• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
LOT-925 Installing and Configuring IBM Lotus Notes and Domino 8.5
 

LOT-925 Installing and Configuring IBM Lotus Notes and Domino 8.5

on

  • 7,186 views

Demo of training materials. Some demo egzam questions, which can be find on the websites.

Demo of training materials. Some demo egzam questions, which can be find on the websites.

Statistics

Views

Total Views
7,186
Views on SlideShare
7,185
Embed Views
1

Actions

Likes
2
Downloads
0
Comments
2

1 Embed 1

http://www.slashdocs.com 1

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

CC Attribution-NonCommercial LicenseCC Attribution-NonCommercial License

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

12 of 2 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • https://www.facebook.com/groups/LotusDominoAdmins/
    Are you sure you want to
    Your message goes here
    Processing…
  • Hi . how can i get access to this material ??
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    LOT-925 Installing and Configuring IBM Lotus Notes and Domino 8.5 LOT-925 Installing and Configuring IBM Lotus Notes and Domino 8.5 Presentation Transcript

    • 1LOT-925Installing and Configuring IBM Lotus Notes and Domino 8.5 www.biztek.pl
    • 2IBM Certified System Administrator –Lotus Notes and Domino 8.5• In June 2011, the IBM Certification • Individuals who wish to certify on Program for Lotus Software Lotus Notes Domino 8.5, but have announced the restructuring of the not achieved certification on Lotus Lotus Notes Domino 8.5 core Notes Domino 7.0 or 8.0 should certification paths. follow the applicable path(s) below:• In October 2011, the new core tests were released. The old exams • Pass LOT-925: Installing and remained available for those who Configuring IBM Lotus Notes and had begun the certification process Domino 8.5 AND through to the end of the year. • Pass LOT-926: Managing and• Having been withdrawn on Maintaining IBM Lotus Notes and December 31st, they are no longer Domino 8.5 Environments. available. www.biztek.pl
    • 3Test information• Number of questions: 56 • Defining and Managing Policies• Time allowed in minutes: 75 • Install and Configure• Required passing score: 74% • Mail• Test languages: English • Manage and Maintain• Note: There are 56 scored items • Managing Servers and 2 unscored items. • Platform Support • Security• Exam Type: Multiple Choice. www.biztek.pl
    • 4Important links• Aby przygotować się do egzaminu: • Niezbędne jest pewne doświadczenie w administracji. • Niezbędna jest umiejętność korzystania z dokumentacji systemu oraz innych dostępnych w sieci zasobów. • Zaleca się udział we wszystkich kursach administracyjnych.• http://publib.boulder.ibm.com/infocenter/domhelp/v8r0/index.jsp• http://www-03.ibm.com/certify/certs/14003305.shtml• http://www-10.lotus.com/ldd/dominowiki.nsf www.biztek.pl
    • 5Question 1• Which of the following are optional advanced services that must be enabled manually when first configuring and installing the Domino server? A. SMTP server B. Agent Manager C. Calendar Connector D. DOLS (Domino Off-Line Services)Answer: A www.biztek.pl
    • 6Answer 1 (1) www.biztek.pl
    • 7Question 2• In order to create a Domino cluster, which rights are required for you to have to the Domino Directory? A. Editor access rights and ClusterModifier role B. Reader access rights and ServerWriter and ServerManager roles C. Designer access rights and ClusterCreator and ClusterModifier roles D. Author access and Delete Documents rights and the ServerModifier and ServerCreator rolesAnswer: D www.biztek.pl
    • 8 Answer 2 (1)• A Lotus Domino cluster is a group of two to six Lotus Domino servers that provides users with constant access to data, balances the workload between servers, improves server performance, and maintains performance when the size of your enterprise increases.• The servers in a cluster contain replicas of databases that you want to be readily available to users at all times.• If a user tries to access a database on a cluster server that is unavailable, Domino opens a replica of that database on a different cluster server, if a replica is available.• Domino continuously synchronizes databases so that whichever replica a user opens, the information is always identical. To create a cluster, you must have at least Author access, Delete Documents rights, and the ServerModifier and ServerCreator roles in the Lotus Domino Directory, and at least Author access to the Administration Requests database. www.biztek.pl
    • 9Question 3Jose set up Web authentication using primary and secondary directories. Which one ofthe following describes the order in which he set up directories to be searched? A. Domino primary directory, then Domino secondary directories. This is the only option available. B. Domino primary directory, then either Domino or LDAP secondary directories. The administrator can specify the order of secondary searches. C. LDAP primary directory, then LDAP secondary directory, and then Domino secondary directories. This is the order in which secondary searches must be made. D. Domino primary directory, then Domino secondary directory, and then LDAP secondary directories. This is the order in which secondary searches must be made. www.biztek.pl
