What two statements are true about the ID recovery process? (Choose two.)
A. Can be used to recover user ID files.
B. Can be used to recover certifier ID files.
C. Can be used to recover internet passwords.
D. It removes the need for IDs to be stored on the local user's machine.
E. ID recovery administrators do not have to be IBM Domino administrators.
What is the highest level of bit encryption that IBM Domino can generate SSL certificate requests in?
A. 512
B. 1,024
C. 2,048
D. 4,096
What it meant by anti-relay protection?
A. The methods used to restrict what hosts can connect to an IBM Domino server for replication.
B. The methods used to restrict what hosts can be accessed via a Domino passthru server.
C. The methods used to restrict how many external e-mails a user can send through a Domino server.
D. The methods used to prevent unauthorized use of the Domino SMTP server for external messaging.
What is the correct way to create the credential store application?
A. Use Keymgmt commands.
B. Use Cstoremgmt commands.
C. Create the application manually using the credstore.ntf template.
D. Create the application manually using the websecuritystore.ntf template.
A user has Author access in a database. What is he able to do?
A. He is able to create documents.
B. He is able to edit documents he created.
C. He is able to delete documents he created.
D. Create documents only if he also has the "Create documents" access level privilege.
What is the difference between IBM Domino certificates and Internet certificates?
A. There is no difference and the term is interchangeable.
B. Domino certificates are used to secure e-mail, and Internet certificates are used to secure web browsing.
C. Domino certificates can only be used within the Domino environment, and Internet certificates are used to secure SSL links.
D. Domino certificates are used to secure SSL links between Domino and IBM Notes clients, and Internet certificates are used to secure SSL links between Domino and IBM iNotes clients.
What is the operating system requirement to be able to utilize IBM Notes Shared Login on users' machines?
A. The user can run any supported operating system.
B. The user must run a supported 64-bit only operating system.
C. The user must have administrative rights on the operating system.
D. The user must run a supported Microsoft Windows operating system.
An administrator can move a mail database archive when he moves a mail database to another server. Which statement defines when the archive database can be moved with the user's mail file?
A. if the archive is located in the same path as the mail file
B. if the archive is located on the same server as the mail file
C. if the archive is located on the same domain as the mail file
D. if the archive file is not larger than the defined mail quota size
The IBM Notes Install Cleanup Executable (NICE) tool can detect if certain services (e.g. Notes Diagnostics) are running. What will happen if NICE does detect these services?
A. NICE will stop them.
B. NICE will instruct the user to stop them.
C. NICE will ask the user to reboot the workstation in order to stop them.
D. NICE will remove them from the services list and ask the user to reboot the workstation.
John is a developer and would like to sign an XPage to run on an IBM Domino server. What is the lowest level of access privilege he needs in order for the XPage to run?
A. Run restricted LotusScript/Java agents.
B. Sign agents to run on behalf of someone else.
C. Sign XPages to run on behalf of the builder of the XPage.
D. Sign agents or XPages to run on behalf of the invoker of the agent.