumer applications will continue to work.C.Set the PortType class on the basics tab of the Web services properties to "GetEmployeeInfo". The next time a consumer application sends a SOAP request, the new WSDL will be returned.D.Clear the PortType class on the basics tab of the Web services properties. When the Web service is saved, this field is automatically populated with the proper value, the WSDL is automatically updated, and the clients that call the Web service will reconfigure themselves automatically.WArialZANSWER: A5. What are the four subelements that may be found within a valid SOAP 1.1 fault?A.code, string, actor, detailB.faultcode, faultstring, faultactor, detailC.FaultCode, FaultString, FaultActor, FaultDetailD.faultCode, faultString, faultActor, faultDetailWArialZANSWER: B6. Cam is coding a Domino application that will provide a Web service. Where will he add the Web service code in Domino Designer?A.Shared Code > Web ServicesB.Shared Resources > Web ServicesC.Shared Code > Agents > Web ServicesD.Shared Resources > WSDL and Shared Code > Web ServicesWArialZANSWER: A7. Mick is building a LotusScript Web service with a main class of GetEmployeeName. Where will he put the code for that class?A.The Port Type section of the Web serviceB.The Initialize section of the Web serviceC.The Declarations section of the Web serviceD.The GetEmployeeName function of the Web serviceWArialZANSWER: C8. What are the elements that are incorporated within a WSDL file?A.Service, Ports, SOAP Type, Encoding, MethodsB.Service, Encoding, Version, Methods, OperationC.Service, Status, Port Type, Operations, SecurityD.Service, Types, Message, Port Type, Operation, Binding, PortWArialZANSWER: D9. Gloria has coded the GetAccountBalance class in the Declaration section of her Web service. What WSDL element will map to this class name?A.wsdl:bindingB.wsdl:serviceC.wsdl:portTypeD.wsdl:operationWArialZANSWER: C10. Manju has coded the following two lines in his SOAP request envelope:IBMUSDWhat type of data is being passed to the Web service with these statements?A.Simple data typesB.Object data typesplex data typesD.Defined data typesWArialZ ANSWER: A。
Killtest 分享190-612 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-612Title :Version : DEMOLotus Notes Domino 6 Developing WebApplications1. PJ created a Web form action that was defined to "Include action in Action menu." When PJ views the form in a browser, she does not see the action in the action bar. What does PJ need to do to fix the problem?A. Change the action definition to "Hide action from Notes 4.6 or later."B. Change the Action bar properties to "Display Using Java Applet" for Web access.C. Change the action definition to "Include action in button bar," not "Include action in Action menu."D. Change the action properties to make it a "Public Action" and then change the action bar definition to "Include public actions."Answer: C2. Which one of the following programming languages or language combinations can be used for building an agent that retrieves data from non-Domino servers over the Internet?A. JavaB. JavaScriptC. LotusScriptD. LotusScript in combination with C programming languageAnswer: A3. Bill has a LotusScript agent named "VideoSales" that will process the sales data for all documents created with the Video form in his Web application. He would like to have his Web users launch the agent via their Web browser. How can he do this?A. Set the WebQuerySave event on the Video form to run the "VideoSales" agent.B. Create a view action in the Videos view and use the @RunMacro function to launch the agent.C. Create a view action in the Videos view and use the @ToolsRunAgent function to launch the agent.D. Create a view action in the Videos view and use the @Command([RunAgent]) function to call the agent. Answer: D4. Melissa has created a default outline in her application. She would like to display certain outline entries to Web users. How can she do this?A. Use hide-when formulas on the page where the outline is embedded.B. Create a separate outline for web users.C. Select or deselect the "Hide entry from Web Users" checkbox on the Outline entry properties box.D. Surround outline entries with HTML tags to enable them to be seen by Web users; by default, they are not.Answer: C5. Maria chose Native OS style (Use native control) for a Numbers field. When she looked at her application through a Web browser, the field did not display the way she expected. Why is this happening?A. She forgot to select the Dynamic option.B. Native OS style is ignored in Web applications.C. Native OS style is supported for text fields only.D. Native OS style is supported for editable fields only.Answer: B6. Web users who use Robert's Domino application are able to submit formatted text using Web forms. Which one of the following did Robert enable to allow this?A. Display a text field as an editor applet.B. Display a rich text field as an editor applet.C. Display a text field within an HTML text area.D. Display a rich text field within an HTML text area.Answer: B7. There are two Domino JSP tag libraries. Both comply to the JSP 1.1 and Java Servlet 2.2 specifications developed by Sun Microsystems. What are the filenames for these tag libraries?A. domtags.tld and domutil.tldB. domtags.xld and domutil.xldC. domino.tld and dominoutil.tldD. domtags.uri and domutil.ruiAnswer: A8. Keiko wants to protect the HTML and graphics files used in her Web site application. Which one of the following will accomplish this?A. Enforcing ECLsB. Enforcing consistent ACLsC. Creating File Protection documentsD. Setting file protection access lists in the Server document.Answer: C9. Claire has inserted three layers on her Video form. She would like to make sure that one layer remains on top of the other layers. How can Clair do this?A. Set the Z-index value to 0 in the layer property box.B. Set the Top value to 0 on the layer property box.C. Set the layer position property to 0 in the layer tree dialog box.D. Click and drag the layer on top of the other layers in the form.Answer: A10. Nina is creating an agent that will be run as a WebQueryOpen agent on her Web form. What agent target does she select on her agent properties to make sure her agent runs?A. NoneB. All Selected DocumentsC. All New and Modified DocumentsD. All Documents in the DatabaseAnswer: AThis document was created with Win2PDF available at . The unregistered version of Win2PDF is for evaluation or non-commercial use only. This page will not be added after purchasing Win2PDF.。
Killtest 分享251-251 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 251-251Title :Version : DEMOAdministration of HA Solutions for UNIX (VCS5.0)The safer , easier way to help you pass any IT exams.1.Which resource type attributes can be set in order to tune VCS failover characteristics? (Choose two.)A.FlagsB.RestartLimitC.ToleranceLimitD.OfflineTimeoutE.OfflineMonitorIntervalAnswer:B C2.Which feature of VCS can prevent overloading of a system's resources in the event of service group failover?A.Parallel Service GroupsB.CapacitiesC.LimitsD.Load Failover PolicyAnswer:C3.Which attribute enables VCS to bring a resource online after it goes offline unexpectedly and before faulting the resource?A.RestartLimitB.OnlineRestartLimitC.AutoRestartLimitD.OnlineRetryLimitAnswer:A4.Which VCS resource attribute setting prevents VCS from interpreting a Monitor entry point timeout as a resource fault?A.MonitorFault=0B.MonitorFaultTimeout=240C.FaultMonitor=240D.FaultOnMonitor=4Answer:D5.Under which condition can a service group be AutoDisabled?A.when hashadow cannot restart HAD on a systemB.when the system is in a jeopardy membershipC.when a firm service group dependency exists between two service groups and the parent service group failsD.when a firm service group dependency exists between two service groups and the child service group failsAnswer:A6.Which attributes impact service group failover? (Choose three.)A.FailOverB.AutoFailOverC.FaultedD.FaultPropagationE.FrozenAnswer:B D E7.Which resource type attributes can be set in order to tune VCS failover characteristics? (Choose two.)A.AutoStartB.ConfIntervalC.ConfTimeoutD.MonitorIntervalE.OfflineMonitorIntervalAnswer:B D8.Which statement is true about the violation trigger?A.A violation trigger must be written as a shell script.B.A violation trigger and notification are mutually exclusive.C.A violation trigger is dependent on notification to work.D.A violation trigger is automatically executed when events occur.Answer:D9.During a test of a NIC resource the VCS engine log indicates that the service group and the IP resource enter the FAULTED state on all systems in the cluster. The NIC resource enters the ONLINE state after the root cause of the fault is corrected. Which default attribute setting allows the service group to attempt to start without manual intervention?A.AutoStartB.AutoClearC.AutoRestartD.AutoFailoverAnswer:C10.Which types of monitoring can be performed on Oracle resources? (Choose two.)A.detail monitoringB.basic level monitoringC.kernel level monitoringD.specific monitoringE.service monitoringAnswer:A B11.VCS is to be installed in a secure environment where remote installation between systems is impossible. The VCS configuration parameters were captured in a file using the installation script on the first system. What can be used to read the contents of the configuration file when executing locally on the remaining systems?A.-autoconfigB.-configfileC.-vcsconfigD.-responsefileAnswer:D12.Which text files are created at the end of a successful run of installvcs -installonly? (Choose three.)A.logB.responseC.gabtabD.llttabE.summaryAnswer:A B E13.Which components are installed when you execute the installvcs script? (Choose two.)A.bundled agentsB.database agentsC.cluster file systemD.GAB driverE.cluster volume managerAnswer:A D14.Which conditions are recommended for a successful VCS patch installation? (Choose two.)A.The clustered application must be shut down.B.VCS must be shut down only on the server being patched.C.VCS must be shut down on all cluster nodes.D.GAB and LLT must be shut down on all cluster nodes.E.GAB and LLT must remain running and connected.Answer:C D15.Which directive in the llttab file defines a network interface for a heartbeat?A.nicB.linkC.heartbeatD.hbdevAnswer:B16.You are adding a system to a running cluster. You have successfully performed these steps on the system that you are adding: 1. installed, configured, and tested all application resources required 2. installed VCS 3. configured and started VCS communications (LLT and GAB) What is the next step that you perform?A.update the resource attributes to enable resources to run on the new systemB.update the service group attributes to enable groups to run on the new systemC.change the cluster attribute for VCS user names to match accounts on the new systemD.change the owner of the system attributes so that all cluster systems are the sameAnswer:B17.Which procedure must be followed to remove the resource type TypeA from an active VCS cluster?A.remove all resources of TypeA, remove TypeA, and remove TypeA packagesB.remove TypeA, then execute the hatype esync commandC.stop VCS, remove all resources of TypeA, and start VCSD.execute the hatype -remove command which will remove all the resourcesAnswer:A18.What is the default level of authorization of a new VCS user?A.Cluster AdministratorB.Cluster OperatorC.Cluster GuestD.Group AdministratorE.Group OperatorAnswer:C19.When preparing to install VCS on the S1 and S2 systems, what should you do to verify softwarecompatibility? (Choose three.)A.check the VCS release notes for supported softwareB.run the installvcs recheck S1 S2 commandC.let the installvcs script check compatibility at installD.run the installvcs ompat S1 S2 commandE.check the Symantec Enterprise Support websiteAnswer:A B E20.You are installing a VCS upgrade that does not require a system reboot, but does require a VCS restart. Which method maximizes user access to the clustered applications during the upgrade?e the VCS rolling upgrade option which restarts VCS transparentlyB.stop VCS using the orce option and then restart VCS on each systemC.evacuate service groups while upgrading one system at a timeD.stop VCS using the all option and then restart VCS on each systemAnswer:B。
Killtest 分享QQ0-200 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : QQ0-200Title:Version : DemoHDI qualified help desk senior analyst(hdsa)1. Which three are characteristics of a strategically-thinking help desk? (Choose three)A. Transactional focus.B. Reactive focus.C. Proactive focus.D. Information giving focus.E. Integrated focus.Answer: BCD2. When designing a help desk technology infrastructure, which two components are most commonly included? (Choose two)A. Interactive Voice Response.B. Web server.C. Telephony system.D. Call logging system.Answer: CD3. An upset, frustrated customer asks to speak to the help desk manager. What is your most appropriate response? (Choose 1)A. It would be easier to resolve this call if you calm down.B. I am sorry, but my manager is not available at the moment. May I get her to call you back?C. I am sorry, but my supervisor does not handle these situations, I can assist you.D. I appreciate your frustration with this; I have experienced this same problem many times.Answer: B4. When communicating with a customer, it is best to avoid _____. (Choose two)A. Apologies.B. Empathising.C. Use of slang.D. Technical terms.Answer: CD5. You are speaking to a customer who has an incident that requires you to perform further research before you can apply a resolution. You document the situation and the impact. What is the best action to take next? (Choose 1)A. Close the call.B. Develop a multi-functional team to address the situation.C. Ask your team colleagues to concentrate on this problem with you.D. Explain to the customer what will happen next.Answer: D6. Which question should you ask to best assess a customer's experience and knowledge level? (Choose 1)A. What is the error code you see?B. Have you ever had this error before?C. What were the circumstances that led to this situation?D. Have you spoken with the systems administrator?Answer: C7. Which are two characteristics of active listeners? (Choose two)A. They demonstrate sympathy.B. They use the customer's name.C. They avoid using verbal attends.D. They listen for, and recognise, emotion words.Answer: BD8. What are the two most important points to remember in order to manage a call successfully? (Choose two)A. Create a problem-solving work-flow.B. Use the same terminology as the customer.C. Clearly document the situation and the steps taken.D. Give the customer something to do.Answer: BC9. Which are two characteristics of active listeners? (Choose two)A. They acknowledge the customer.B. They know the process for escalating a problem.C. They restate/paraphrase to ensure understanding.D. They understand that evidence and reasoning are critical.Answer: AC10. What are two purposes of an on-going (event) survey? (Choose two)A. To evaluate overall satisfaction levels with products.B. To measure the quality of a single interaction.C. To assess satisfaction levels with all help desk services.D. To trend levels of customer satisfaction between annual (periodic) surveys.Answer: BD11. What are the three best methods for building rapport among departments within the support organisation? (Choose three)A. Active Networking.B. Involvement in Project management.C. Participation in company-wide events and initiatives.D. Involvement in cross-functional teams.Answer: ACD12. A help desk analyst is on the phone with a customer and does not know the solution for the problem. What is the best technique for them to use to disengage from the call? (Choose 1)A. I have the information. I will get back to you as soon as possible.B. Allow me to check this further, I will call you at 10:00 with an update.C. Let me research this, I will call you back as soon as I have a resolution.D. Permit me to check with some other members of my team, I will get back to you as soon as I review this with them.Answer: B13. What are the two most important purposes of an annual survey? (Choose two)A. To assess IT technical support.B. To evaluate overall satisfaction levels.C. To identify changes customers feel are valuable.D. To measure changes in products and services from the previous year.Answer: BC14. Which two business needs must be considered when allocating priorities? (Choose two)A. The impact on the business.B. The customers status.C. The customers location.D. Service level agreement commitments.Answer: AD15. What is the best description of multi-tasking? (Choose 1)A. Delegating all responsibility along with all tasks.B. Completing one job before starting the next one.C. Starting tasks and handing them to subordinates to complete.D. Being capable of handling a variety of problems at the same time.Answer: D16. What are two of the best ways to demonstrate confidence when on the telephone with a customer? (Choose 1)A. Using a confident tone, tell them you dont have a resolution for their incident yet but you are finding out by using the knowledgebase.B. Using a confident tone, tell the customer you are new to the desk and are transferring their call.C. Using a confident tone, ask the customer to call a 2nd line team, and provide their telephone number.D. Using a confident tone, tell the customer that you are unable to help them until tomorrow.Answer: A17. You think one of your help desk analysts is suffering from stress. Which two physical signs best indicate the analyst is experiencing stress? (Choose two)A. They have a new wardrobe of clothes.B. They seem tense and often have white knuckles.C. They bite their fingernails.D. They have a pallid complexion.E. They often seem short of breath.Answer: BE18. Why is it important to record and analyse customer complaints? (Choose 1)A. To gain insight into customer perceptions.B. To identify customers who are never satisfied.C. To prove that other IT groups are meeting customer expectations.D. To demonstrate that customers are not aware of service level agreements.Answer: A19. How can the help desk be of strategic benefit to the organisation? (Choose one)A. It increases staff levels.B. It is a useful source of information.C. It ensures rigid adherence to operational policies.D. It ensures that customers speak only to the help desk personnel.Answer: B20. You are a help desk analyst and you are having difficulty understanding a customer from another country. What is the best action for you to take? (Choose 1)A. Ask the customer if there is someone else who speaks your language more fluently who could assist.B. Ask the customer to email you instead.C. Tell the customer you are sorry but you cannot understand him, and suggest he calls back another time.D. Tell the customer you will send him a user manual.Answer: A。