    • 10Answer 3 (1)• When a Web client authenticates with a server, by default, the server checks the primary IBM® Lotus® Domino® Directory to see if the client certificate exists in the Person document. If your organization uses a secondary Domino Directory and/or an LDAP directory to verify client certificates, you can set up Domino to check those additional directories. To do so, you set up the secondary Domino and LDAP directories as trusted domains in the Directory Assistance database.• When you mark the domain as trusted, Domino searches the primary Domino Directory for the user and then searches the trusted secondary Domino and LDAP directories. When you set up directory assistance, you specify the order in which Domino searches the secondary directories.• The hierarchical name returned by the Domino Directory or LDAP directory is checked against the trusted rule in the Directory Assistance database to verify that the organization and organizational units match the specified rule. For example, if the user name returned is Dave Lawson/Acme, the Directory Assistance document must include the rule */Acme. www.biztek.pl
    • 11Answer 3 (2)• The Directory Assistance database is used to configure the Directory Assistance feature.• If your organization includes multiple domains, you can set up directory assistance to enable users to browse and select names from Public Directories outside of their domain, for example when they address mail, define database access control lists (ACL), or complete a NAMES field in documents.• When users send mail to recipients in another domain, directory assistance also allows Notes to resolve the names before sending the memo.• To set up directory assistance, you create the Directory Assistance database from the DA50.NTF template. In the Directory Assistance database you define naming rules that associate naming hierarchies with each domain--this allows Notes to search only Public Directories of domains associated with those naming hierarchies when resolving the name of a recipient from another domain.• You also use the Directory Assistance database to point to one or more strategically- located replicas of each domains Public Directory. You then create a replica of the Directory Assistance database on all servers in each domain. www.biztek.pl
    • 12Answer 3 (3)• To set up directory assistance for a remote LDAP directory, create a Directory Assistance document for the directory in a directory assistance database as follows. Make sure you have read about directory assistance services and concepts. • Make sure you have created and replicated a directory assistance database and have set up servers to use it. • If you are using the remote LDAP directory for any purpose other than LDAP service referrals, use the TCP/IP ping utility to test that the IBM® Lotus® Domino(tm) servers that will use the LDAP directory can connect to the remote LDAP directory server. • From the Domino Administrator, choose File - Open Server, select a server that you have set up to use the directory assistance database, and click OK. • Click the Configuration tab. • In the left pane, expand Directory - Directory Assistance. If you see "Server Error: File does not exist," the server you selected in step 4 is not set up to use the directory assistance database. • Click Add Directory Assistance. www.biztek.pl
    • 13 Answer 3 (4)• Example of directory assistance for one secondary Domino Directory • Company X uses two domains, Domain A and Domain B. Each domain creates its own directory assistance database that has a Directory Assistance document for the other domains Domino Directory, so that users from each domain can address mail easily to users in the other domain, and so servers in each domain can search groups in the other domains directory when authorizing database access. If servers in both domains instead used replicas of one directory assistance database that included documents for both directories, they could enable only one of the domain directories for group authorization. • Network connections between domains are slow, so the company creates replicas of the Domain B directory on two Domain A servers for servers in Domain A to use, and creates replicas of the Domain A directory on two Domain B servers for servers in Domain B to use. • The following images shows the settings for the Domain B Directory Assistance document in the directory assistance database that servers in Domain A use. Domain B uses a similar document for the Domain A directory in its directory assistance database. www.biztek.pl
    • 14Answer 3 (5) www.biztek.pl
    • 15Question 4A Notes mail message is sent by Miguel to an Internet address through an adjacentDomino domain over NRPC that then sends mail to the Internet over SMTP. Miguel isnow attempting to recall the mail message. Which of the following will be the result of hisattempt? A. He will receive an email that he cannot recall the email message. B. He will immediately receive a prompt that the message is not enabled for message recall. C. He will receive a message from the Internet recipients mail server that the message cannot be recalled. D. He will successfully recall the message if it is allowed in the server configuration and enabled in his user policy. www.biztek.pl
    • 16Answer 4 (1) www.biztek.pl
    • 17Answer 4 (2)• The requirements for Message Recall are: • Message Recall works only on mail that is • A Lotus Domino V8 or later server containing routed over NRPC. This means that neither the mail to be recalled. mail routed to the Internet nor internal mail • A mail file based on a Lotus Notes V8 or later routed over SMTP can be successfully mail template with which to recall the recalled. message. • If a Mail Policy exists that limits the use of this • A copy of the mail message in the sender’s feature for a user, this policy applies and can limit mail file. (This is usually found in the Sent the feature’s functionality. If there is no policy, or if view, but the Message Recall button is also the policy allows a user to change the recall found in the All Documents view.) setting, each user can choose to disable the feature in his or her Mail Preferences. • Permission given at the server to perform • Only mail that resides on a Lotus Domino V8 or Message Recall (and optionally at the policy later server can be successfully recalled. The and the recipient’s mail-file level, where the Lotus Domino V8 router does the work, so a recall feature can be turned off). request sent to a Lotus Domino V7 server does• Message Recall not only works with these not succeed, and the recalling user receives a minimal requirements but also works even if the report stating that the server does not support recalling user is on a server that is not Lotus Message Recall. Domino V8.