While creating the ID vault, you must configure the organizations that trust the vault for ID storage. Which of the following does this create?
A. User policy configurations
B. ID vault administrator accounts
C. Vault trust certificates in the Domino Directory
D. Certifier ID files of the organizations or organizational units with vault trust certificates
You are attempting to utilize the widget catalog to provision features from your central update site for your Standard Notes clients. You have populated the widget catalog on the server. When will the client receive the new feature?
A. When the user's local widgets catalog is updated
B. When the user next synchronizes the locally stored policies
C. When the administrator adds the proper role to users in the widget catalog
D. When the user's desktop policy is refreshed with the new widget information
Users are able to change settings for their own devices in Lotus Traveler; however, the synchronization default settings for all users comes from which of the following files?
A. NTSConfig.xml
B. iltraveler.config
C. travsyncconfig.xml
D. traveler.properties
Lotus Notes Traveler server maintains a database with information pertaining to the cluster replicas of the mail files that are being synchronized with a Lotus Notes Traveler client. The file name of this database is which of the following?
A. travcldir.nsf
B. mduserdir.nsf
C. ntsclcache.nsf
D. lntravcache.ndk
Users in your Domino environment are members of multiple groups in the Domino Directory. You have implemented dynamic policies also. Which of the following occurs particularly when a user is a member of multiple groups that have alternate dynamic policies assigned?
A. The user receives the configurations from all the dynamic policies
B. The user receives the configurations from the last applied dynamic policy
C. The user receives the configurations from the first applied dynamic policy
D. The user receives no configurations from any of the dynamic policies until the conflict is resolved
While deploying the ID vault for your organization, you implemented the ability for helpdesk personnel to reset user passwords through the Domino Administrator client. You selected the group for easier management. Which of the following occurs when users are added and removed from the group?
A. The administrator must manually issue certificates to all users
B. The ID vault will request password verification before issuing and removingpassword reset certificates
C. People leaving the group retain password reset certificates, and new users to the group doNOT receive certificates
D. People leaving the group do NOT retain password reset certificates, and new users to the group receive certificates
You are in the process of upgrading your Domino environment to version 8.5 and have implemented the ID vault on one of the servers as well as some of the deployed clients. The clients are attempting to upload their ID files to the vault on home servers that are not version 8.5 yet. Which of the following will the client experience next?
A. The Notes client presents an error that an ID vault is not available on the home server
B. The Notes client asks its home server for a list of servers that have a replica of the vault
C. The Notes client does NOT present an error but will not be able to upload the ID file to a vault
D. The Notes client will generate a notification to the ID vault managers notifying themof thefailed attempt
The Domino Configuration Tuner points to a remote server to pull configuration and updated design information from IBM. Which of the following outbound port access does your Domino server need to pull the update information?
A. SSL
B. UDP
C. HTTP
D. NRPC
You completed the process of upgrading your Domino server, and you are in the process of enabling DAOS for your user mail files. When can you enable the DAOS feature for mail files that will not be upgraded until a later date?
A. Immediately
B. After themail fileupgrade
C. When users approve the mailfileupgrade
D. After running the required compact task
Margaret had encrypted the large object files when she activated DAOS for all her user mail files. She has been asked to change her configuration and remove the encryption. Which of the following will occur to existing large object files when she performs this change?
A. The file remains encrypted
B. The file is unencrypted immediately
C. The file is removed from the repository
D. The file is no longer accessible after the change is made