Killtest 分享190-520 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-520Title :Version : DEMOMaintaining Domino R5 Servers and Users1.Magnus has deleted a resource reservation document and created a new one with updated information to replace it.What needs to take place to make the new resource available?A. Replicate the Domino Directory.B. Request the resource to be used when scheduling a meeting.C. Administration Process updates the resource document in the Directory.D. The resource is available when the resource document is saved.Answer: C2.Will selected "Pull only" in the "Router type" field on the connection document whereDomino32 server initiates a connection to Domino10 server.When the connection is made, what routing activity will take place?A. Domino32 will pull mail from Domino10.B. Domino32 will push mail to Domino10.C. Domino32 will tell Domino10 to pull mail from Domino32.D. Domino32 will tell Domino10 to push mail to Domino32.Answer: D3.In order for Christine to access the server console from a Unix command line, which command must Christine use?A. ConsoleB. CconsoleC. RconsoleD. AdminConsoleAnswer: B4.To improve performance, Domino stores in memory information about HTTP commands, databases, users and page formulas.What is this feature called?A. HTTP cacheB. Web cacheC. Domino AnalyzerD. Command cacheAnswer: D5.Where can Otto check to make sure mail is routing when the number in the "Route at once if field" of the connection document is reached?A. Count messages in MAIL.BOX.B. Count messages in MAIL.NSF.C. Check TRESHOLD.LOG.D. Check MAILLOG.NSFAnswer: A6.When displaying Topology Mapping for servers, there are lines that indicate types of connections.Which is not a valid connection type?A. In-Use connectionB. Mail connectionC. Replication ConnectionD. Mail and Replication ConnectionAnswer: A7.Jennifer sees the "Unable to copy database" message in the Miscellaneous Events view if the log indicating that a database is corrupted.She is running transaction logging for the database.What should she do?A. Run the Fixup task with the -J option.B. Run UpdallC. Reboot the server machine.D. Make a new replica of the corrupted database with a different name, erase the old copy and give the new copy it's name.Answer: A8.At G¨¹ntersTech, the DomAdmin group is listed as Manager of all datbases. All other employees have Author access. A user changed another person's document because he had been incorrectly given Editor access.How can Jorgen, one of the administrators, see who changed the ACL?A. Look in the Notes Log under the Database folder.B. Check the ACL log on the server.C. Look at the ACL log history in the ACL.D. Changes are not logged for future review.Answer: C9.Vladimirhas Designer access in the Sales Discussion database. He has made severalchanges and is ready to make them available to all replicas of the database. After a fullreplication cycle he noticed that none of the changes have appeared.What could cause this problem?A. He needed manager access to make changes to replicas.B. The design of the database is hidden.C. Design changes are only made at 1 AM by the server Design task.D. The originating server access was set too low on the other servers.Answer: D10.Documentation suggests that Saruman check for a missing or incorrect Domain setting in the NOTES.INI file. At server startup, the Router reads this setting and sends the message "Mail Router started for the domain x" to the console and to the log file.What command can Saruman type at the console to verify the NOTES.INI domain setting?A. Show Configuration DomainB. Set Configuration DomainC. Test Configuration DomainD. Verify Configuration DomainAnswer: A11.Rodger is responsible for the Mail server at Certkiller . Routing is taking an unusually long time and Rodger suspects that high traffic is slowing the process.How can he increase the number of messages routing at one time?A. Limit the number of users to connect concurrently.B. Implement multiple MAIL.BOX databases to expedite mail routing on his server.C. Limit the number of mail messages a user can send at one time.D. Delete user mail files from his server to keep traffic down.Answer: B12.Pia was listed as Editor in the ACL of EMPLOYEE.NSF. She created new documents and existing documents, but now Pia can't edit any documents but her own.What has changed?A. An Authors field was added to the documents.B. Her ACL level was changed to Author.C. A Readers field was added to the documents.D. The $Revisions field wad deleted from the documents.Answer: B13.Max uses the console command "tell http restart".Which command sequence is this equivalent to?A. "Load http", then "tell http quit"B. "Tell http quit", then "load http"C. "Tell http quit", then "http"D. "Quit", then "tell http load"Answer: B14.Amanda is responsible for all web access to Certkiller . Several users have reported thatthey are getting the "Database browsing not allowed" error when trying to accessdatabases on one particular server.What does Amanda need to do to fix this problem?A. Go to all databases involved and deselect the "hide from web users" check box in database properties.B. Restart the server because databases haven't been refreshed recently.C. Give the users manager access to the databases.D. Make certain the option "Allow HTTP clients to browse databases" is enabled in the server document for that server.Answer: Ding a Web client, Eva cannot access the Catalog database. Domino indicates that she is not authorized to access the database.Which one of the following caused this error?A. Default ACL access is set to Reader.Anonymous is not listed in the ACL.B. Default ACL access is set to Reader.Anonymous ACL access is set to No Access.C. Default ACL access is set to No Access.Anonymous ACL access is set to Reader.D. Default ACL access is set to No Access.Anonymous ACL access is set to Author.Answer: B16.Bubba has several users with maul files over 2 GB. He has been requested to reduce the size of mail files in the interest of saving disk space. By default, the router will continue todeliver mail to a user even though his mail file is over its size quota.How can Bubba prevent this?A. Set "Obey database quotas during message delivery" to Enabled in a Configuration document.B. From the Server console enter, "Tell Router Obey Quota".C. In the database Quota setting, select "Router-Obey database Quota".Answer: A17.Johannes is Manager of the Problem Tracking database and is troubleshooting an agent.The agent is written in LotusScript. He developed the database on Server B and replicatedit to Server A.Why would the agent run fine on server A but not on Server B?A. Server B is not in the same Notes Named Network.B. Server B is a test server only.C. Server B does not allow him to run agents.D. Server B is a Hub server.Answer: C18.Eric created a shared agent to run hourly on newly created documents. He gave the server Manager access to the database. However, the agent is still running.Which one of the following describes how to fix the problem?A. Run the agent using a User ID and not a Server ID.B. List the server in the Server Tasks section of the Server document.C. List the server in the Agent Manager section of the Server document.D. List the server in the Agent Restriction section of the Server document.Answer: D19.Ove has added an alternate name for Marcus.Which method was NOT a procedure that Marcus could have used to add an alternate name?A. Recertify User ID.B. Register a new user.C. Run the "Alternate name" agent.D. Edit the person document, add the alternate name, then recertify the User ID.Answer: C20.Because of intermittent network problems, Edna wants administrators to be able to track mail messages on all the servers in the domain. The administrators are listed in theADMIN group.Which one of the following does Edna need to do to accomplish this?A. Add the ADMIN group to the "Allowed to track message" field in each server's Configuration document.B. Add the ADMIN group only to the "Allowed to track message" field in the Administration server's Configuration document by default.C. Nothing. The ADMIN group is added to the "Allowed to track message" field in the Administration Server's Configuration document by default.D. Nothing. The ADMIN group is allowed to track message when the "Allowed to track message" field in each server's Configuration document is left blank.Answer: A。
Killtest 分享190-824 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-824Title :Version : DEMOBuilding Portlets with IBM WebSphere Portlet Factory61.After working with a builder for several days, it is decided that John must consume some data from a Lotus Domino database. How can he most easily enhance his project to include data from Domino?e the Notes ODBC driver to consume Domino dataB.Add the Lotus Collaboration Integration Extension to his projectC.Export the Domino data to Excel, then add an Excel Integration Extension to the projectD.Integrate Domino with a relational database using Domino Enterprise Connection Services (DECS), then consume the data using a native JDBC driverCorrect:B2.Will has used Eclipse for several RCP and plug-in projects and is beginning his first WebSphere Portlet Factory WebApp. In order to provide a clean environment for the complexities of his WebApp, what action should he take with Eclipse before creating the new WebApp Project?A.Open a new perspectiveB.Define and use a new workspaceC.Start Eclipse with the "-clean" optionD.Clear the warnings from the Problems view, and add a Servers view for running the projectCorrect:B3.Jerry returns from a vacation to his shared development machine, and when launching Eclipse discovers a Profiling Monitor where his project's navigation used to be. What does he need to do to return to his WebSphere Portlet Factory project, assuming that he selected the correct workspace?A.Run a search for the base entry of his WebApp TreeB.Change the perspective to the WebSphere Portlet Factory perspectivee the File - Open File menu to return to one of his modelse the Run menu choice to change to his old run configurationCorrect:B4.Angie has created several builder calls in a model and wishes to see the model's raw form for educational purposes. Where can she do this?A.In the generated code paneB.In the Model XML model viewC.In the WebApp Tree model viewD.By navigating to the initial Comment in the Navigator paneCorrect:B5.Which builder can Ellen use to add a form to her WebApp for the collection of data?A.Form BuilderB.Data Page BuilderC.HTML Page BuilderD.Data Class BuilderCorrect:B6.To get a better understanding of a data service provider, Gene would like his provider model to automatically create some documentation. In which builder call can he generate documentation, and how?A.SQL Call builder, by selecting "Include Documentation"ment builder, by adding appropriate comments to the modelC.Service Definition builder, by selecting "Generate Main" and "Include Documentation"D.SQL DataSource, by defining data that has embedded comments as one of the columns to return Correct:C7.Jerald is working with detail input pages (forms) and wishes to give them similar colors and fonts as the summary pages developed by another programmer. The styles can easily be modified by doing which of the following?e the "!important" tag in the summary page CSS definitionB.Modify the style manually in the HTML generated by the page automation builder callC.Include a CSS file as part of the project, referencing it in the detail page's builder calle a modifier builder call to change the tag associated with the element that needs a new style Correct:C8.Francois is familiar with the generation of WSDL in a data provider model using the Service Definition builder. However, for his current project, he has created several service consumer models and is performing complex operations on the result sets. It is these operations, not necessarily the raw data, which he would like to expose as web services. How can he define a new WSDL without involving the provider model?e the WSDL Generator builder at the end of any modelB.Append Action!ViewWSDL to the URL of any model as it runse the Web Service Enable builder to expose one or more methodse a Web Service builder as a modifier after using a View & Form builderCorrect:C9.Leanna intends to share certain values (variables) across different models in a particular user session for later use in event processing. Which of the following types of inter-portlet communication describes what she needs to do?A.Generate Property BrokersB.Add Click-to-Action buildersC.Add Portlet Factory events with shared inputsD.Add Shared Variables for coupling with an event mechanismCorrect:Ding the Data Page builder, Lance can map data to named HTML tags on a page. The data can be rendered in form fields, as read-only fields, or in some combination of both. How does he generate form fields for data input and modification?A.By referencing an HTML file in the Input Control SettingsB.By reading a schema file with form definition elements and field validationC.By generating sample HTML and modifying it in-line with the built-in editorD.By first choosing the Page Type as data entry, then choosing a Page or Imported Page builder call that has already been definedCorrect:D11.For faster iterative development and testing, Johan would like to test his models without continually republishing them to a portal server, logging into the portal server and loading the correct page. Which of the following steps should he take to accomplish this?A.Create a configuration to run the model stand-aloneB.No actions are necessary as models run in the Eclipse or RAD IDE by defaultC.Create a run configuration to run to run the models on an embedded test serverD.Open the model files in a browser after associating the extension .model with the browserCorrect:A12.Elise has been working on a model and realizes that a new builder call is required in the middle of two others. How can she add the builder call in the right place?A.Move the builder calls using drag and drop in the Navigator paneB.Select the builder call before the position desired, then click on the new builder call iconC.Create the builder call using the new builder call icon, but use "Save As..." to position itD.Either use the right-click menu to insert the builder call or add it to the end, then drag it to the correct positionCorrect:D13.John is developing a multi-portlet application and will be using Events to handle inter-portlet communications and actions. He wants to make sure certain information is supplied to the Event Handler of "target" portlets when they communicate. How is this accomplished?e arguments as an inputB.Define the events as locally fired eventse indirect references to a method call that returns the informationD.Encode both the event name and declaration data in the event handler's inputsCorrect:A14.In order to make a SQL Call return data, Pauline is defining a Service Operation. Which action should she call in the Service Operations properties?A.FetchB.InvokeC.ExecuteD.ActivateCorrect:C15.Denise is adding Page Automation to her service consumer, and has a need to treat certain data in the detail data set as read-only, even if she is in edit mode. How is this accomplished?e a Data Column Modifiere a Data Hierarchy modifiere a Data Field Modifier buildere the hide-when input on the Page Automation builderCorrect:C16.The Navigator pane provides Heather with navigation among the source files in a project. How can she navigate the components of her web application such as its Data Services, Linked Java Objects, Methods and Pages?A.Load the model's XML schemae the Outline for each modele the WebApp Tree for each modelD.Add a view in Eclipse or RAD to specifically navigate these elementsCorrect:C17.Sam wants to exploit the Data Page builder's ability to generate the bulk of the HTML code for his portlet, but not lose control over the individual page elements. What should he do to accomplish this goal?e an HTML Template for page formattingB.Hard code HTML tags, tying your code to the underlying dataC.Create a base page and stylesheet, used in conjunction with Data Modifier buildersD.Import HTML forms, then use Data Field Modifiers to automate and tie the forms to the Data Page builder callsCorrect:A18.Gwen has successfully implemented a default Edit display for users of her portlet. However now she would like to add disclaimer text to the default Edit page as users see it, warning them of the ramifications of their changes. What approach should she use?A.Modify the Portlet Adapter to include a text VariableB.Hand-edit the generated HTML produced by the Portlet Adapter buildere the Imported Page builder call to replace the Edit page at runtimeD.Create an HTML page including entry_prompt, entry_value, and submitbutton attributes, and refer to its path in the Portlet AdapterCorrect:D19.Jorge has exposed back-end data using an SQL DataSource, SQL Calls and a Service Definition with WSDL being generated. Now for another model to use this data, which builder must be used to define the provider model?A.SQL ConsumerB.Service ClientC.Service ConsumerD.Web Service CallCorrect:D20.Alexis wishes to display one "read-only" field on a form. This field is a date field, and while the rest of the application uses one format, for this specific form it should use another format (the form is for a business unit located in another region that uses a unique date format). How can she accommodate this requirement, assuming the defaults are being used everywhere else in the application?e JavaScript to reformat the field prior to displaying itB.Profile the field, choosing the DateTime Profile Handler to set the formate a Data Field Modifier Builder to control the format of the specific datee a global Method Call builder to provide translation information to the Data Field Modifier Builder callCorrect:C。
Killtest 分享190-755 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-755Title :Version : DEMOIBM Lotus Notes Domino 7-Implement+AdministeringSecurity1. A security policy push has been done to all users of a large toy company. This new security policy controls many aspects of the user's password, including limiting the number of repeating characters and restricting the user from providing any of their name in the password. If a user chooses not to modify their password or use any of the restrictions at the time of being prompted, what is the next step that occurs?A. Notes will continue to prompt the user on a scheduled basis until the password is changedB. The Notes client shuts down after warning the user they are not complying with the password policyC. The designated administrator, as defined in the security policy settings document, receives a notification email about that userD. The user generates a forced Adminp request to change their password to the default that was specified in the security policy settings documentAnswer: B2. You have been asked to make a comprehensive administration structure that contains restricted rights for certain groups of administrators. While maintaining the rights to remotely administer Unix servers, which of the following Domino administrator access levels is not automatically granted Manager access to databases on the server, nor does it provide any access to the Web Administrator database?A. AdministratorsB. Console administratorC. Database administratorsD. Full access administratorAnswer: C3. Sam has been configuring key rollover in his customers Domino domain. Key Rollover will occur after 365 days as the maximum allowable age for any key. Where is key rollover configured for users?A. Person document - Administration tabB. Desktop Settings policy document - Security tabC. Server Configuration document - Change Control tabD. Security Settings policy document - Keys and Certificates tabAnswer: D4. A Smartcard for Holly was destroyed. This card contained certain Notes private keys she had shifted to the Smartcard to provide tighter security. Which of the following is the best option for establishing a new Smartcard for her?A. Have Holly access all previous applications with a newly created id file to rebuild the private keysB. Reregister Holly and create a new Notes id file that will be Smartcard enabled, all previous keys are lostC. Obtain the last Notes id for Holly from the recovery database for the certifier and create a new SmartcardD. Perform a name change on another existing user with the same access to Holly's name. Copy all the private keys and rename the user backAnswer: C5. You are attempting to establish SSO in your domain across multiple servers. The time-out for SSO was configured to expire after 45 minutes. The time during which any of your users are logged in via a Web client, defined by a cookie, is which of the following?A. ThreadB. SessionC. InstanceD. VariableAnswer: B6. John, the Domino administrator, wishes to deny access to a server named Mail14 for a user named Randy. John also wants