• All that is required is a Lotus Notes V8 mail template containing the button to recall the message and that the message being called resides on a Domino V8 server.• Moreover, interim servers between the recaller and the recipient can be any version because the request at that point is simply an email message. www.biztek.pl
    • 18Question 5In order for Peggy to establish alternate message recall settings on a per server basis,which of the following is the best solution? A. Configure the message recall settings in an organization level policy. B. Configure the message recall settings in each servers notes.ini file. C. Configure the message recall settings in each server configuration document. D. Configure the message recall settings in explicit policies and manually apply to users. www.biztek.pl
    • 19Answer 5 (1)• Lotus Notes and Domino V8 ship with Message Recall enabled. Whether you build a new system from scratch or upgrade servers and users, this feature is ready to use.• The Server Configuration document is used to configure Message Recall. This central location lets you easily allow or disallow it for all servers. Mail Policy documents can further refine the settings, as can individual user preferences.• If you do not have any Server Configuration documents, Message Recall is still turned on by default, and the default settings, listed here, apply: • Message Recall: Enabled. • Allow recall of messages with unread status: Unread Only. • Do not allow recall of messages older than: 14 days. www.biztek.pl
    • 20Question 6While configuring an Internet Site document, Kira has left the option blank for whichDomino server hosts the site.What is the default action the server will perform with this option not configured? A. The Internet Site will not be loaded on any Domino server. B. The Internet Site will be loaded on all Domino servers in the domain. C. The Internet Site will only accept connections for the first IP Address on the server D. The Internet Site will only accept connections for the hostname in the server document www.biztek.pl
    • 21Answer 6 (1)• You can use Web Site documents to host Web sites on IBM® Lotus® Domino®. The Web Site document is one type of Internet Site.• Web Site documents contain Web site configuration information and are managed through the ServersInternet Sites view along with other types of Internet site documents. However, for backward compatibility the Domino HTTP task still supports the R5 ServersWeb Configurations view.• To enable the Internet Sites view, in the Basics section of the Server document, when converting from Web Server Configuration, click "Loads Internet configurations from ServerInternet Sites documents. www.biztek.pl
    • 22Answer 6 (2) Hosting Web sites with Web Site documents• Web sites are not explicitly associated with physical servers. A single Domino domain can support many Web sites. Each Web site can be associated with any number of host names or addresses. All servers in the same Domino domain can use the same Web Site documents in the Internet Sites view. You can specify which Domino servers support a Web site. Each Web site has its own security, file-protection, and URL rules, and you can modify them as needed.• By default, Web Site documents are not associated with specific Domino servers. All servers that share the same Domino Directory -- that is, reside in the same Domino domain -- automatically use the same Web Site documents in the Internet Sites view. This means that you do not have to re-create the same Web configuration each time you add a new server to the domain. When you add or modify a Web Site document, the changes are picked up automatically by all servers in the domain.• An optional field in the Web Site document allows you to specify the Domino servers that will host a site. Servers that are not listed in this field will not load the site configuration. www.biztek.pl
    • 23Answer 6 (3) To set up a Web Site• To set up a Web site on a Domino server, you must complete these procedures. • Enable the Internet Sites view on your server. • Create an Internet Site document. • Configure default mapping rules for HTML, CGI, icon and Java files. • Configure DSAPI Filters, HTTP Methods, and WebDAV. • Configure Domino Web Engine settings for the Web site. • (Optional) Create a Web Site Rule document and specify rules (directory, substitution, redirection) for the Web site. • (Optional) Set up file protection. • (Optional) Create an authentication realm document for the Web site. www.biztek.pl
    • 24Question 7Which ONE of the following is required when setting up transactional logging on aserver? A. Enable Transactional Logging in the server document. B. Add TRANS_LOG=1 to the servers NOTES.INI file. C. Create a Transactional Logging document in the Directory Catalog. D. Modify the NOTES.INI log settings to read LOG=LOG.NSF, TRANSLOG.NSF www.biztek.pl