to verify that Randy cannot view a list of names that have been denied server access to Mail14. Which of the following provides that functionality?A. ID lockout for Randy's idB. Forced password change for Randy's idC. Notes ID password recovery for Randy's idD. "Not access server" field in the Mail14 server documentAnswer:A7. Notes users are able to generate key rollover requests without the use of a security settings policy document. While generating the request, what are the two options the user has in generating key rollover?A. ID recertification and ID recoveryB. Key enhancement and new key generationC. Public key change and private key changeD. Authentication protocol and mail protocolAnswer: D8. Erika is configuring the initial Domino server for her organization. Her goal is to restrict users from modifying any attributes of the Workstation ECL, but she is yet to create the Administration ECL for the domain. What settings will the client receive until an Administration ECL is created?A. The Workstation ECL is created with default settings that are built into the Notes clientB. The Workstation ECL remains blank until an Administration ECL for the domain is created and savedC. The Workstation ECL is created with default settings that define the Administration ECL until one is manually created and savedD. The Workstation ECL cannot be created and a warning is issued upon client setup to that effect. The client configuration will not continue until a default Administration ECL is definedAnswer:A9. Data is not being successfully sent to a cgi program on the Domino web server by Jenny, a user. Another user in the Bakery department can start a program successfully on the web server after logging in. One of the members of LocalDomainAdmins, Brian, tests the same cgi script and has sent data successfully. Which of the following would be the correct settings to allow Jenny to send data to the cgi program?A. Set Anonymous to Read, -Default- to Author and LocalDomainAdmins to ManagerB. Set LocalDomainAdmins to Editor, -Default- to Get and Anonymous to No AccessC. Set -Default- to Post, Anonymous to Get and LocalDomainAdmins remain the sameD. Set -Default- to Reader, Anonymous to Depositor and LocalDomainAdmins to UploadAnswer: C10. Users have had recovery information embedded into their id file since version 5.0.8 of Notes and Domino. They currently run version 7.0.1 of Notes and Domino. However, Joshua is moving from the Notes administration team and into another group. Matthew will take his place. Which of the following describes the steps necessary to remove Joshua and add Matthew in his place as a proper id recovery authority for the certifier utilized for user creation and recertification?A. Matthew and Joshua will have no steps to perform. Adding the new administrator to the administrators group in the Domino Directory automatically recertifies the usersB. Joshua must issue an Adminp request to "remove admin from certifier" from the Domino Administrator client and then Matthew must enter an Adminp request to "add admin to certifier". Both must be approved by another administrator before recertifying usersC. Recovery information in the certifier id utilized to certify and register users must be modified to add Matthew and remove Joshua. A recertification of the users under that certifier must occur. Notes 7.0.1 will NOT prompt the user to accept the change in recovery informationD. The certifier in question must have all recovery authorities removed. A recertification of existing users must occur to accept the removal of Joshua. Then the certifier must be modified again to add Matthew as a recovery authority and the users recertified a final time. They will then accept Matthew as a recovery authority when prompted.Answer: C11. A phone call prompts you to immediately revoke an Internet certificate due to a compromised key. After verifying the caller as a trusted source, what database will you access to revoke the Internet certificate that was compromised?A. The CA database for the certifier that issued the certificateB. The ICL database for the certifier that issued the certificateC. The CRL database for the certifier that issued the certificateD. The CERT database for the certifier that issued the certificateAnswer: B12. The server access fields define access to the Notes server via which of the following protocols?A. NRPC and HTTPB. NRPC and LDAPC. NRPC and SMTPD. NRPC and DIIOPAnswer:A13. Select the notes.ini parameter that denies any user from accessing a server in full access administrator mode.A. SET_RESTRICT_FULLACCESS=1B. RESTRICT_FULLADMIN_ACCESS=1C. SECURE_DISABLE_FULLADMIN = 1D. FULLACCESS_ADMIN_RESTRICTED=1Answer: C14. The decision was made by ACME management to not encrypt databases on the Domino server that runs on Windows 2003. Numerous people have access to the room where the server is located, as well as local server access. A security policy was established that states the Domino server console must be password protected. Which of the following steps should be taken to enable this feature?A. Lock the Domino server service in Windows 2003 with a password only known to the Domino administratorsB. Issue a Set Secure command on the Domino server console with a password only known to the DominoadministratorsC. Create a console.lck file on the Domino server that contains a password only known to the Domino administratorsD. Open the server console from an administrator client with full access administration and issue a Lock Server command with a password only known to the Domino administratorsAnswer: B15. Andy issued an unscheduled CRL for the certificate for James Addington/Operations/TotalTelevision, believing thatthere was a security compromise. Which server command did he issue for the immediate revocation to process?A. tell ca CRL push certifier numberB. tell ca CRL issue certifier numberC. tell ca deactivate certifier numberD. tell ca delete key certifier numberAnswer: B16. Upon logging in, the Domino server continues to send the username and password of Ted with the URL for continuous requests. The Domino web server has cached the username and password in response to which of thefollowing configurations established by the Domino administrator?A. AreaB. RealmC. DomainD. ResponseAnswer: B17. Jeff and Connie are Domino developers sharing the same test server called Dev1/Trans. -Connie has signed an agent to run on the invoker of the agent's behalf. She then attempts to run this agent from her Notes client. The agent fails to run.-Jeff, shortly after, has signed an identically coded agent to run on behalf of the invoker also. He successfully runs thisagent from a test in Internet Explorer. -The field granting the ability to run agents on behalf of the invoker is blank in the server document Which of the following explains the reason the agent successfully ran for Jeff and not Connie?A. Agents set to run on behalf of the invoker cannot run from a Notes clientB. Agents may only be signed to be invoked on behalf of the server itself. Connie did not sign hers in that mannerC. Agents set to run on behalf of the invoker may only be run scheduled. Jeff had established a schedule for his agentD. Only one agent may be run on any server that is configured to run on behalf of the invoker. By Jeff signing his agent later, it overrides Connie's as the single agent to run of that typeAnswer:A18. The names of administrators who are allowed to recover IDs is stored in what location?A. The certifier id fileB. The server notes.ini fileC. The administrator client notes.ini fileD. The certifier document in the Domino DirectoryAnswer:A19. You have assigned Alicia to be the certificate authority administrator for your Domino domain. As your organization grew, she spends more time than desired in managing the CA process. To assist her, you enable Kendra as a Registration Authority. Of the below rights, which will Kendra be able to perform with her role as Registration Authority by default?A. Modify certifiersB. Create certifiersC. Enforce certificate accessD. Revoke Internet certificatesAnswer: D20. From the following, select the listing which provides agent manager rights ranked in order from the highest to the lowest.A. Run unrestricted methods and operations Sign agents to run on behalf of someone else Sign agents to run on behalf of the invoker of the agent Run restricted LotusScript/Java agents Run simple and formula agents Sign script libraries to run on behalf of someone elseB. Run simple and formula agents Sign agents to run on behalf of someone else Run restricted LotusScript/Java agents Run unrestricted methods and operations Sign script libraries to run on behalf of someone else Sign agents to run on behalf of the invoker of the agentC. Sign script libraries to run on behalf of someone elseSign agents to run on behalf of the invoker of the agent Sign agents to run on behalf of someone else Run unrestricted methods and operations Run restricted LotusScript/Java agents Run simple and formula agentsD. Sign agents to run on behalf of the invoker of the agent Run restricted LotusScript/Java agents Sign agents to run on behalf of someone else Run unrestricted methods and operations Run simple and formula agents Sign script libraries to run on behalf of someone elseAnswer:AThis document was created with Win2PDF available at . The unregistered version of Win2PDF is for evaluation or non-commercial use only. This page will not be added after purchasing Win2PDF.。
Killtest 分享190-602 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams. Exam: 190-602Notes Domino 6/6.5 System Title:Version: DEMO1.Which one of the following best describes the types of tasks that process in the background on the Notes 6 client?A.Saving a document, replacing a design, refreshing a design, printing, replicatingB.Detaching attachments, replacing a design, refreshing a design, printing, replicatingC.Saving a document, replacing a design, refreshing a design, logging on to a server, replicatingD.Detaching attachments, replacing a design, refreshing a design, logging on to a server, replicating Correct:B2.Cindy wants to be able to find e-mails from her manager quickly. Which one of the following features can she use to help her easily identify e-mails from her manager?A.E-mail warning featureB.Color coded e-mail featureC.E-mail notification featureD.Priority ordering e-mail featureCorrect:B3.Which one of the following statements regarding file attachments in Lotus Notes 6 is true?A.File attachments cannot be removed from mail messages.B.File attachments can only be removed when saving a message.C.File attachments can only be removed when forwarding a message.D.File attachments can be removed when forwarding or saving a message.Correct:D4.Acme Corporation wants all users to see the same Welcome page. Which one of the following should they do to implement this?A.Manually configure each users Welcome page to adhere to corporate standards.B.Send an e-mail containing the standard Welcome page to each user to be downloaded on their machine.C.Link a corporate database containing the standard Welcome page to a desktop policy document in the Domino Directory.D.Update each user's Person document in the Domino Directory to a corporate database containing the standard Welcome page.Correct:C5.Which one of the following is NOT true of centralized archive control in Lotus Domino?A.Must archive to same serverB.Centrally controls user settingsC.May be used to prohibit private settingsD.Has the ability to allow private settingsCorrect:A6.Which one of the following statements regarding policy documents is true?A.Policy documents can be defined for users or servers.B.Policy documents can be defined for organizations or servers.C.Policy documents can be defined for users, groups, or servers.D.Policy documents can be defined for organizations or organizational units.Correct:D7.Joe has a group of users he needs to upgrade to a new release of Lotus Notes. Joe is planning to use policy documents to upgrade the users. Which one of the following statements regardingpolicy documents is true?A.Policy documents cannot help upgrade a user.ers will receive an e-mail notification of the upgrade.ers will be upgraded automatically when they authenticate with a server.ers affected by a policy document will be prompted to upgrade the next time they authenticate with the server.Correct:D8.Which one of the following statements regarding setup profiles is true?A.Policies override setup profiles.B.Setup settings override setup profiles.C.Desktop settings override setup profiles.D.Setup profiles override policies for setup and desktop settings.Correct:D9.Which one of the following policy documents would be used to allow administrators to create and modify a set of rules that define how documents in a user's mail database are selected and archived?A.Mail settings documenter settings documentC.Archive settings documentD.Profile settings documentCorrect:C10.Joe, a Lotus Notes administrator, is planning to implement policy documents. Which one of the following best describes what policy documents are defined for?ers, O, OUers and Groups onlyers, O, OU, Serversers, Groups, and Servers onlyCorrect:A。
Killtest 分享190-623 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-623Title :Version : DEMOLotus Notes Domino 6 Configuring Domino WebServers1.Marco has implemented a Redirection rule for a Web site. However, the URL request is being modified before the Redirection rule can be applied. Which one of the following types of rules is evaluated before a Redirection rule?A.DirectoryB.SubstitutionC.Passthru ruleD.HTTP response headerCorrect:B2.Internet Site documents for specific Web protocols can be created one at a time. Which one of the following is NOT a supported Web protocol for Internet Site documents?A.SMTP outboundB.LDAPC.IIOPD.IMAPCorrect:A3.Dominique is moving files, including Domino databases, from one directory to another on the same Web server. Which one of the following types of rules should be created so new links do not need to be created?A.Direction RuleB.Directory RuleC.Redirection RuleD.Substitution RuleCorrect:D4.Alyssa, the Domino administrator, wishes to restrict web agents from running indefinitely on a Domino server. In which one of the following fields is this value configured?A.Web agent timeoutB.Run web agents concurrentlyC.Persistent connection timeoutD.Run unrestricted methods and operationsCorrect:A5.Domino applies Web rules to HTTP connections from Web browsers in a particular order. Which one of the following best describes the order they are applied?A.Response, supplemental, and directoryB.Substitution, supplemental, and responseC.HTTP response header, redirection, and directoryD.Substitution, redirection, and HTTP response headersCorrect:D6.Lizette wishes to enable Domino Off-Line Services (DOLS) for her Internet users. Which one of the following fields must be configured to allow DOLS to function?A.The DOLS fieldB.The DSAPI fieldC.The ndolextn fieldD.The offline services fieldCorrect:B7.Which one of the following types of Web rules redirects incoming URLs to another URL?A.DirectoryB.RedirectionC.SubstitutionD.HTTP Response HeaderCorrect:B8.James is converting his Domino 5 Web Server Configurations to Domino Internet Sites. In Domino 5, he utilized Virtual Server documents. Which one of the following is the Domino 6/6.5 equivalent?A.RuleB.File ProtectionC.Web Site documentD.Authentication RealmCorrect:C9.Pattern-matching inside of Web rules may contain which one of the following?A.Spaces in URLsB.Directory lookupsC.Wildcard charactersD.Case-sensitive matchingCorrect:C10.Certain clients utilizing WebDAV attempt to lock WebDAV items. Where is "design locking" enabled for WebDAV?A.The Global Web settings documentB.The server configuration document in the Domino DirectoryC.The Web Site document that is specified for the WebDAV domainD.The Design tab of the Database Properties dialog box for each WebDAV databaseCorrect:D。
Killtest 分享E20-512 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : E20-512Title:Version : DEMOBusiness continuity specialist exam for Storage admins1. What does a PowerPath pseudo-device represent?A. A logical path that leads to a single physical deviceB. A logical path set that leads to multiple physical devicesC. A physical path that leads to multiple logical devicesD. A path set that leads to a single logical deviceAnswer: D2. When performing LUN masking operations to support Open Replicator, what must be done to ensure that data can be accessed between two Symmetrix systems?A. Grant device access to the WWN of the controlling FA ports for the remote devices on the remote FA portsB. Grant device access to the WWN of the host HBA ports for the remote devices on the controlling FA portsC. Grant device access to the WWN of the host HBA ports for the remote devices on the remote FA portsD. Grant device access to the WWN of the remote FA ports for the remote devices on the controlling FA portsAnswer: A3. When using Open Replicator to do a Hot Pull without the donor_update option set, what is the result of terminating the session before it is complete?A. Requests for data not yet copied will cause a priority retrieve of the data from the remote volume.B. Session will run to completion before actually terminating.C. The local volume will revert to its state prior to the Hot Pull.D. There is data loss on the remote volume.Answer: D4. What is the purpose of the half delete action in SRDF/Star?A. Used to dissolve RDF relationships when a partner device is unavailableB. Used to initiate a Star recovery procedureC. Used to reset the first two mirror positions to fully invalidD. Used to reverse the data flow after a link failureAnswer: A5. A customer requests that you create a user account for administering jobs and storage pools in EMC Replication Manager, but without controlling the storage array itself.What is the required account type that will satisfy only these operations?A. Database AdministratorB. OperatorC. Power DBAD. Power UserAnswer: C6. What is the correct sequence of events when a synchronous write occurs in SRDF/S?1. Host issues a write I/O2. Remote Symmetrix acknowledges receipt of write3. Write is transmitted to remote Symmetrix cache4. Write is received in cache at source Symmetrix5. Source Symmetrix acknowledges write completion to hostA. 1, 3, 2, 4, 5B. 1, 4, 3, 2, 5C. 1, 4, 5, 3, 2D. 1, 5, 3, 4, 2Answer: B7. PowerPath PPME with Open Replicator is planned for use in a migration of 172 LUNs. The source array is a Symmetrix 8830; the target array is a DMX-3.For PPME-enabled migrations using Open Replicator, what is the configurable maximum number of concurrent replication sessions that can be supported in this configuration?A. 16B. 128C. 256D. 512Answer: D8. A customer would like to create a point-in-time copy of the data for development purposes. The customer environment is not performance-sensitive. The customer would like to access the point-in-time copy at 9 A.M.The amount of time required to copy the data from the source to the target is 60 minutes and application downtime is not available. Which solution is recommended?A. Use TimeFinder/Clone to create and activate a clone with the background copy (-copy) option at 8 A.M.B. Use TimeFinder/Clone to create a clone with the background copy (-copy) option at or before 8 A.M. Activate the clone at 9 A.M.C. Use TimeFinder/Clone to create a clone using the deferred copy mode (default) prior to 9 A.M. Activate the clone with the consistent option at 9 A.M.D. Use TimeFinder/Clone to create a clone with the Precopy (-precopy) option at or before 8 A.M. Activatethe clone at 9 A.M.Answer: C9. What can happen if BCV copies of database log and data volumes are created without using a consistent split while the database is running?A. Database inconsistencies can occurB. Database integrity is assured with Enginuity Consistency Assist (ECA) technologyC. The database application can block an I/O while waiting for the split operation to occurD. The split may never finish due to database inconsistencyAnswer: A10. You have created an EMC Replication Manager job to replicate your SQL Server database. You now want to delegate the day-to-day management of this job to another user with Database Administrator privileges within Replication Manager. This user complains that they are unable to access the job you created.What must you do to enable your Database Administrator to access this job?A. Grant the user access to the database on SQL Server.B. Manually add the user account to the job.C. Recreate the SQL Server job.D. Upgrade the user's privileges to Power DBA.Answer: B11. What is an advantage of using Open Replicator compared to the SRDF family of replication products?A. When a zero data loss solution is requiredB. When the environment contains a heterogeneous mixture of storage arraysC. When the environment contains a homogenous set of storage arraysD. When the environment contains servers with sufficient processor and memoryAnswer: B12. How does Enginuity Consistency Assist (ECA) differ from PowerPath?A. ECA and PowerPath I/O suspensions do not differ from each another.B. ECA supports I/O suspension for hot splits while PowerPath does not.C. ECA suspends I/O at the host level while PowerPath suspends I/O at the Symmetrix level.D. ECA suspends I/O at the Symmetrix level while PowerPath suspends I/O at the host level.Answer: D13. What are the steps for the administration of storage in an EMC Replication Manager environment?1.Array configuration2.Storage pools3.S4.A5.I A. B. C. D. An 1Wh arc A. B. C. D. An 1A d vol Bo 3.Storage disc 4.Array discov 5.Include stora A. 3, 1, 4, 5, 2B. 3, 4, 1, 5, 2C. 4, 1, 3, 5, 2D. 4, 3, 1, 5, 2Answer:C14. Click on th Which Open R architecture di A. Cold and H B. Cold Push a C. Hot Push a D. None; all FA Answer:B15. Click on th A database se volume on theBoth source S e discovery iscovery storage , 5, 2, 5, 2, 5, 2, 5, 2on the Exhibit Bu pen Replicator o ure displayed?nd Hot Push and Push and Pull ush and Pullall FA ports mus on the Exhibit Bu se server has it n the data sourcerce Symmetrix fra bit Button.ator operations c h and Pull must be zoned t bit Button.as its logs stored ource Symmetrixrix frames replica ons can be perfo ned to the target tored on a volum metrix.eplicate data to tperformed betwe arget array volume on the log a to the target Sy between the D he log source Sy get Symmetrix at e DMX and third ce Symmetrix and rix at the disaster third-party array ix and its data st saster recovery s array with ata stored on a ery site. There the n a ereare Sy Wh failA. oveB.C. wo An 1aft A.B. C. D. An are two devic Symmetrix and What happens fail?A. An SRDF f over to the dis B. The data in C. The R1 volu D. The da would ensure d Answer:B16. The custom after the failure A. Cleanup B. Disconnecte C. PathFail D. Reset Answer:Cdevice groups th ix and one for the ppens if the SRD RDF failover wou e disaster recove ata in the databas 1 volumes in the R2 data in the da sure data consist ustomer has exp failure?nnectedups that have be or the log volume SRDF links betw would be initiate ecovery Site.tabase becomes n the log source S he database rem onsistency.s experienced a ve been defined olume on the log s between the lo nitiated on all vo omes inconsisten urce Symmetrix w e remains consised a transient neefined: one group e log source Sym he log source S all volumes and sistent at the disa etrix would becom onsistent becaus ent network failur group for the d e Symmetrix.ce Symmetrix an and processing e disaster recove become write-dis ecause Enginuity failure on their S he data volume rix and the targe sing would autom ecovery site.disabled to the ginuity Consisten eir SRDF links. W lume on the dat target Symmetri automatically be o the database s sistency Assist te ks. What is the e data source metrix were to ly be switched ase server.sist technology s the Star state rce to hed ogy ate1A. B. C. D. An 1Us A. B. C. D. An 1Tim A. B. C. D. An 2da A. B. C. D. An 17. Which stat A. Automates B. Facilitate C. Mounts mu D. Uses HP St Answer:B18. Click on th Using the SRD A. Convert R2B. Convert R2C. Site 2 to Sit D. Site 3 to Sit Answer:A19. The snap TimeFinder/Sn A. Can be use B. Save device C. Used as ca D. Used to hol Answer:D20. If terminati data on the vd A. By issuing t B. The hold on C. The informa D. The informa Answer:Ch statement desc ates concurrent r ates quick, freque s multiple replica HP StorageWorks on the Exhibit Bu e SRDF/Star conf rt R2s to R1s of rt R2s to R1s of to Site 3 differen to Site 2 full resy snap has been er/Snap save de e used when con devices must be t as cache-only vir o hold changes m minating a TimeF he vdev?uing the -symforc old on the target d formation is no loformation is still a describes a bene rent replication b requent, and non eplicas to the sam Works RAID tech bit Button.r configuration, w 1s of Site 2 and S 1s of Site 2 and S ferential resync l resync been mounted ve device?n configuring a m st be the same ca nly virtual device i nges made to the imeFinder/Snap mforce option, th rget device is rem no longer availatill available on a benefit for using tion between mul d non-disruptive e same mount po D technology to au on, what would S and Site 2 to Site and Site 2 to Site ync nted for a data g a multi-hop SR me capacity vice in SRDF/A o the source afte Snap copy sessio on, the data is av is removed while available on the vle on the virtual dusing Replication n multiple storage ptive backups unt pointy to automate res ld Star automat o Site 3 differenti o Site 3 full resyn data validation p SRDF/AR envi DF/Ae after snap activ ession, what is th is available to th while pairing info the virtual device tual device to the cation Manager?orage arrays e restore operati omation provide erential resync resync dation check. W environment activation t is the effect on to the target hos g information rem device.to the target hos ager?perations ovide in the case k. Which statem ct on the target h et host.on remains on the t host.case of a Site 1 f statement applie get host's ability on the Symmetrix te 1 failure?applies to bility to access metrix.the ess。
190-622
Exam:190-622Titl e :Notes Domino 6 Managing Servers and Users��Ver : 01.09.06QUESTION 1Which one of the following explains why Hans cannot retrieve an HTML file whichhe knows is on the Domain server?A. The CGI script are not enabled.B. The default URL is set to ?Open.C. Hans has Depositor access to the Domino server.D. The HTML files are not located in the HTML directory listed in the server or Web site configuration documents.Answer: AQUESTION 2Jim's Notes workstation's Smart Upgrade did not work. Which one of the following could be the cause of Smart Upgrade failing?A. Jim did not access his mail database.B. Jim's Personal Address Book has the filename JIM.NSF.C. Jim's Location document does not correctly specify his home server.D. Jim does not have administrator access to his Windows 2000 workstation. Answer: AQUESTION 3When a policy selected for a particular user?A. During registrationB. During workstation setupC. When the user's certifier ID is createdD. When the user accesses their mail serverAnswer: BQUESTION 4Jessica wants to assign an explicit policy to a user. Which one of the following documents should be modified to assign the policy to the user?A. The policy documentB. The user's Person documentC. The office Location documentD. The mail server's configuration documentAnswer: BQUESTION 5Which one of the following statements about the Smart Upgrade database isTRUE?A. The database must have ODS version 41.B. The database must have the filesystem SMUPKIT.NSFC. The database must contain the relevant Notes RS information.D. The database must exist on at least one server in the domain.Answer: DQUESTION 6Amy wants to decommission an existing source server. Before transferring the applications, she runs a Decommission Server Analysis report. Which one of the following types of information does this tool provide?A. Source server information onlyB. Target server information onlyC. A compression between source server and target serverD. A detailed report of everything transferred from the souce server to te target server once the transfer takes placeAnswer: CQUESTION 7In addition to Notes database, which one of the following files on a Domino server should be backed up in order that new users can created in case of the server?A. The CACHE.DSK fileB. Certifier ID filesC. The user's DESKTOP.DSK fileD. The server's BOOKMARK.NSF file.Answer: BQUESTION 8Brie left the Create New Replicas field blank in a Server document. Who can create new replica databases on that server?A. No oneB. AdministratorsC. Local Domain ServerD. Everyone in the domainAnswer: AQUESTION 9Which one of the following statements about the compact server task is TRUE?A. The compact process re-indexes views.B. By default, compact runs every day at 3 P.M.C. Compact may be scheduled via a program document.D. Compact is listed in the TASKS line on all Notes 6/6.5 workstations.Answer: CQUESTION 10Josh has cross certified the /BOX organization to his /ACME organization. An administrator from the BOX organization has cross certified the /ACME to the/BOX organization. When a /BOX server attempts to assess a /ACME server, it receives a " You are not authorized to access this server" error. Which one of the following could be the cause of this error?A. The Box server's ID does not contain a copy of the Acme certifier.B. The Box server's ID file needs to be updated with the cross certificate.C. The Box administrator needs to add the Box server to the LocalDomainServer group.D. The Box server has not been granted access to the Acme server in the Acme server document.Answer: DQUESTION 11Suzanne, a Notes administrator sets the "Allow Anonymous Notes connections" setting in the Server document to yes. Which one of the following levels of accesswill Bob, Notes user, have when he accesses a database with the following settings:-Default- Editor*/ACME - ReaderAnonymous - AuthorOtherDomainServer -NoAccessA. ReaderB. AuthorC. DefaultD. No AccessAnswer: BQUESTION 12Amy is setting up session-based name-and-password authentication. Which one ofthe following is required for this to work?A. JavaB. COBRAC. CookiesD. JavaScriptAnswer: CQUESTION 13Jeff cross certified the Organizational Unit (OU) /NYC/ACME with his organization's /BOX Organizational (O) certifier. Which one of the following statements are correct for this scenario?A. Users or server with /NYC/BOX certificate can access /ACME servers.B. Users with an ACME ID can access any of Box's severs that have a /NYC/BOX certificate.C. Any user or server ID with the /NYC/ACME certificate can access any server in the /BOX organization if they have the appropriate cress certificate.D. Server with the /NYC/ACME certificate can access any server in the /BOX organization if they have the appropriate cress certificate but no .NYC/AME user can access /BOX servers.Answer: AQUESTION 14Robert's windows 200 Domain server has frozen with no error output on theserver's screen or other indication that anything is wrong. Which on of the followig can cause this problem?A. The server was replicating with another serverB. The server's transaction log was being updated.C. Robert has forced mail routing to another server.D. Microsoft windows Quick Edit mode was enabled for the server console window. Answer: DQUESTION 15Bob left the Create New Databases field empty in a Server document. Who is authorized to create new databases on the server?A. No oneB. Administrators onlyC. LocalDomainServer onlyD. Anyone with access to the serverAnswer: DQUESTION 16Which one of the following statements about transaction logging is TRUE?A. The transaction log is always named TRANSLG.NSFB. Transaction logging must be enabled on all Domain 6/6.5 servers.C. All database changes are written to a transaction log in a batch.D. Transaction logging is enabled by default on all Domain 6/6.5 servers. Answer: CQUESTION 17Raul wants to review reads and writes to databases from various Notes user. Where would he locate this information?A. LOG.NSFB. DOMLOG.NSFC. ACTINFO.NSFD. ACTIVIOTY.NSFAnswer: AQUESTION 18Which one of the following statements about Domino SSL server security is TRUE?A. SSL must be enabled for all server ports.B. SSL can only be enabled for POP3, IMAP and SMTP.C. If a server is using SSL, users must access the server using a browser.D. You can require SSL connections for all databases on a server or for an individual database.Answer: DQUESTION 19Dawn used the Administration Process (AdminP) to convert a non-roaming Note user to a roaming Notes user. In which one of the following does the Administration Process update the user's status from non-roaming to roaming?A. Person documentB. Server documentC. Location documentD. Configuration documentAnswer: AQUESTION 20Orin changes the name of a group using the Domino Administrator client. How often does the Administration process (AdminP) update group names in Author and Reader Names fields?A. DailyB. HourlyC. WeeklyD. ImmediatelyAnswer: CQUESTION 21Jonathan has been moved out of one group and into another. How long before this change will be effective throughout the seventeen servers in his domain?A. One hour.B. ImmediatelyC. It is dependent on the replication schedule for NAMES.NSF.D. The Administrator Process (AsminP) will change his group membership throughout the domain within 24 hours.Answer: CQUESTION 22Maria got married ad changed her last name. She needs to have her name changedin the Domino Directory. Which one of the Following actions did the administrator use to change Maria's name?A. Edit PersonB. Move to folderC. Rename Selected PeopleD. Recertify Selected PeopleAnswer: CQUESTION 23Karen uses the Administration Process (AdminP) to move a user's main file to a different mail server. Which one of the following must Karen do in order for thenew mail file to be created and the old mail file to be deleted?A. Update the user's Location documents.B. Modify the mailserver field in the user's person documentC. Approve the deletion of the old mail file in the ADMIN4.NSF database.D. Give the user rights to create new databases on the new mail server.Answer: CQUESTION 24When a user is deleted from the Domino Directory, which one of the following tasks must be approved in the ADMIN4.NSF database by the administrator before theAdministration process (AdminP) performs the task?A. Remove the user from groups.B. Delete the user's mail database.C. Add the user to a Terminations groupD. Remove the Person document from the domain's Domino Directly.Answer: BQUESTION 25Jennifer is moving user from /Madrid/ACME to /Boston/ACME. Which one of the following will she need to perform this task?A. The Web Administrator clientB. Just the destination certifierC. Author access to the domain's Domino DirectoryD. Both the /Madrid/ACME and the /Boston/ACME certifier ID filesAnswer: DQUESTION 26Which one of the following processes ensures that group names in ACLs are updated when an administrator changes the name of the group in the domain's Domino Directory?A. UpdateB. UpdallC. ConvertD. Administration Process (AdminP)Answer: DQUESTION 27Which one of the following may cause the error "You are not authorized to use the server on remote consol"?A. The user is not authorized to use the server.B. The server does not allow remote administration.C. The user's ID file is not cress certified with the server.D. The person in not listed in the Administrators field of the Server document. Answer: DQUESTION 28Jose wants to see the replication topology map of his Notes domain. To see this topology, what must he do?A. Load the MAPS EXTRACTOR server task.B. Load the TOPMAPS EXTRACTOR server task.C. Load the MAPTOP EXTRACTOR server task.D. Load the TOPOLOGY EXTRACTOR server task.Answer: AQUESTION 29Which one of the following would be helped by using the Mail Trace feature?A. A user cannot read encrypted e-mail.B. All mail messages to a particular user are not routing properly.C. Mail is not routing from outside your domain to your domain's mail servers.D. Mail messages from one user in your domain are not routing properly to external users.Answer: BQUESTION 30Geoff wants to force replication of NAMES.NSF between ServerA/Acme and ServerB/Acme. Which one of the following console commands will accomplish this?A. LOAD REPLICATIONB. REP SERVERA SERVERBC. REP SERVERB/ACME NAMESD. TELL SERVERA REP SERVERB NAMESAnswer: CQUESTION 31Both Server A and Server B are in the domain and in the same Domain Network Name. What is the minimum number of Connection Documents needed for replication to occur in both directions?A. TwoB. OneC. ThreeD. NoneAnswer: BQUESTION 32Which one of the following may prevent the Administration Process (AdimnP)from updating a user's name in their ID file?A. The user accepted the name change.B. The CERTLOG.NSF database does not include a copy of the user's certificate.C. The user's name is not listed in the Domino Directory's Access Control List (ACL).D. The user did not accept the name change in the first twenty-four hours after the administrator initiated it.Answer: BQUESTION 33An agent that is designed to run "On schedule more than once daily" does not complete. Which one of the following could cause this problem?A. The agent must be initiated by user action.B. The agent can only run hourly, weekly or monthly.C. The developer must start the agent manually the first time.D. The agent has exceeded the value in the Max Execution time in the Agent Manager settings of the Server document.Answer: DQUESTION 34Koki, a Domino administrator, is trying to move a server within the certification hierarchy by running the administration Process task. He recertifies the server witha different certifier ID but the change never tasks place. Which one of the following will cause the recertifying process to fail?A. The server has a hierarchical certificate.B. The Administration Process was enabled.C. The Certification Log was placed on the Domino Administrator workstation.D. A replica copy of the Administration Requests database was placed was placed on every server in the domain.Answer: CQUESTION 35Which one of the following may cause the error "You are not autjorized to accessthe server"?A. The user's ID file has expired.B. The server's ID file has expired.C. The cross certificate exists on both directions.D. The Access List in the Server document denies the user access.Answer: DWhich one of the following types of information is stored in an .NSD file?A. Current server statusB. Notes storage directoriesC. Information regarding a system crashD. HTTP access information for the serverAnswer: CQUESTION 37Both Server A and Server B are in the Acme domain, are correctly listed in DNS, are in the same Domino Network Name. How many Connection Document are required mail to route for Server B and from Server A to Server B and form Server B to Server A?A. OneB. TwoC. ThreeD. NoneAnswer: DQUESTION 38Which one of the following may cause the error "Unable to find path to server" on a Notes workstation?A. The user's ID file has expired.B. Server's hostname is not resolving.C. The Personal Address Book has been deleted.D. Server does to have a Connection document to the server.Answer: BQUESTION 39Jeff is trying to create a replica of STATUS.NSF but is unable to create the local copy. Which one of the following could cause this problem?A. Jeff only has Reader access in the database's Access Control List (ACL).B. Jeff only has Author access in the database's Access Control List (ACL).C. Jeff only has Editor access in the database's Access Control List (ACL).D. Jeff has not been given the right to replicate or copy documents in the database's Access Control List (ACL).Answer: DWhat is the minimum level of access a Notes 6/6 5 user must