    • 25Answer 7 (1)• IBM® Lotus® Domino® supports • Use transaction logging to: transaction logging for servers that run • Schedule regular backups. Domino 5 and later, and for databases Backups based on transaction logs that are in a Domino 5 or later on-disk are faster and easier than full structure. database backups that do not use• Transaction logging captures all the transaction logging. changes made to a database and • Recover from a media failure. If writes them to a transaction log. The you have a media failure, you can logged transactions are then written to restore the most recent full backup disk in a batch, either when resources from tape, then use the transaction are available or when scheduled. logs to add the data that was not• A transaction is a related series of written to disk. changes made to a database on a • Recover from a system crash. server. For example, opening a new When the server restarts, it runs document, adding text, and saving the through the end of the transaction document is one transaction. In this logs and recovers any writes that case, the transaction consists of three were not made to disk at the time separate implicit API calls: NotesOpen, of the crash. Logged databases do NoteUpdate, and NoteClose. not require a consistency check. • Log the database views. You can avoid most view rebuilds. www.biztek.pl
    • 26Answer 7 (2)• You can enable and set up transaction logging on any server. • Make sure that all the databases you want to log are in the Domino data directory, either at the root, or in a subdirectory. • From the IBM® Lotus® Domino® Administrator, click the Configuration tab, expand the Server section, and click "All Server Documents." • Select the Server Document for the Domino server you want to edit and then click Edit Server. • Click the Transactional Logging tab, complete these fields, and then save the document. www.biztek.pl
    • 27Answer 7 (3) www.biztek.pl
    • 28Answer 7 (4)• When you enable transaction logging, Domino assigns a unique database instance ID (DBIID) to each Domino database. When Domino records a transaction in the log, it includes this DBIID. During recovery, Domino uses the DBIID to match transactions to databases.• Some database maintenance activities, such as using the Compact command with options, cause Domino to reconstruct the database in such a way that old transaction log records are no longer valid. When this happens, a new DBIID is assigned to the database. From that point on, all new transactions recorded in the log for that database use the new DBIID. After a database is assigned a new DBIID, take a new full backup of the database. The new full backup captures the database in its current state with the new DBIID. Then, if you have to restore the database, Domino needs only the new transactions that contain the new DBIID.• Domino assigns a new DBIID when: • You enable transaction logging for the first time. • You run the Compact task with an option -- for example, the option to reduce file size. • You run the Fixup task on corrupted databases. • You move a Domino database to a logged server. www.biztek.pl
    • 29Question 8• When creating the ID Vault for your domain, which of the following cannot be the name of the vault? A. The name of the server the vault is created on B. The name of the administrator creating the vault C. The name of the group that will manage the id vault D. The same as an organizational unit used in the Domino domainAnswer: D www.biztek.pl
    • 30Answer 8 (1) www.biztek.pl
    • 31Answer 8 (2)• Name of the ID vault. • The name defines the hierarchical identity of the vault and is also used to form the vault database file name and vault ID file name. • The name cannot be the same as an organization or organizational unit used in the Domino domain. • You cannot change the name after the vault is created.• Vault ID file location and password • It is important to make a back up copy of the vault ID file. If the ID file is lost and there is no backup copy, the vault will need to be deleted and re-created. • Vault administrators require access to this ID file and password to add or remove vault replicas or to delete the ID vault.• Vault primary server • You can specify only one server when you create a vault, which becomes the vault primary server. • To replicate the vault to other servers, and optionally to specify a different vault primary server, use the ID Vaults - Manage tool.• Vault administrator • You must specify at least one vault administrator. www.biztek.pl
    • 32Question 9• Given the following scenario, what will occur if the sender attempts to recall a message after 10 days have elapsed since it was originally sent to the recipient: - The sender and recipient are on the same mail server - The server is configured to allow message recall - The recipient is a member of a group policy that allows message recall - The sender is a member of a group policy that does not allow message recall - The sender has an explicit policy that allows message recall - Message recall is allowed for 14 days for the sender - Message recall is allowed for 8 days for the recipient A. The sender will be allowed to recall the sent message B. The sender will not be allowed to recall the sent message C. The sender will receive a non-delivery report back stating the message recall failed D. The sender will be prompted that they have exceeded the maximum time allowed for message recall• Answer: A www.biztek.pl
    • 33Answer 9 (1)The sender and recipient are on the same OKmail serverThe server is configured to allow message ReguirementrecallThe recipient is a member of a group policy thatallows message recallThe sender is a member of a group policy Sender can not recall thethat does not allow message recall message, but …The sender has an explicit policy that allows Based on explicit polisy canmessage recall recall the messageMessage recall is allowed for 14 days for the Sender recalling after 10sender daysMessage recall is allowed for 8 days for therecipient www.biztek.pl