have to run the Out of Office agent?A. AuthorB. EditorC. ManagerD. DesignerAnswer: BQUESTION 41Jose is creating a new password for himself. Which one of the following will password quality checking indicate as the least secure password?A. Mixed case passphrasesB. All uppercase passwordsC. Passphrases containing numbers and punctuationD. Would found in Notes dictionaries during spell checkAnswer: DQUESTION 42Kurt created an event generator. Which one of the following will this do?A. Restart the event task.B. Initiate a task a server.C. Create entries in the EVLOG.NSF databases.D. Monitor a task a task or statistic by probing a server.Answer: AQUESTION 43Which one of the following controls when an agent runs on a server?A. The Agent Manager taskB. Server document, Agent Settings field.C. Configuration document, Agent Setting filed.D. The AGENTSCHED parameter in the server's NOTES.INI file.Answer: BQUESTION 44Why did Sophia create an event handler?A. To define a threshold for a statistic.B. So that server sets quotas on database size.C. In order to have the server log events to the EVENTS4.NSF database.D. To be notified via page if the server's available disk space fails below 25%. Answer: DQUESTION 45What is the DOMLOG.NSF database used for?A. To track all users who access the Domino serverB. To track users who access the Domino server via HTTPC. To track users who access the Domino server via NNTPD. To track user who authenticate with the Domino server.Answer: BQUESTION 46Which one of the following best describes the available directory architecture in a Domino 6 domain?A. A centralized directory architectureB. Both distributed and centralized directory architecturesC. None of the answers applyD. A distributed directory architectureAnswer: BNotes & Domino 6 supports both a distributed directory architecture and a central directory architecture.In a Distributed Directory architecture in a Domino domain, in which all servers use the standard Domino Directory in a central directory architecture,some servers store Configuration Directories (contains configuration settings only) and then use the standard Domino Directories on remote servers for lookups. QUESTION 47What is the significance of Kit Type=1 and where is it located?A. Server, in the Notes.iniB. Workstation, in the server documentC. Workstation, in the Notes.iniD. Server, in the configuration documentAnswer: CSpecifies which program you are running:1 - Workstation2 - ServerQUESTION 48Which on of the following is the proper syntax for forcing replication via a Domino server console command?A. Replicate [databasename] servernameB. Replicate servername [databasename]C. Replicate sourceservname/sourcedatabasenamedestinatationservername/destinationdatabasenameD. Replicate servername/databasenameAnswer: BSyntax: Replicate servername [databasename]Description: Forces replication between two servers (the server where you enter this command and the server you specify). Use the server's full hierarchical name. If the server name is more than one word, enclose the entire name in quotes. To force replication of a particular database that the servers have in common, specify the database name after the server name. The initiating server (where you're currently working) first pulls changes from the other server, and then gives the other server the opportunity to pull changes from it. You can use this command to distribute changes quickly or to troubleshoot a replication or communication problem.QUESTION 49Mary needs to rebuild all used views in her database. Which one of the following commands could she issue on the Domino server console?A. UPDALL -ALLB. UPDALL -*C. UPDALL -RD. UPDALL -XAnswer: CRebuild: All used viewsUPDALL -RRebuilds all used views. Using this option is resource-intensive, so use it as a last resort to solve corruption problems with a specific database.QUESTION 50What database is created when you run the Decommission Server Analysis tool?A. Log AnalysisB. DecommissionC. Server analysisD. ResultsAnswer: DWhen you run the Decommission Server Analysis tool, you create a Results databasecontaining detailed information comparing the source server and the target server. The source server is the server being removed from service, and the target server is the server taking the place of the source server. The source and the target servers must be Domino servers that have hierarchical names and that are in the same domain.QUESTION 51Which of the following uniquely identifies a document across all replicas of a database?A. UNIDB. NotelIDC. ReplicalDD. OFIDAnswer: AThe UNID (universal ID) is a 32-character combination of hexadecimal digits (0-9, A-F) that uniquely identifies a document across all replicas of a database.QUESTION 52A Program document can not be used to run which of the following types of commands or programs?A. API programsB. UNIX shell scriptsC. OS/2 command filesD. Java appletsAnswer: DA Program document is used to automatically run a server task at a specific time. You can also use a Program document to run an OS/2 command file, a UNIX shell script or program, or an API program. You can use the Program document to schedule tasksand/or programs.QUESTION 53Sandra has migrated all of her users and applications from Nagano/CertFX toMoscow/CertFX. Which one of the following can she use to ensure she has transferred all database and settings?A. Tivoli Server Analyzer for Lotus DominoB. The administration client action "Show Server Difference"C. Cluster comparison toolD. Server decommission Analysis toolAnswer: DThe Decommission Server Analysis tool generates a categorized list of items that were analyzed. Each category represents a different aspect of a server's configuration thatneeds attention. Within each category, items are listed alphabetically. Each item lists any differences between the source and the target server's settings or values. In the Results database, you can view the categorized list of the items that were analyzed. QUESTION 54A Security Policy Settings document controls which of the following?A. The Notes and Internet passwordsB. None of the aboveC. The administration ECL as well as Notes and Internet passwordsD. The administration ECL as well as Internet passwordsAnswer: CA Security policy settings document controls the Administration ECL as well as Notes and Internet passwords.QUESTION 55Which one of the following can you specify in the setup profile when performing a seamless upgrade?A. To which groups the client must be addedB. Which mail file template to apply according to the Lotus Notes client versionC. All of the aboveD. Which address book template to apply according to the Lotus Notes client version Answer: BWhen the Domino server receives the call to upgrade a mail file template, the server checks for a Desktop policy settings document or Setup Profile assigned to the user. The Desktop policy settings document and the Setup Profile contain a "Mail Template Information" section. This section is new to Setup Profiles in Notes 6. In this section, you can specify which mail file template to apply according to the Lotus Notes client version. QUESTION 56Which one of the following is not an Event Generator document?A. TCP server even generatorB. NRPC server event generatorC. Task status event generatorD. Statistic event generatorAnswer: BMonitoring Configuration documents define and configure what constitutes an event and how the event is handled. You can also use these documents to customize the message that appears on screen when an event occurs. The Monitoring Configuration documents are stored in EVENTS4.NSF.Event Generator documents are also stored in the Monitoring Configuration database, EVENTS4.NSF.QUESTION 57Which one fo the following best describes the information that can be found in the DOMLOG.nsf database?A. Both Lotus Notes and web activity on the Domino serverB. Lotus Notes activity on the Domino serverC. Web activity on the Domino serverD. Activity trends and health reporting of the Domino serverAnswer: CYou can log your server activity and Web server requests to the Domino Web server log (DOMLOG.NSF) database. This option may be preferable if you want to create views and view data in different ways. Logging to a database is somewhat slower than logging to text files, especially at very busy sites, and the size of the database can become large so that maintenance becomes an issue. However, if you use the Domino Web server log, you can treat this information as you would other Notes databases, and you can use built-in features to analyze the results.QUESTION 58Michael needs to force replicate between the following two servers:Notes Hub/Tools/ CertkillerSametime Hub/Tools/ CertkillerMichael is using a remote console on SametimeMichael is using a remote console on Sametime Hub/Tools/ Certkiller . Which oneof the following Domino server console commands did he issue?A. REPLICATE NotesHubB. REPLICATE Notes HubC. REPLICATE Notes Hub/Tools/ CertkillerD. REPLICATE Notes Hub/Tools/ Certkiller "Answer: DSyntax: Replicate servername [databasename]Description: Forces replication between two servers (the server where you enter this command and the server you specify). Use the server's full hierarchical name. If the server name is more than one word, enclose the entire name in quotes. To force replication of a particular database that the servers have in common, specify the database name after the server name. The initiating server (where you're currently working) first pulls changes from the other server, and then gives the other server the opportunity to pull changes from it. You can use this command to distribute changes quickly or to troubleshoot a replication or communication problem.Which one of the following is not an available policy settings document?A. Ecplicit policiesB. Exception policiesC. Implied policiesD. Organizational policiesAnswer: CA policy is a collection of individual policy settings documents.There are three types of policies: Organizational policies, Explicit policies and Exception policies.Organizational policies are applied automatically to users or groups based on the organizational structure.Explicit policies, like they sound, are assigned explicitly. They apply settings directly to a user, instead of through the organizational hierarchy.Exception policies allow users to control their own user settings.QUESTION 60Which one of the following statements about transaction logging is TRUE?A. Transaction logging is used to support Domino clusteringB. Logged transactions are stored in memoryC. Logged transactions are written to disk in a batchD. Transaction logging is enabled by default on all Domino 6 serversAnswer: CTransaction logging captures all the changes that are made to databases and writes them to a transaction log. The logged transactions are written to disk in a batch when resources are available or at specified intervals.QUESTION 61Hoke needs to make design changes to forms and views of a production database.He plans to make the changes locally in a template and then have the server updatethe production database with the changes. Which one of the following server tasksdoes the administrator run in order for the changes to be propagated?A. The REPLICA server taskB. The FIXUP -D server taskC. The DESIGN server taskD. The UPDALL server taskAnswer: CThe DESIGN or designer task updates all database design elements from their master template(s). The DESIGN task runs daily by default at 1 AM.A user has been added to a group with author access in the salesdatabase. When she enters the database she finds that she is able to change her co-workers documents as well as her own. Why?A. She is listed individually in the ACL with reader accessB. The ACL has become corrupt and needs fixed upC. None of the aboveD. She is listed in another group in the ACL with editor accessAnswer: DA name is included in two or more groups. The name receives the access of the group with the highest access.QUESTION 63Many needs to rebuild all used views in her database. Which one of the following commands could she issue on the Domino server console?A. UPDALL -RB. UPDALL -XC. UPDALL -ALLD. UPDALL -*Answer: ARebuild: All used viewsUPDALL -RRebuilds all used views. Using this option is resource-intensive, so use it as a last resort to solve corruption problems with a specific database.QUESTION 64Which one of the following should not be included in a NNN?A. Domino servers on a WANB. Domino servers on Dial-upC. None of the aboveD. Domino servers on a LANAnswer: BThe Domino Server Setup program automatically places all servers that are in a Domino domain and that run the same network protocol in the same Notes named network (NNN). In the Server document, the setup program assigns each NNN a default name in the format portname network.After you complete the Server Setup program, rename the NNN for each network port in the Server document. It is useful if the name reflects both the location of the network and its protocol. For example, if your company has a TCP/IP network and has LANs in Boston and San Francisco, change the name of the NNN in Boston to "TCPIP Boston。
Killtest 分享190-952 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-952Title:Version : DemoIBM Lotus Notes Domino 8.5 ApplicationDevelopment Fundament1. Tony wants to create a duplicate of the Video application. He wants to keep a version of the data on the same server as the production application but does not want any new documents or document modifications to be replicated into his new database after he creates it. Which one of the following should Tony do to create his archive?A.Create a new copy of the database.B.Create a replica copy of the database.e Microsoft Windows Explorer to create a copy of the database file.D.Create a replica copy of the database and disable replication on the database properties.Answer: A2. When Nora creates a new document in the Suggestion application, a number of the fields have text already displayed. But when she tabs to or clicks the field, the text disappears. What design feature has been used to create this behavior?A.Field Hint in the Field Properties windowB.Default Value in the Form Properties windowC.Help Description in the Field Properties windowD.Field Assistance in the Field Properties windowAnswer: A3. Jonathan has built a view in the sales.nsf application. Jonathan wants the profit column in the view to display in currency. Which one of the following should he do?A.Write the column formula using the @function @Currency.B.Select currency on the Numbers tab in the Field Properties of the cost field.C.Select Number as the style on the Advanced tab of the Column Properties window, and Custom as the Display Format.D.Open the Column Properties window and click the Advanced tab. Select Number as the style, and select Currency as the Number Format.Answer: D4. Mark can see every recipe document in the Kitchen Planning application. He can also edit recipes thatinclude his name in the Owner field. What level of ACL access does he have?A.OwnerB.AuthorC.EditorD.ManagerAnswer: B5. The Open Discussions view of the Brainstorming application should display main documents. The view should also display all comments that have been submitted in response to the original postings or to other comments. Gabriela has discovered that all main documents are displaying correctly in this view, but neither the response documents nor the response to response documents are displaying. What could be the problem?A.On the Options tab of the View properties, the Show main documents only option is selected.B.On the Info tab of the View properties, the Style option is currently set to Standard Outline.C.On the Info tab of the View properties, the Style option is not currently set to Standard Outline.D.On the Options tab of the View properties, the Show response documents in a hierarchy option is not selected.Answer: D6. Victor has a field that allows the user to enter the list price of a video. What type of field makes sure that the value of that field is numeric?A.NumberB.DollarC.CurrencyD.Text field with @TextToCurrency Input Validation formulaAnswer: A7. Dora has a view with a column that shows the date and time at which the document was created. She would like to show just the date and hide the time portion. How can she accomplish this task?A.In the View Properties window, set the view style to Date/Time and format the date to be mm/dd/yyyy.B.In the View Properties window, set the view style to Date/Time, and clear the Display Time option.C.In the Column Properties window, set the column style to Date/Time and format the date to be mm/dd/yyyy.D.In the Column Properties window, set the column style to Date/Time, and clear the Display Time option. Answer: D8. Jamie needs to add a RestrictAccess field on a form in the Purchasing application. Only users with the [Admin] role should be able to see this field. How should she write the hide/when formula to hide this field?A.@Show("[Admin]";@UserRoles)B.@Elements("[Admin]";@UserRoles)C.@IsContained("[Admin]";@UserRoles)D.@IsNotMember("[Admin]";@UserRoles)Answer: D9. Roberto has been asked to modify the Membership view in the Video Rental application. A green check mark should display in the Approved view column for each document where membership has been approved.He set the view column property to Display values as icons, and now he needs to write a column formula. What is the column formula he needs to use?A.@If(Approved = "Yes"; 82; 0)B.@If(Approved = "Yes"; @OpenImageResource("checkmark.gif"); "")C.@If(Approved = "Yes"; @Icon(82); @Icon(0))D.@If(Approved = "Yes"; @Column(82); @Column(0))Answer: A10. Anna wants to add a field to her form that allows one or more values to be selected from a scrolling fixed size field. What type of field should she use?A.ListboxB.KeywordboboxD.Dialog ListAnswer: A11. When Eduardo tried to save a document, he got the following error message:Incorrect data type for operator or @Function: Text Expected.Which one of the following did he most likely do to cause this error to happen?A.He entered text in a number field.B.He neglected to place a formula in a validation event.C.He neglected to place a formula in a translation event.D.He combined a text field and a time field in a formula.Answer: D12. When Tony looks at his video due date in the Video Rental database main view, he sees a due date time of 9 a.m. Bob is in a different time zone, and sees Tony's due date as 11 a.m. What setting causes the times to be different for Bob and Tony?A.The Column Properties window has Display Time set to Always show time zone.B.The View Properties window has Display Time set to Adjust time to local zone.C.The Column Properties window has Display Time set to Adjust time to local zone.D.The View Properties window has Display Time set to Show only if zone not local.Answer: C13. Yuki wants to add a field to her form that allows multiple values to be selected or cleared by clicking next to the item. What type of field should she use?A.TextB.CheckboxboboxD.Radio ButtonAnswer: B14. Rita has built an agent that changes documents with an Approved status to a status of Ready To Pay. When creating a scheduled agent, what are her options for the schedule frequency?A.Hourly, Daily, Weekly, Monthly, AnnuallyB.Once, Daily, Weekly, Monthly, Annually, NeverC.On Startup, On Shutdown, Daily, Weekly, MonthlyD.More than once a day, Daily, Weekly, Monthly, NeverAnswer: D15. Which one of the following can be printed from the Domino Designer IDE?A.Current selectionB.Alternative languageC.Only LotusScript languageD.Other objects Alternative languageAnswer: A16. Burt has been asked to create a unique key to identify each rental transaction in the Video Rental database. What @Function can he use to create this key?A.@KeyB.@UniqueC.@UniqueKeyD.@RandomKeyAnswer: B17. Brett has written an action button that extends the due date of a video. When the due date has been recomputed, he would like a pop-up box to display that shows the new due date. What @Function will give him this functionality?A.@PromptB.@DialogC.@PicklistD.@MessageboxAnswer: A18. Oscar has a database that is designed to be used by the Notes client and a Web browser. He's addinga new view that should only be accessible by people using the Notes client. How can he accomplish this task?A.Set the "$HideFrom" design element field to a value of Web.B.Select Hide design element from Web browsers in the Column Properties window.C.Select Hide design element from Web browsers in the Design Document properties for the view.D.Clear Web browsers from the Who can use this view?" ption in the View Properties window. Answer: C19. Robert does not want Authors in the Video database's ACL to be able to edit certain fields in documents that they created. Which one of the following can he do to accomplish this task?A.Set field security options to Must have at least Editor access to use.e a Readers field on the form to prevent access to existing documents.e an Authors field on the form to prevent access to existing documents.D.Create a standard section on the form and put the restricted fields in the section.Answer: A20. Jorge has built a Ticket Tracking application that is accessed using a Web browser. When users bookmark a document in their browser, the bookmark title should show the date and status of the ticket. How would Jorge accomplish this task?e a window title formula of @Text(TicketDate) + " - " + TicketStatuse a bookmark title formula of @Text(TicketDate) + " - " + TicketStatusC.Create a $WindowTitle field with a formula of @Text(TicketDate) + " - " + TicketStatusD.Create a $BrowserTitle field with a formula of @Text(TicketDate) + " - " + TicketStatusAnswer: A。