    • 34Answer 9 (2)• What is the priority with respect to each other of the different types of policies? • Organizational • Explicit • Dynamic www.biztek.pl
    • 35Question 10Chaz, the Domino administrator, has noticed performance issues when LDAP searchesare being performed against the Domino Directory. Which of the following is the bestoffered solution to improve performance? A. Extend the LDAP schema to add new attributes B. Create a full text index of the Domino Directory C. Configure Directory Assistance to load all users into memory in advance D. Delete the ($LDAP) view in the Domino Directory and let it rebuild automaticallyAnswer: B www.biztek.pl
    • 36Answer 10 (1)• Full-Text Indexing for LDAP Performance • LDAP servers receive many search requests, and you want to optimize these search requests to have the best performance. • By default, full-text indexing of the Domino directory isn’t enabled. This means each search of the LDAP directory is a linear search. • The more people in the directory, the longer the search can take. Enabling full- text indexing is especially important if nested groups are used within the Domino directory. • Full-text indexing is enabled in the LDAP settings for the Domino server: • Set the field “Automatically Full-text Index Domino Directory?” to “Yes.” • After making this change, reload the LDAP schema to initiate the change by issuing the console command: tell ldap reloadschema. • If a Domino server is being used to provide LDAP services, be sure to full-text index the Domino directory to avoid slow performance with linear searches. www.biztek.pl
    • 37Question 11Each time Melissa creates a certifier ID, Domino creates a certifier ID file and which ofthe following? A. Password database B. Certifier document C. Password hash file D. Certifier databaseAnswer: B www.biztek.pl
    • 38Answer 11 (1)• The Certification Log template is a special template used to create a database that keeps a record of the certified users of a Notes system.• If a system certifier chooses to create the log, each time he or she certifies a new user, certifier an appropriate record is added to the database. www.biztek.pl
    • 39Question 12Tom set up a Domino domain and organization. Which one of the following describes thedifference between a Domino domain and a Domino organization? A. There is no difference. Domains and organizations function in the same manner. B. Domains refer to a companys hierarchical structure. Organizations refer to users who share a common organizational certifier. C. Domains are comprised of users and servers that share a common Domino Directory. Organizations define security and naming conventions. D. Domains define security and naming conventions. Organizations are comprised of users and servers that share a common Domino Directory.Answer: C www.biztek.pl
    • 40Answer 12 (1)• Domino domain is a collection of Domino servers and users that share a common Domino Directory. The primary function is mail routing. Users domains are determined by the location of their server-based mail files.• For a Domino server to communicate with a server in a different domain, you create a Domain document in the Domino Directory to define the name, location, and access to adjacent and non- adjacent Domino domains and non-Domino domains.• Other domains are: • Foreign domain: A Domino domain and an external mail system such as SMP or cc:Mail. It specifies which outbound addresses are Internet addresses and where the Notes Mail Route sends those messages. • Global domain: A group of Domino domains, such as Sales1, Sales2, and Marketing, under a single Internet domain, such as acme.com. All outbound SMTP mail, whether it originates from the Sales1 or Marketing domains, has the return address acme.com.• Domino directory A directory created automatically from the PUBNAMES.NTF template during first server setup that describes the users, servers, connections, and access control information for a Domino domain, or a directory created manually from PUBNAMES.NTF. www.biztek.pl
    • 41Question 13Directory assistance in Lotus Domino 8 enables you to specify when a secondarydirectory must only be used for authentication. This provides which of the followingfeatures? A. This blocks email from being forwarded to adjacent domains B. This avoids NAMELookups to reduce the number of mbiguous Name dialog boxes C. This help you validate your choice of host name for receiving authentication requests D. This scans group member lists to ensure that each member exists in an available directory that is configured in directory assistanceAnswer: B www.biztek.pl
    • 42Answer 13 (1)• To configure directory assistance, you create a • Each server process that provides directory directory assistance database from the services and detects a local directory template DA50.NTF, and replicate it to the assistance database configuration loads servers that will use it. directory information configured in the• A server must have a local replica of a directory assistance database into an internal directory assistance database to use directory memory table. assistance. Then you add the database file • During server startup and thereafter at five- name to the "Directory Assistance database minute intervals each server process checks name" field in the IBM® Lotus® Domino™ for changes to the directory assistance Directory Server documents of these servers. database configuration and if found, each• You create a Directory Assistance document in process reloads its internal memory table to the directory assistance database to describe reflect the changes. a particular directory and how it will be used, • To look up names in a Domino Directory or and to define how to connect to the directory an Extended Directory Catalog, a server and to find alternate replicas for failover. uses NAMELookup calls.• To set up directory assistance for a Domino • To look up names in a remote LDAP Directory or an Extended Directory Catalog , directory, a server uses a gateway feature you select "Notes" in the "Domain type" field in that translates NAMELookup calls to LDAP the Directory Assistance document. To set up operations, and then translates LDAP directory assistance for a remote LDAP operations back to NAMELookup calls - a directory, you select "LDAP" in the "Domain Domino server doesnt have to run the type" field. You use one Directory Assistance LDAP service to use a remote LDAP document to configure all the services for a directory for directory services. directory and its replicas. www.biztek.pl
    • 43
    • 44Answer 13 (2)• Authentication/authorization-only secondary directories• The directory assistance feature of Lotus Domino is a way for your Lotus Notes applications to achieve Internet authentication, group authorization, and mail addressing using secondary directories, both Lotus Domino and Lightweight Directory Access Protocol (LDAP). Some clients use separate directories for authentication/authorization and for mail addressing.• Directory assistance in Lotus Domino 8 enables you to specify when a secondary directory must only be used for authentication/authorization (Figure 3-34). This avoids unnecessary NAMELookups to authentication/authorization directories, potentially reducing the number of “Ambiguous Name” dialog boxes and making mail lookup tasks more efficient, as well as reducing the load on authentication/authorization directory servers. www.biztek.pl
    • 45Question 14John registered a new server. In which one of the following was the Server documentplaced? A. NAMES.NSF B. CERTLOG.NSF C. CATALOG.NSF D. DIRECTORY.NSFAnswer: A www.biztek.pl
    • 46Question 15Edison, the Domino Administrator, wants to enforce file security on HTML and Imagefiles. Which one of the following should he do? A. Enforce ECLs B. Create File Protection documents C. Use Protect Directories in the HTTPD.CNF files D. Domino does not allow security enforcement on HTML and Image filesAnswer: B www.biztek.pl
    • 47Answer 15 (1)• You can use the following security features to control Internet/intranet access to files on the servers: • File protection documents (file protection document for a specific Web Site). • Web realms (Web Site authentication realm document).• File protection documents control access to non-database files that users can access via Web browsers. Like database file (.NSF) access control lists (ACLs), which specify the names of the users who can access them and the level of access they have, you can enforce file protection for files that browser users can access - for example, HTML, JPEG, and GIF.• Also by specifying the level of access for these types of files and the names of the users who can access them.• To create file protection for a Web Site document • From the Domino Administrator, choose Configuration - Web - Internet Sites. • Open the Web Site document for which you want to create file protection. • Click Web Site and choose "Create File Protection. • Click Administration and complete the Owners and Administrators fields. • Save the document. www.biztek.pl
    • 48Answer 15 (2) www.biztek.pl
    • 49Answer 15 (3)• Using a IBM® Lotus® Domino® Web Site authentication realm, you can specify the text string that appears when a user tries to access a certain directory, or file on a Domino Web server.• When the browser prompts the user for a name and password, the browsers authentication dialog displays the text string. The browser uses the realm to determine which credentials -- that is, user name and password -- to send with the URL for subsequent requests. The Domino Web server caches the users credentials to use for different realms, in order to avoid prompting the user repeatedly for the same credentials.• The realm string also applies to requests mapped to paths that have the specified path as their root, provided that the child paths of the root do not already have a specified realm. For example, the realm string specified for D:NOTESDATA also applies to a request mapped to D:NOTESDATAFINANCE, if the latter does not have a realm specification.• From the Domino Administrator, choose Configuration - Web - Internet Sites. • Choose the Web Site document for which you want to create an authentication realm, and click Edit Document. • Click "Web Site" and choose "Create Authentication Realm." • Click the Basics tab and complete the fields. • Save the document. www.biztek.pl
    • 50Question 16In what order is blacklist and whitelist filtering processed on a received SMTP message? A. DNS blacklists, DNS whitelists, private blacklists, private whitelists B. DNS whitelists, DNS blacklists, private whitelists, private blacklists C. Private blacklists, DNS blacklists, private whitelists, DNS whitelists D. Private whitelists, private blacklists, DNS whitelists, DNS blacklistsAnswer: D www.biztek.pl