Killtest 分享190-849 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-849Title:Version : DEMOIBM Lotus Notes Domino 8 SysAdmn: Managing Users and Servers1. In which of the following databases does the Server Health Monitor store it's health reports?A. shmon.nsfB. dommon.nsfC. statrep.nsfD. serverhm.nsfAnswer: B2. Which of the following is not available for modification with the install manifest?A. SametimeB. ActivitiesC. IBM Productivity ToolsD. Composite application editorAnswer: A3. Smart Upgrade failover utilizes what search order?A. By document link in the Notes clientB. By server name and hard-coded path to the Smart Upgrade databaseC. By database replica ID and database name in the home server clusterD. By notes.ini variable on the client listing all servers in the domain the Smart Upgrade database may be found onAnswer: C4. You want to restrict simple search to enhance server performance by preventing users from searching databases on a server that do not have full-text search enabled. In which of the following locations is this configured?A. The server documentB. The server notes.iniC. The server configuration documentD. The advanced properties of each databaseAnswer: D5. Jordan, the Domino administrator, has configured replication probes in DDM but nothing is being reported into the DDM database. What could be the possible cause of this?A. Replication is up to date and was attempted, but was considered Null.B. Replication was attempted but the destination server could not be reached for the probe check.C. Replication was performed and numerous changes were made to the source database and none to the spokes.D. Replication was attempted but the source server did not have proper access to replicate so replication was skipped.Answer: A6. Liz wishes to disable transaction logging for a particular database on a server with transaction logging enabled. However, she cannot see the Advanced Database Properties to do so. What is the cause of this?A. She is not in the Administrators field on the server document.B. She cannot selectively turn off transaction logging for individual databases.C. She must add the notes.ini line to the server DisableTransLog=name of database.D. Transaction logging can only be disabled per document, not for an entire database.Answer: A7. Which of the following mail features is not available in the basic version of the Lotus Notes client?A. Message recallB. Attention indicatorsC. Choice of preview pane locationD. Reply to all without attachmentsAnswer: C8. The Smart Upgrade function can be configured to adjust an installation between just the Notes client or all clients automatically. Where is the parameter read to make this automatic adjustment?A. The Notes client notes.ini fileB. The Domino server notes.ini file that holds the Smart Upgrade databaseC. The server document for the server that holds the Smart Upgrade databaseD. The server configuration document for the server that holds the Smart Upgrade database Answer: A9. When installing the Notes client, what documents are created by default that contain communication, Java applet security and port information?A. AccountB. LocationC. ConnectionD. CertificateAnswer: B10. You are enabling a policy for the Productivity Tools. Which of the following is NOT available to configure in this policy?A. The ability to open SmartSuite filesB. The ability to allow the user to run macrosC. The ability to allow the use of Productivity ToolsD. The ability to restrict attaching Productivity Tool documentsAnswer: D11. New and updated features and plug-ins for the Lotus Notes client are downloaded from which of the following?A. Client sitesB. Updates sitesC. Smart Upgrade sitesD. Provisioning clientAnswer: B12. The Marble Corporation has chosen to allow users the ability to initiate Eclipse updates. In which of the following locations do they enable this ability?A. The server documentB. The security policy documentC. The server configuration document and the client notes.iniD. The desktop policy document and the plugin_customization.ini fileAnswer: D13. Which task performs the operation of obtaining diagnostic data after server and client crashes?A. Fault AnalyzerB. Fault RecoveryC. Event Handler NotificationD. Automatic Diagnostic CollectionAnswer: D14. When setting up automatic diagnostic collection for clients, you can designate which of the following?A. Whether this feature should log the fault recovery into the local log.nsf database on the clientB. Whether this feature should export the document into an Excel spreadsheet to categorize the faultC. Whether this feature is invisible to users or should users be prompted to designate if they want to send a diagnostic report to the mail-in databaseD. Whether this feature should create a file that gets automatically upload to the Domino HTTP server to allow client reporting from any location over any connection speedAnswer: C15. Shawn has modified a DDM probe document. What must be performed for this probe change to become active immediately?A. Run the console command "reload probes".B. Run the console command "restart probes".C. Do nothing as modified probe documents take effect immediately.D. Probes are automatically reloaded based on the configuration time specified in DDM.nsf.Answer: C16. Breanna has registered a roaming user. By default, where are the user's files stored?A. On all serversB. On all mail serversC. On the user's mail serverD. On the user's file serverAnswer: C17. Which of the following is enabled when the administrator specifies the maximum number of Smart Upgrade attempts by specifying a value in the field "Maximum Concurrent Downloads"?A. Smart Upgrade LimitsB. Smart Upgrade MaximumC. Smart Upgrade IntervalD. Smart Upgrade GovernorAnswer: D18. The Domino administrator has enabled auto-save for all users. Where are auto-save documents stored?A. To a user's local databaseB. To a user's mail database located on the serverC. To an administrator defined server database per userD. To an administrator defined central repository databaseAnswer: A19. Cherelle, the Domino administrator, is launching Server Health Monitoring for the first time. What tasks are monitored by default for each server?A. HTTP, SMTP, Adminp and the AmgrB. The core server task, HTTP, SMTP and AdminpC. No tasks until the administrator configures the monitoring for each serverD. All tasks currently running when the Server Health Monitor is first launchedAnswer: D20. The condensed Directory Catalog is created from which template?A. dircat.ntfB. dircat5.ntfC. dircat7.ntfD. catalog.ntf Answer: BThis document was created with Win2PDF available at . The unregistered version of Win2PDF is for evaluation or non-commercial use only. This page will not be added after purchasing Win2PDF.。
Killtest 分享QQ0-300 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : QQ0-300Title:Version : DemoHDI qulilfied help desk manager(hdm)1. What are two roles of expert systems in Help Desk applications? (Choose two.)A. to narrow down the type of problem and suggest resolutionsB. to provide Help Desk analysts withAnswers to every customer questionC. to provide a direct channel to vendors' marketing departments for new systemsD. to provide assistance to second-level analysts for more advanced troubleshootingAnswer: AD2. Which three statements regarding the Help Desk and customer perceptions are true? (Choose three.)A. Mediocre service is generally acceptable if the customer likes you personally.B. Mediocre service can cause a customer gradually to want to do business somewhere else.C. A bad interaction can initiate a customer's split-second decision never to do business with you again.D. A positive interaction can initiate a customer's split-second decision to continue doing business with you.Answer: BCD3. Contract staffing is best described by which statement?A. Contract employees typically work for a clearly defined time frame.B. Contract employees need more initial training than full-time employees.C. Contract employees perform work that is not normally done by a full-time employee.D. Contract employees work independently and are not considered part of an organizational unit. Answer: A4. Your Help Desk is 24x7 and covers support for many areas throughout the country. An upcoming snow storm is expected to cause power outages. What helps you prepare for the upcoming days?A. callAnswer plansB. contingency plansC. UPS usage reportsD. gap analysis reportsAnswer: B5. A key component of being a qualified Help Desk manager is flexibility. In order to be a flexible Help Desk manager, you should demonstrate creative thinking, be prepared to provideAnswers on undocumented procedures, and _____.A. be positiveB. be able to multitaskC. be willing to participateD. use personal abilities and resourcesAnswer: B6. You are supporting someone from a different culture. How can you improve your communication? (Choose three.)A. speak slowly and loudlyB. pause to verify understandingC. encourage the person to ask for clarificationD. use proper/standard language expressions (eliminate slang)Answer: BCD7. Which three methods clarify understanding of organizational missions, strategies, strengths, weaknesses, and capabilities? (Choose three.)A. focus groupsB. round-table meetings with employeesC. consistent and high-impact feedback to team membersD. interviews with key stakeholders, customers, and leadersAnswer: ABD8. Which three statements about contract staffing are true? (Choose three.)A. It enhances teamwork.B. It allows the company to "try before they buy."C. It provides the ability to manage periodic peaks in workloads.D. It can reduce the time it takes for agents to be effective on the phone.Answer: BCD9. What can a Help Desk manager do to encourage Help Desk analysts to keep current with industry developments? (Choose three.)A. promote information sharing and learningB. put processes in place for encouraging creativityC. put procedures in place for screening potential ideasD. prevent open discussions of new technologies at workE. require a formal plan before consideration of new ideasAnswer: ABC10. Which two actions ensure consistent customer service? (Choose two.)A. acknowledge the benefit of the customer's ideaB. ascertain that priority and severity levels are congruentC. provide everyone on the Help Desk with similar trainingD. ensure that customers are aware of Help Desk contributionsAnswer: BC11. Which analysis report helps a manager determine the need for additional organizational skill development?A. job analysisB. gap analysisC. project analysisD. analyst analysisAnswer: B12. When marketing a support center, what should be clearly communicated to stakeholders?A. return on investmentB. staffing requirementsC. implementation timelinesD. infrastructure requirementsAnswer: A13. Customer satisfaction surveys provide feedback on _____. (Choose two.)A. corporate directivesB. your Help Desk's performanceC. how well you are fulfilling your missionD. how to create levels of service that are negotiated and standardizedAnswer: BC14. Which three statements about effective inter-departmental relationships are true? (Choose three.)A. Management responsibilities are shared.B. Other departments are supported even when they make a mistake.C. You treat people in your organization as if they were your customer.D. Information is shared among departments within your organization.Answer: BCD15. Service Level Agreements document the level of service provided as well as the level at which that service is provided by which two parties? (Choose two.)A. customerB. stake holderC. service providerD. Help Desk managerE. service-level managersAnswer: AC16. Who is the most effective advocate for raising awareness of a support center in a business?A. team leadersB. first-line supervisorsC. senior managementD. middle managementAnswer: C17. Which two tools can the Help Desk most effectively use to provide key information to all customers and communicate the severity of a problem rapidly? (Choose two.)A. e-mailB. voice mailC. white boardsD. instant messengerE. overnight express mailAnswer: AB18. How can the Help Desk best manage new services and achieve its primary goal of eliminating negative impact on your customers?A. be prepared to add staff should a new service failB. be active in the implementation plan for new productsC. meet regularly with stakeholders to determine training gapsD. meet regularly with focus groups and team members to evaluate past performancesAnswer: B19. What destroys the reputation of the Help Desk and ruins the integrity of the company?A. poor flexibilityB. poor confidentialityC. poor business plansD. poor problem resolutionAnswer: B20. Which management task ensures the highest levels of customer satisfaction?A. performing reviews of customer survey responsesB. performing periodic reviews of satisfaction survey responsesC. evaluating customer responses against standards, and then making process changesD. performing random telephone surveys with customers, and then recording the responses Answer: C。
Killtest 分享190-841 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-841Title :Version : DemoIBM Lotus Notes Domino 8 Implementing &Administering Securi1. Louisa, a mobile user, had her laptop stolen at a recent convention. You, as the Domino administrator, did not have a security policy in effect and Louisa had used part of her name for the password. When Louisa logged into the server at the office she received a prompt that contained the following:"You have a different password on another copy of your ID file and you must change the password on this copy to match"She claims she had the same password across all her id files previously, so she called you in attempt to fix her issue. Which of the following is the reason for the prompt and the best preventative step to take as the administrator?A.She has passed her grace period for password changes so her id must be recertifiedB.Password quality checking is enabled and her account should be deleted and recreatedC.She utilizes a Smartcard for access and you cannot have passwords match across id filesD.Password verification is enabled and you should clear her password history in her person documentWArialZXAnswer: D2. Your Domino Directory contains two organizations that are cross certified since the merger took place two years ago. There are numerous users under both organizational certifiers. You work under the certifier for NewSports and the other organizational certifier is under the name SportsFundamentals. SportsFundamentals is cross certified with ShippingEtc and there cross certificate is contained in the Domino Directory. You now need access to the same ShippingEtc domain so you enter User Security and obtain all the cross certificates from the Domino Directory. However, this certifier will not populate your personal address book as a cross certificate. Which of the following is the cause?A.You do not share a common ancestorB.The cross certificate is encryptedC.You cannot pull cross certificates from the Domino DirectoryD.Only servers may use cross certificates in the Domino DirectoryWArialZXAnswer: A3. You wish to verify a digital signature of a mail message sent to your from a foreign organization. Which of the following best verifies the signature?A.The existence of a cross-certificateB.Download the web Internet certificate from the sender's websiteC.Send an encrypted reply message to the originator of the messageD.Open the message properties dialog and verify the field $X-MIMEDigSig has a value of 1WArialZX Answer: A4. Users have had recovery information embedded into their id file since version5.0.8 of Notes and Domino. They currently run version 8.0 of Notes and Domino. However, Joshua is moving from the Notes administration team and into another group. Matthew will take his place. Which of the following describes the steps necessary to remove Joshua and add Matthew in his place as a proper id recovery authority for the certifier utilized for user creation and recertification?A.Matthew and Joshua will have no stpes to perform. Adding the new administrator to the administrators group in the Domino Directory automatically recertifies the usersB.Joshua must issue an Adminp request to "remove admin from certifier" from the Domino Administrator client and then Matthew must enter an Adminp request to "add admin to certifier". Both must be approved by another administrator before recertifying usersC.Recovery information in the certifier id utilized to certify and register users must be modified to add Matthew and remove Joshua. A recertification of the users under that certifier must occur. Notes 7.0.1 will NOT prompt the user to accept the change in recovery informationD.The certifier in question must have all recovery authorities removed. A recertification of existing users must occur to accept the removal of Joshua. Then the certifier must be modified again to add Matthew as a recovery authority and the users recertified a final time. They will then accept Matthew as a recovery authority when prompted.WArialZXAnswer: C5. Authentication has been enabled for the SMTP TCP/IP port on your Domino SMTP server. Through testing you are able to successfully authenticate and send mail to the server over SMTP. However, other users are unable to connect successfully. You have verified their username and passwords are being entered correctly. Which of the following best describes why the users cannot authenticate via SMTP withyour Domino server?ers may only connect via SSL to provide a username and password for SMTPB.The server requires more complex passwords to be supplied for Internet portsC.Enforce Server Access setting is enabled and the users are not in the Access Server fieldD.The users do not have the security policy document applied to their person documents for SMTP connectionsWArialZXAnswer: C6. Steve configures the CRL which creates a new Internet certifier and stores it in the certifier's ICL database. Steve can also store the CRL certifier where?A.He can also store the CRL in his local id file for revocation and ICL lookupsB.He can also store the CRL in the Domino Directory in the CA's certifier documentC.He