    • 51Answer 16 (1)• Private whitelists – to specify the hosts and/or domains to exclude from blacklist processing. Hosts that are specified in private whitelists are exempt from blacklist checks. Whitelisted hosts bypass blacklist filter checks but there are other controls which may prevent the message from being accepted. Members of the private whitelist are still subjected to connection, relay, sender, and recipient controls. Being whitelisted does not guarantee that the message will be delivered to the recipient. Whitelists can be used independently of blacklists.• When private whitelists are enabled, the SMTP listener task compares hosts that may be subject to relay enforcement against the defined private whitelist. If there is a match, the private blacklist, DNS whitelists, and DNS blacklists are skipped. Otherwise, processing continues beginning with the private blacklist.• Private blacklists - Use private blacklists to specify hosts and/or domains responsible for sending unnecessary, unwanted mail to your Internet domain. For consistency, IBM ® Lotus® Dominos™ private blacklists follow the model currently used by existing anit-spam functionality. Private blacklists are stored in the Domino Directory to simplify the process of maintaining and distributing blacklist information between servers.• When private blacklists are enabled, the SMTP listener task compares the names of hosts that may be subject to relay enforcement against the private blacklist prior to performing DNS blacklist queries. This prevents unnecessary DNS lookups. If the host is found in the private blacklist, the action specified in the field "Desired action when a connecting host is found in a private blacklist" in the Private Blacklist Filters section of the Configuration Settings document applies. If the host is not found in the private blacklists, processing continues with DNS whitelist filters and then DNS blacklist filters. www.biztek.pl
    • 52Answer 16 (2)• DNS whitelists – when are enabled, the SMTP listener task determines whether a connecting host is a member of a DNS whitelist by relying on the results of a DNS query of a DNS blacklist-style host name. If the query returns an IP address, the host is added to the whitelist and the remaining DNS whitelists are not searched. If the host is not found in the DNS whitelist , processing continues with DNS blacklist filters. If the query returns an error indicating that the host name is not valid, the host is not added to the whitelist and may be subject to blacklist filtering if that is enabled.• Note DNS whitelists can be used independently of blacklists but private blacklists override DNS whitelists.• DNS blacklists - you can specify the site or sites the SMTP task uses to determine if a connecting host is a "known" open relay or spam source. Specify sites that support IP- based DNS blacklist queries. www.biztek.pl
    • 53Answer 16 (3)• Whitelists allow messages from specified domains to be received.• IBM supports both private blacklist and whitelist filters. With these configuration settings, it is important to understand how you can reduce spam and to know the order that Domino will check when blacklist and whitelist filters are enabled.• If you enable private whitelist filters, when Domino receives an SMTP connection, it compares the IP address/host name against this list. The field "Whitelist the following hosts" should be used to enter the IP addresses or host names of systems that you want to whitelist. You can also use an asterisk (*) as a wild card. Members of the private whitelist are still subjected to connection, relay, sender, and recipient controls. Being whitelisted does not guarantee that the message will be delivered to the recipient. www.biztek.pl
    • 54Question 17The server out-of-office service is configured in which of the following locations? A. Server document B. Server configuration document C. Mail.box on the Domino 8 mail server D. In each users mailfile the service is to be enabledAnswer: B www.biztek.pl
    • 55Answer 17 (1)• Out of Office service type Agent • From the Domino Administrator, click the • The Out of Office agent processing occurs Configuration tab. after the server mail rules and user mail • Click Server - Configurations. rules are applied but after the "before mail • Select the Server Configuration document you delivery" agent processing completes. By want to modify, and then click Edit Document. default, the agent executes four times • Click Router/SMTP - Advanced - Control. each day on a schedule. The user can preprocess mail using rules or using the • In the Miscellaneous section, locate the field, Out "before delivery mail agent" in order to of Office service type. control spam. • Choose one of these: • The Out of Office agent becomes active when • Service -- Choose the Out of Office service the user enables it. The agent must be for users whose mail files reside in an all- manually disabled when the Out of Office time Domino 8 mail cluster supporting the IBM® period expires. The Out of Office agent Lotus® Notes® 8 mail template (MAIL8.NTF). supports delegation of Out of Office The Out of Office service supports Out of functionality but it is not integrated with Office time periods of less than one day, but Calendar management. The delegate must greater than one hour. The Out of Office have a minimum of Editor access in the ACL service is automatically disabled when the Out and rights to sign agents that run on behalf of of Office time period expires. others in the Server document. The minimum • Agent -- Choose the Out of Office agent for setting for Out of office agent is one day. users whose mail files reside on a cluster that • Use the server command Tell router O to has at least one pre-Domino 8 server. The display a list of all databases that have an minimum setting for Out of office agent is one active out of office service. day. The agent must be manually disabled• when the Out of Office time period expires. • Click Save and Close. www.biztek.pl
    • 56Answer 17 (2) www.biztek.pl
    • 57Question 18The default port for SSL over SMTP is which one of the following? A. 389 B. 465 C. 636 D. 995Answer: B www.biztek.pl
    • 58Answer 18 (1)• For networks, a port means an endpoint to a logical connection. The port number identifies what type of port it is. Here are the default email ports for: • POP3 - port 110 • IMAP - port 143 • SMTP - port 25 • HTTP - port 80 • Secure SMTP (SSMTP) - port 465 • Secure IMAP (IMAP4-SSL) - port 585 • IMAP4 over SSL (IMAPS) - port 993 • Secure POP3 (SSL-POP) - port 995 www.biztek.pl