can also store the CRL in the Internet Lockout database to verify presented certificatesD.He can also store the CRL in the Certificate Authority database on the server verifying the ICL databaseWArialZXAnswer: B7. As a user, you receive HTML mail regularly that prompts you to retrieve certificates when certain portions require it. However, you would like to trust numerous consumer web sites in advance of receiving their emails. Which of the following provides the best way to accomplish this?A.Manually enter the name of each site into your personal address bookB.In User Security, retrieve Internet security certificates from each server over whatever port is requiredC.Open you Domino Directory for your domain and import all the cross-certificates into your personal address bookD.Send out a certificate request email to each site and use Actions-Accept Certificate from your in-box for each email returned containing a certificate attachedWArialZXAnswer: B8. Secure Socket Layer is defined on your Domino server with a certificate from a public Internet Certificate Authority. Users can successfully connect and authenticate with SSL V3 client types. However,users with SSL V2 type clients are unable to connect or verify the certificate issued by the public Internet Certificate Authority. Which of the following statements about your Domino SSL server security remains true with this configuation?A.SSL must be enabled for all server portsB.SSL can ONLY be enabled for POP3, IMAP and SMTPC.If a server is using SSL, users must access the server using a browserD.You can require SSL connections for all databases on a server or for an individual databaseWArialZX Answer: D9. Internet certificates for regular employees are being stored separately from certificates for previous contractors of your organization. You were managing multiple Internet certifiers for each group. Which one of the following best describes where Certificate Revocation Lists are stored for the contractors?A.In the ICL database and the Domino DirectoryB.In the Certificate Authority document in the Domino DirectoryC.In the security settings policy document in the Domino DirectoryD.In a TXT file defined by the notes.ini of the administration serverWArialZXAnswer: A10. Andrea, the Domino Administrator, is attempting to provide SSL authentication for each Internet Site Document. She has obtained the domain names for each site her company will be utilizing on the Domino server. However, she has not created an Administration ECL for her Notes users at this time. Which of the following is required to accomplish the SSL authentication for each site?A.A single keyring file for the web server must be assigned with a new Administration ECLB.A server keyring file for each site document must be assigned with no change to the Administration ECLC.Multiple keyring files for each site document must be assigned with duplicate Administration ECLs for each siteD.Multiple HTTP instances on the Domino server must be initiated with no change to the Administration ECL for the main Domino domain, but new Administration ECLs must be created for the additional domainsWArialZXAnswer: BThe safer , easier way to help you pass any IT exams.11. You have created a list of IP Addresses that are allowed access and a list of IP Addresses that are denied access for web security. Both are placed in the appropriate fields and the other access fields are set to the default. Which field takes precedence BY DEFAULT when the same IP address is found in both lists and not in any of the alternate default set fields?A.The Allow Access fieldB.The Deny Access fieldC.The Substitution Access fieldD.An error will be presented stating an address may not be in both fieldsWArialZXAnswer: A12. A phone call prompts you to immediately revoke an Internet certificate due to a compromised key. After verifying the caller as a trusted source, what database will you access to revoke the Internet certificate that was compromised?A.The CA database for the certifier that issued the certificateB.The ICL database for the certifier that issued the certificateC.The CRL database for the certifier that issued the certificateD.The CERT database for the certifier that issued the certificateWArialZXAnswer: B13. Barbara wishes to migrate her company's Notes certifier to the new Certificate Authority process. She has chosen to encrypt the certifier id with the server id instead of creating a specific trusted id. What Domino server console command must be issued to secure the certifier?A.load activate caB.load ca unlockC.tell ca activateD.tell ca unlock WArialZXAnswer: C14. Curtis enabled extended access control on his domain's Domino Directory to restrict access to the Internet password field against malicious attacks. Once xACLs were enabled, some LDAP queries ceased functioning. Which of the following best represents why certain LDAP queries ceased functioning?A.LDAP may not be utilized against xACL enabled Domino DirectoriesB.Anonymous access via LDAP is not allowed against xACL Domino DirectoriesC.LDAP anonymous access is not controlled by the list of fields in the All Server Configuration documentD.Authentication may only be performed with full canonical names once xACLs are enabled on a Domino DirectoryWArialZXAnswer: B15. Effective access has been chosen as a security measure for certain databases in your environment. The first database to be enabled is the Domino Directory. As the administrator responsible for configuring the change, which of the following two items must be met for effective access to be enabled while allowing users to still address mail via type-ahead?A.The ACL must have -Default- set to Reader and the server must have the LDAP task loadedB.The ACL must have Anonymous removed and the -Default- setting must be a minimum of readerC.Groups may not be utilized in the ACL and LDAP, IMAP and POP3 must not be enabled on that serverD.The selection to enforce a consistent ACL should be enabled and users must have a minimum of reader accessWArialZXAnswer: D16. The size of a SSL session key is determined by which of the following?A.The cipher being usedB.The user password strengthC.The creation date of the SSL certificateD.The expiration of the public key presented by the connecting hostWArialZXAnswer: A17. Which of the following identifies the two types of ECLs ?A.Public ECL and Personal ECLB.Workspace ECL and Limited ECLC.Administrator ECL and User ECLD.Administration ECL and Workstation ECLWArialZXAnswer: D18. Mitchell needs to temporarily allow an undefined owner of a script access to the local file system. When prompted by Lotus Notes, which of the following options provides the script to run while preventing future unprompted access?A.Start trusting the signer to execute this actionB.Trust the signer to execute this action for this Notes sessionC.Allow the signer to access local file sytem on all but network drivesD.Embed the signer as an allowed ACL entry and prompt for future accessWArialZXAnswer: B19. You, as the Domino administrator, have defined a password quality restriction of 1 for a user id file. Which of the following best describes what is required from the user when changing their password?A.No password is requiredB.Any password is requiredC.Special characters are requiredD.Any password that does not start with a space is requiredWArialZXAnswer: B20. Password quality above which of the following levels are resistant to automated password attacks?A.6B.10C.13D.16WArialZXAnswer: C。
Killtest 分享190-611 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-611Title :Version : DEMOLotus Notes Domino 6 Application DevelopmentIntermediate Skill1.The documents in the SafetyPolicies.nsf database contain many graphics. Users are complaining that the documents are taking too long to open. Which one of the following database settings can John enable to improve performance when opening documents?A.Disable graphic displayB.Display images after loadingC.Do not allow headline monitoringD.Document table bitmap optimizationCorrect:B2.For which one of the following reasons did Gord calculate and store information in documents prior to displaying it in a view?A.For faster view indexing speedB.To decrease the amount of disk space needed for calculationsC.To format the currency symbol correctly according to local international settingsD.Because the numbers calculated in a view have a lower precision than those stored in a document, and the values might be very largeCorrect:A3.John is building an application. He wants to be able to locate one particular document across all database replicas. Which one of the following IDs will allow him to locate that document?A.DocumentIDB.NoteIDC.DatabaseIDD.UNIDCorrect:D4.DECS is installed. To ensure that Sam's form will connect to an external data source, he must do which one of the following?A.Install the DCR plug-in on the Lotus Domino server.B.Select the "store locally" option in field properties.C.Define a field on the form to map to the external data.D.Specify the default metadata object in form properties.Correct:C5.App1.nsf has been moved from ServerA/World to ServerB/World. Documents routed to that database are being returned to users as undeliverable. Which one of the following documents should Monique edit?A.ServerB.WorkflowC.ConnectionD.Mail-in databaseCorrect:D6.Cindy locks a design element and leaves on vacation. The design element has to be changed. Which one of the following people can change it?A.Only CindyB.The database managerC.The system administratorD.Any editor of the databaseCorrect:B7.Which one of the following statements of View Logging is TRUE?A.It requires that the Default access be set to Designer.B.It sends alerts about changes users make to views.C.It allows designers to track changes to views locally.D.All updates to Notes views or folders are recorded in the transaction log for recovery purposes. Correct:D8.Susan creates a sales reporting database that has information downloaded daily from a host application. 1. Each document contains the monthly sales for 10,000 products, entered by part number. 2. Because Susan gets a complete set of data every day, her agent deletes all of the documents in the database. 3. New documents with the same part numbers are created so they are identical in the views. 4. The application is used globally and resides on many servers. Which one of the following describes the problem this will cause?A.There will be a heavy replication burden.B.The users will not be able to easily find the same information from day to day.C.There will be replication conflicts because many of the documents will be exactly the same.D.Only 4,294,836,225 new documents can be created in a database before the number of unique UNIDs runs out.Correct:A9.Susan plans to change the forms and views of a production database. She will make the changes locally and then update the application's design template with the changes. Which one of the following server tasks will push the new design changes from the template into the production database?A.ROUTEB.DESIGNC.UPDALLD.FIXUP - DCorrect:B10.Bill wants to provide context-sensitive Help on his forms in the Video application so that users can open them by pressing the F1 key. Which one of the following best describes what Bill can do to override the default F1 context-sensitive Help of the Notes client?A.Write a formula for the onHelp event on the forms.B.Create a JavaScript applet that is embedded in the forms.C.Bill cannot override the default Notes client F1 Help on his forms.D.Enable context-sensitve Help on the database Advanced properties.Correct:A。
Killtest 分享190-710 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-710Title :Version : DEMOIBM Lotus Notes Domino 7 App.DevelopmentFoundation Skills1.Mary has a Notes application that is used by employees in Europe and Japan. Each group of employees has a server located in its own geographical location. Mary needs to have versions of her application in both locations for efficient access, and the application data and design must stay synchronized in both locations. How can Mary accomplish this?A.Create a copy of the database in both locations with the menu option File>Database> New Copy.B.Create a replica of the database in both locations with the menu option File>Replication>New Replica.C.Create a mirror copy of the database in both locations with the menu option File>Database>Mirror Database.D.Create a synchronized copy of the database in both locations with the menu option File>Synchronization>New Copy.Correct:B2.Herb has some data to display in a form, and he would like to have it appear in a formatted grid. What option would he use to format this data layout?A.Create > GridB.Create > TableC.Create > Data LayoutD.Create > Formatted DisplayCorrect:B3.Jayne has asked her Domino server administrator to enable document locking on the server. Which of the following must she do to enable it for her application?A.Enable the "Allow document locking" database property.B.Create a view column for the locked document view icon.C.Add a profile document to the database to manage the locked documents.D.Enable document locking at the view level for each view in the database.Correct:A4.Colby has a default level access of Author in the Suggestion database. She created a new suggestion, but was unable to edit the document later. Why would this problem occur?A.The document does not have a Readers type field.B.The document form does not have an Authors type field.C.She needs the "Edit document" option added to her access.D.She needs at least editor access to edit her documents in the database.Correct:B5.Erin has created a new view in her mail file, and she doesn't want the view removed when the design is refreshed from the main design template. What setting will keep her view from being deleted?A."Prohibit design refresh or replace to modify" in the View Properties dialog boxB."Prohibit design refresh or replace to modify" in the Database Properties dialog boxC."Prohibit design refresh or replace to modify" in the Design Document Properties dialog boxD."Prohibit design refresh or replace to modify" in the Template Design Properties dialog boxCorrect:C6.Cam has created a new design for her Video application. Cam would like to post the design to the server and make it available so other databases can automatically inherit the design changes when the DESIGN server tasks runs. Which of the following should Cam do to make the new design available on the development server?A.Copy the database to the development server, and name it "newvideo.ntf".B.Copy the database to the development server, and name it "newvideo.nsf".C.Copy the database to the server, name it "newvideo.ntf", select "Inherit design from master template", and give it a template name in the database Design properties.D.Copy the database to the development server, name it "newvideo.ntf", select "Database file is a master template", and give it a template name in the database Design properties.Correct:D7.Sal wants to allow Jackie to create and modify documents in his Video application, but he doesn't want Jackie to make a local replica or copy of the database. Which of the following should Sal do to accomplish this?A.There is no way for Sal to do this.B.Give Jackie Author access on the database ACL.C.Give Jackie Editor access and deselect "Replicate or copy documents" in the database ACL.D.Give Jackie Editor access on the database ACL and assign a role that prevents him from replicating or copying documents.Correct:C8.Christopher is making a new database using the "NewVideo" Design Template that he plans to customize. He wants to make sure that his new application will not get future modifications to the "NewVideo" Design Template. Which of the following should Christopher do to accomplish this?A.Create a blank database and refresh the design of the new database using the "NewVideo" Design Template.B.Create the new database from the "NewVideo" Design Template and deselect "Inherit future design changes" in the New Database dialog box.C.Create the new database from the "NewVideo" Design Template and then open the database Design properties and select "Database is a master template."D.Create the new database from the "NewVideo" Design Template and then open the database Design properties and select "Database file is a master template."Correct:B9.AJ wants to create a new application on his laptop that does not have any design elements in it. Which of the following should he do to begin this process?A.Select File > Database > New and give it a filename of "blank.nsf".B.Select File > Database > New and choose local as the server, then choose the blank template.C.Select File > Database > New, choose local as the server, then choose the default.ntf template.D.Select File > Database > New, give it a filename of "blank.nsf", and chose the blank template. Correct:B10.Clarissa has created a view of videos that are currently checked out. She would like to displaya stoplight icon in the view for videos that are overdue. What column property does she need to select to accomplish this?A.Show icons onlye icon as valueC.Show custom icon imageD.Display values as iconsCorrect:DThe safer , easier way to help you pass any IT exams.。
Killtest 分享QQ0-400 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : QQ0-400Title:Version : DemoHDI qualified customer supprot specialist(css)1. What is the best action to take when sharing a workspace?A. Keep a log of daily activities to share with next shift.B. Label all of your personal property.C. Refrain from loading personal software onto computer equipment.D. Shut down the computer equipment at the end of each shift.Answer: C2. Which statement best describes a good leader?A. Good leaders demonstrate absolute control over their teams.B. Good leaders do not need to offer incentives.C. Good leaders encourage initiative.D. Good leaders make all the decisions for their staff.Answer: C3. Whicht is an example of data that must be protected by security policies?A. Department addresses.B. General telephone numbers.C. Head office marketing handouts.D. Personal information.Answer: D4. What is a best practice to use when placing a customer on hold?A. Document your actions in the incident record.B. Ensure that the hold music is working.C. Provide a valid reason for putting the customer on hold.D. Set a reminder so that you don forget the customer.Answer: C5. Which of the following techniques is the best one for reducing and eliminating conflict during a call?A. Match the customer attitude.B. Refrain from interrupting the customer.C. Stop using the customer name.D. Tell the customer you feel sorry for them.Answer: B6. What is the most important reason for using customer satisfaction surveys?A. Customer satisfaction surveys allow customers to say what they really think without offending Support Centre staff.B. Customer satisfaction surveys help to determine if customer service expectations are being met.C. Customer satisfaction surveys provide an accurate set of management reports on SLA performance.D. Customer satisfaction surveys provide information that can be used to assess blame for problems. Answer: B7. What is the major difference between problem management and incident management?A. Incident management and problem management are the same.B. Incident management aims to get people back to work quickly and problem management tries to stop incidents from recurring.C. Incident management aims to prevent problems from occurring in the first place, and problem management solves problems.D. Incident management is used first, and problem management is used if incident management does not work.Answer: B8. What is the best reason for using proper grammar and spelling when documenting incidents?A. Not using proper grammar and spelling is sloppy.B. Not using proper grammar and spelling will anger the customer.C. Using proper grammar and spelling is professional.D. Using proper grammar and spelling will impress your supervisor.Answer: C9. What is a best practice for effective cross-cultural communication?B. Increase the pace of the call.C. Repeat everything that the customer says.D. Use proper language expressions.Answer: D10. A customer calls with a problem you know they could solve using the Support Centre web site. What is a best practice for encouraging the customer to try self-help?A. Ask if they have tried the website and give them theAnswer.B. Respectfully talk them through the self-help process.C. Send them an e-mail with a link to the web site.D. Tell them that theAnswer is on the web site and give them the URL.Answer: B11. Which metric is used to measure the average amount of time that a customer waits before a call is Answered?A. Abandon beforeAnswer.B. Availability.C. Average speed toAnswer.D. First contact resolution.Answer: C12. What type of question will best encourage a customer to talk more about their incident?A. Closed questions.B. Open questions.C. Technical questions.Answer: B13. What is the best reason for providing status updates to your customers?A. Providing status updates demonstrates sympathy for the customer.B. Providing status updates ensures that you control the call.C. Providing status updates is required by the SLA.D. Providing status updates reduces the number of inbound calls.Answer: D14. Which of the following is most likely to be a barrier to communication?A. The customer ability to use self-help systems.B. The customer previous experience with the Support Centre.C. The customer position in the business.D. The level of support provided by the Support Centre.Answer: B15. What is the best reason for using a standard greeting whenAnswering telephone calls?A. Using a standard greeting complies with Support Centre standards.B. Using a standard greeting ensures consistent service.C. Using a standard greeting makes the customer feel humble.D. Using a standard greeting prevents individuals developing their own greetings. Answer: B16. Why is it important for you to demonstrate confidence when dealing with others?A. Demonstrating confidence establishes credibility with customers.B. Demonstrating confidence increases first contact resolution.C. Demonstrating confidence maximises talk time.D. Demonstrating confidence minimises conflicts with customers.Answer: A17. What is the most important benefit of being empathetic towards your customers?A. Your customers will know that you feel sorry for them.B. Your customers will know that you can fix their problem for them.C. Your customers will know that you understand how they feel.D. Your customers will want to talk to you whenever they call.Answer: C18. Which statement best illustrates the concept of providing consistent service?A.Answer all calls within 15 seconds or 3 rings.B. Escalate all calls within 10 minutes if noAnswer is available.C. Give each customer anAnswer on first contact.D. Provide all callers with the same quality of service.Answer: D19. What is the best description of process management?A. Process management is accomplishing tasks that we can test, report, and improve upon.B. Process management is a formal concept that we work with.C. Process management is a set of rules that can never be bent or broken.D. Process management is red tape that prevents creativity.Answer: A20. What is a best practice to use to disengage from a customer?A. Tell the customer the office is closing and you will call them tomorrow.B. Tell the customer your queue is backing up.C. Transfer the call to your supervisor.D. Use closed questions. Answer: D。
Killtest 分享1T6-521 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 1T6-521Title :Version : DEMOApplication Performance Analysis & Troubleshooting1. One component in an application turn is __________.A. Server response timeB. Network process timeC. Application response timeD. Client acknowledgement timeAnswer: A2. When creating a filter in the Sniffer to select only the traffic to or from the client for a particular conversation, the best approach is to focus on a __________.A. TCP well known port numberB. TCP unknown port numberC. TCP ephemeral port numberD. TCP port number in the range 512-1024Answer: C3. When using Application Intelligence, Server Time may be defined as __________.A. The total time required to send a request and receive a responseB. The total time packets are on the network for a particular flowC. The total time it takes for a packet to travel from client to server based on TCP handshakesD. The net time for the server to respond to a client requestAnswer: D4. A large Window size used by a client could cause __________.A. The server to consume more resourcesB. Increased number of ACKs to be sentC. Increased delay when frames are lostD. None of the aboveAnswer: D5. _______ is the amount of time, based on the engineering of the network, to complete a task.A. ThroughputB. DelayC. Access timeD. LatencyAnswer: B6. __________ is a protocol used to perform Control and Signaling functions in a VoIP conversation.A. Session Initiation ProtocolB. Real-Time Streaming ProtocolC. Cisco Skinny Client Control ProtocolD. All of the aboveAnswer: D7. When reviewing trace data in a multi-tier application, application server requests can be associated with database responses using __________.A. TCP port numbersB. Request IDC. Raw data in the database responseD. Formatted data in the application responseAnswer: A8. An application that is sensitive to Jitter is primarily sensitive to __________.A. Network congestionB. Bandwidth latencyC. Distance latencyD. Application turnsAnswer: A9. What does a Window value of 8760 in a TCP header mean?A. The sender is confirming the 8760 bytes have been sentB. The sender has 8760 bytes in its bufferC. The sender has received a total of 8760 bytesD. The sender has buffer space for 8760 more bytesAnswer: D10. The TCP 4-way handshake is used to __________.A. Indicate the start of a flow of dataB. Identify the client request parametersC. End a connectionD. Establish a connectionAnswer: C11. When using Application Intelligence, End-to-End Response Time may be defined as __________.A. The total time required to send a request and receive a responseB. The total time packets are on the network for a particular flowC. The total time it takes for a packet to travel from client to server based on TCP handshakesD. The net time for the server to respond to a client requestAnswer: AThe safer , easier way to help you pass any IT exams.12. To accurately calculate __________ we must know the slowest link speed in the path between client and serverA. Distance latencyB. Congestion delayC. Bandwidth latencyD. Round-trip timeAnswer: C13. The image below is a view of the Sniffer Summary window.How many application turns are shown?A. 5B. 6C. 7D. Can not be determined based on the information shownAnswer: A14. Which of the following statements is true regarding the Real-time Transport Protocol?A. Used by several protocols to provide end-to-end transmission of real-time dataB. Uses a proxy agent for client-server communicationsC. Operates as a client-server protocolD. Keep-alive messages provide status informationAnswer: A15. When capturing data in a multi-tier environment, attach the Sniffer to the application server using __________. (Choose all that apply)A. A full duplex interfaceB. A tap on the server connectionC. A mirror on the server switch portD. A mirror on the database switch portE. Two Sniffer network analyzersAnswer: BC16. The well-known port used by FTP servers to establish a Data connection is:A. 10B. 20C. 21D. VariableAnswer: C17. The slowest component on a server will be _______.A. Random Access Memory (RAM)B. Disk I/OC. Central Processing Unit (CPU)D. The constraint (bottleneck)Answer: D18. When using Application Intelligence to isolate traffic distribution we should focus on __________.A. ThroughputB. Number of packetsC. Total number of bytesD. All of the aboveAnswer: D19. Which of the following may contribute to poor application performance? (Choose all that apply)A. Client processing of incoming requestsB. Server processing of incoming requestsC. Queuing of frames on an intermediate routerD. Efficient use of TCP/IP protocolsE. Inefficient configuration of TCPAnswer: BCE20. The __________ type of application usually does not have any request/reply interactions after the initial session is established.A. InteractiveB. Throughput-orientedC. Transaction-orientedD. Streaming Answer: D。
Killtest 分享190-822 题库
NZZV ]]] QORRZKYZ IT▲ Ҳ ԟ ԇThe safer , easier way to help you pass any IT exams.Exam : 190-822Title:Version : DEMOBuilding Forms Applications Using IBM Workplace Froms2.61. Gary is debugging an XForms form and needs to intercept the form while it is opening in the Viewer, presenting a message to the user (himself) as a debug step. Which event handler should he use to activate the message?A. xforms-readonlyB. xforms-model-openC. xforms-model-constructD. xforms-model-construct-doneAnswer: C2. While designing a form for the Webform server, Hank wishes to make sure users enter characters intoa phone number field in a specific format. When will the user be notified if there is an error?A. Upon submissionB. Upon exiting the fieldC. Predictively - during data entryD. Upon navigating to another page on the formAnswer: B3. Abigail is working with Workplace Forms for the first time. After installation, which Eclipse perspective should she switch to in order to begin designing forms?A. FormsB. DesignerC. ResourceD. DeveloperAnswer: B4. While Carrie is reviewing an XFDL source file, she repeatedly sees the term "sid". What is "sid"?A. Scope IdentifierB. Section IdentifierC. Signature IdentifierD. Submission IdentifierAnswer:A5. As Peggy is researching options for UI integration of her new form, she wishes to have "zero-footprint" of client software on her users' desktops. Which deployment model gives her this option by default?A. Webform ServerB. Portal integrationC. Eclipse integrationD. Workplace Forms ViewerAnswer:A6. Randy is preparing to deploy a form to a J2EE server for the first time. In general where should he address the form's access security settings?A. In the signature elements of the formB. At the file system on the host serverC. In the Access Control List of the formD. In the security role settings, or other security context, of the host serverAnswer: D7. Quintessa has a need for data integration between her form and another database system in order to obtain data from the external data source while users complete the form. Which general method of data integration would she investigate first?A. SmartfillB. Web servicesC. Server-side prepopulationD. Template and completed for storageAnswer: B8. Sylvester is developing a forms application that will integrate with a biometric device. As there is no support for biometric devices in the core product, what technology must he use to develop this support?A. The External Function Handler (EFH)B. The device API and the Translation serverC. The Smartfill extension, using Java to communicate with the deviceD. The Java or C language and the Function Call Interface of the Workplace Forms APIAnswer: D9. Marvin is integrating a Workplace Forms form with DB2 Content Manager. What must be created in DB2 Content Manager in order to perform the integration?A. Binders and foldersB. Attributes and item typesC. Databases and instancesD. New versioning policiesAnswer: B10. Webster wishes to align several items on his form as part of final form design. What types of alignment are available to let him accomplish this task?A. Relative and absolute alignmentB. Left, right and center alignmentC. Vertical and horizontal alignmentD. Left to right and left to center alignmentAnswer:A11. Wendy works for an accounting firm, and they are fairly particular about how they like to see numbers on forms. They prefer to see negative numbers enclosed in parentheses instead of with a minus sign. For instance negative one hundred should appear everywhere on their firms as (100) instead of -100. How does she accomplish this goal?A. Use the pad presentation property with the "( )" string as the valueB. Use the pattern data constraint type to provide a pattern for the fieldC. Use a template data constraint type to pre-fill the field with parenthesesD. Use the negativeindicator presentation property to provide prefix and suffix stringsAnswer: D12. Lance needs to calculate interest on a form. However, based on the value placed into another field on the form, the interest rate may be either 5% or 7%. How does he approach this task?A. Use the annuity functionB. Use an if/then/else formulaC. Use the countDatagroupItems to determine of the value in the other field is presentD. Combine the setAttr function to determine if one function fails, if so call another functionAnswer: B13. Kendra would like to have a set of actions available at the top of every page for users to submit forms, print forms, save form data, etc. What design element will help her do this?A. ToolbarsB. Scroll regionsC. Aligned buttonsD. Protected sectionsAnswer:A14. Padma is creating a formula on her form and needs to reference a field value, but the field is a list with several choices. How can she be sure to only use the value that is selected from the list?A. Create an indirect reference to the selected value using the "==" operatorB. Create a direct reference to the selected value using the itemlocation operatorC. Create a direct reference to each cell using a for loop until it returns a valueD. Create an indirect reference to the selected value using the "->" dereference symbolAnswer: D15. Quinn wishes to use a template constraint on a field. How does this help his users?A. It provides a reusable component for use on several pages on a multi-page formB. It limits user input to the visible parentheses, such as with parentheses for telephone numbersC. It provides a way to force users to use either letters or numbers in specific positions in the fieldD. It display symbols in the input area before the user enters their data, giving them an idea of what the field input should look likeAnswer: D16. Darlene has created a form and wishes to suppress several of the fields when printing the form. How would she do this?A. Set the visible property on the fields and their labels to "off"B. Set the printvisible property on the fields and their labels to "off"C. Set the visible property on the fields and their labels to "viewer only"D. Modify the css file to have a difference set of classes for Print mediaAnswer: B17. Nancy is working on a form and wants to add a field that gives users the ability to specify a day of the week (Monday, Tuesday, etc.). What is the fastest way to accomplish this that also takes the least amount of space on her form?A. Use a List field with a restricted list of entriesB. Use a Popup field with a restricted list of entriesC. Use a Combobox field with a restricted list of entriesD. Use a regular field and set the datatype property to day_of_weekAnswer: D18. Mary's manufacturing plant uses complex calculus computations to determine tolerances for its production line operations. She has been asked to include some of these functions on forms that are being developed to support this operation. How can she include these formulas?A. Use the Compute Wizard to duplicate the calculationsB. Submit the form to a back-end database that returns formula results to the ViewerC. Include a custom Java file with the functions written in the Workplace Forms Java APID. Embed a spreadsheet enclosure on the form that includes custom functions in its cell calculations Answer: C19. Pete is creating a form and wishes to determine how much space an item is taking relative to its label. How can he determine this?A. Use "Show Grid" from the Options menuB. Hover over the items to display their outlineC. Use "Show Bounding Boxes" from the design view preferencesD. Display the properties of the item to see the pixel alignment of the itemAnswer: C20. While testing a new form, Ursula discovers that while tabbing from one field to the next, the cursor skips a date field. Why is this?A. The field's properties are set to skip tabbingB. Tabbing skips Date fields with calendar controls by defaultC. Tab order is dictated by the order in which fields are placed on the form, so the field must have been placed out of orderD. The tab order in Workplace Forms is dictated by the programmatic number of the field on the form, so the field number is out of sequenceAnswer: CThis document was created with Win2PDF available at . The unregistered version of Win2PDF is for evaluation or non-commercial use only. This page will not be added after purchasing Win2PDF.。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
NZZV ]]] QORRZKYZ IT
▲ Ҳ ԟ ԇ
The safer , easier way to help you pass any IT exams.
Exam : 190-521
Title :
Version : DEMO
Implementing a Domino R5 Infrastructure
1.Marcus set up SMTP security using TCP/IP without SSL.
Which one of the following is used to authenticate the SMTP connection?
A. Data encryption
B. Message validation
C. Certificate authentication
D. Name-and-password security
Answer: D
2.Ulf set up several server monitoring tasks.
Which one of the following did he NOT set up?
A. EVENT
B. REVIEW
C. COLLECTOR
D. STATISTICS
Answer: B
3.Ann sent a message to Bill but used an incorrect address. She was terminated and her Mail file was deleted.
Which one of the following describes what happened to the message sent to Bill?
A. It was held in the MAIL.BOX as dead mail.
B. It was returned to Susan as undeliverable.
C. It was forwarded to the mail administrator.
D. It was held in the MAIL.BOX as undelivered mail.
Answer: A
4.The amount of information recorded in the Log file can be modified.
In which one of the following are these logging options set?
A. NAMES.NSF
B. NOTES.INI
C. CONFIG.CFG
D. DESKTOP.DSK
Answer: B
5.A system administrator is setting up the Directory Catalog for a mobile user. Most of the setup information is sent from the server to the mobile user.
Which one of the following steps must the mobile user perform?
A. Create a link to the Directory Catalog.
B. Create a Setup Profile name in the Mail file.
C. List the Directory Catalog file in User Preferences.
D. Enter the name of the server upon which the Directory Catalog is located.
Answer: C
6.Janosis a member of both the Bandits and the Administrators groups. The Bandits group is listed in the server's Not Access Server field. The Administrators group is listed in the
server's Access Server field.
Which one of the following happens when Ove tries to access the server?
A. He is denied access.
B. He is allowed access.
C. Domino does not allow a person to appear in both groups.
D. Access is allowed depending upon the database being queried.
Answer: A
7.Which one of the following allows a server to become a passthru server?
A. A Passthru document.
B. A Passthru setting in the Server document.
C. A Connection document in the Domino Directory.
D. A Passthru setting in the server's Location document.
Answer: B
8.In order for a Domino system to work, which one of the following must be set up on every Domino server in the domain?
A. A copy of the Domino Directory.
B. The system's Organization certifier.
C. A replica copy of the Domain Catalog.
D. A replica copy of the Domino Directory.
Answer: D
9.Fred, a system administrator, is implementing a cluster of Domino servers for load balancing.
Which type of server license should he install?
A. Domino IIS Server
B. Domino Mail Server
C. Domino Cluster Server
D. Domino Enterprise Server
Answer: D
Search the Domino 5 admin help with "Cluster Server".
10.Petratried to create a unique user OU but could not do so,
Which one of the following hierarchical OU/O structures would prevent her from doing this?
The safer , easier way to help you pass any IT exams.
A. OU1/0
B. /OU2/OU1/0
C. /OU3/OU2/OU1/0
D. /OU4/OU3/OU2/OU1/0
Answer: D。