    • 59Question 19Which protocol must be enabled on the Domino server to support RSS feeds for mailfiles? A. RSS B. HTTP C. IMAP D. LDAPAnswer: B www.biztek.pl
    • 60Answer 19 (1)• You can enable RSS feeds for IBM® Lotus® Domino® Web Access mail. When feeds are enabled, a feeds icon displays in the Inbox.• Then, feed readers that are built into browsers or that have browser extensions, automatically detect that a feed link is present from a users Domino Web Access Inbox.• If enabled, users can subscribe to the feed so that the feed reader application detects new mail.• Since Domino Web Access mail files are generally not accessible by anonymous users, the feed reader application must support storing authentication information to the mail server to retrieve the latest feed.• You should be aware that HTTP traffic to your IBM® Lotus® Domino® mail server may increase if many users subscribe to these feeds within external feed readers. www.biztek.pl
    • 61Question 20Which task reads the mail.box for new or changed messages that require processing? A. SMTP B. Amgr C. Adminp D. RouterAnswer: D www.biztek.pl
    • 62Question 21Without manually restarting the SMTP server task, how often will it automatically checkfor changes to Configuration Settings documents? A. Never B. Two minutes C. Hourly D. Daily at midnightAnswer: B www.biztek.pl
    • 63Answer 21 (1)• The SMTP service controls the SMTP listener on the Lotus Domino server.• By default, whenever you restart the SMTP service, and at two-minute intervals, the SMTP service automatically checks the NOTES.INI file, Configuration Settings document, and Server document to see if any settings have changed.• If the service detects that settings have changed, it rebuilds its internal configuration to incorporate the changes.• To update the SMTP service configuration • Modify settings in the NOTES.INI file, Configuration Settings document, or Server document. • At the server console, enter: Tell smtp update config• If the servers logging level is set to Informational or Verbose, the server console displays messages to indicate when the update begins and completes. www.biztek.pl
    • 64Question 22Pedro, a Domino administrator, has enabled the Inbox maintenance feature from a mailpolicy document. How is the Inbox maintenance feature trigged and where does it run? A. The Inbox maintenance agent is enabled by default to run at 2 AM on all mail servers in the domain. B. The Administration Process periodically runs the Inbox Maintenance agent on each users home server. C. Every time a user opens their mail file the Inbox maintenance agent runs locally on the users workstation. D. The Inbox maintenance agent runs on a users home server and is manually triggered by selecting Tools - Inbox maintenance from within their mail file.Answer: B www.biztek.pl
    • 65Answer 22 (1)• Inbox maintenance feature improves server performance by reducing the size of users Inboxes in mail files.• When you enable the Inbox maintenance feature, the Administration Process periodically runs the Inbox Maintenance agent on the IBM® Lotus® Notes® client users home server, that is, the server that stores the mail files containing the users Inboxes.• The Inbox Maintenance agent resides in the mail template, MAIL8.NTF. The agent removes documents from the Inbox based on settings you define in the Server document or the mail policy settings document.• The settings that are specified in the Server document override the Inbox Maintenance settings in the mail policy settings document. www.biztek.pl
    • 66Answer 22 (2)• Enable Inbox maintenance in the Server document by specifying a value in the field "Start executing Inbox Maintenance agent on," in the Server Tasks - Administration Process tab. In that field, specify one or more days of the week on which to run the Inbox Maintenance agent.• In the field "Start executing Inbox Maintenance at," specify the time to begin running the agent. If a day is not specified in the field "Start executing Inbox Maintenance agent on," the feature is not enabled and the agent does not run regardless of whether the "Start executing Inbox Maintenance at" field contains a time at which to run the agent. If Inbox maintenance is enabled but the field "Start executing Inbox Maintenance at" is blank, the Inbox Maintenance agent runs at the default time of 1:00 AM. This feature is disabled by default. www.biztek.pl
    • 67Answer 22 (3)• You also use the settings in the Server document to specify whether to maintain inboxes for selected users on the home server, or to maintain inboxes based on policy settings.• If the Server document setting "Maintain inboxes based on policies" is chosen, inboxes are maintained according to the settings specified in the mail policy settings document, unless the Inbox Maintenance settings are not specified in the mail policy settings document.• If the settings are not defined in the mail policy setting document, Inbox maintenance is not performed. The Server document also contains the settings that control which documents are removed from a users Inbox by the agent and when they are removed. The settings are "Remove documents older than [X] days from Inbox" and "Do not remove unread documents from Inbox." www.biztek.pl
    • 68Question 23iNotes requires which of the following server tasks to be running? A. IMAP B. SMTP C. DOLS D. HTTPAnswer: D www.biztek.pl
    • 69Question 24The ACME corporation is receiving a large amount of mail that is addressed to users thatare not listed in the Domino Directory. The administrator wants to configure the server tocheck that recipients are listed in the directory and to refuse any mail addressed to agroup name. In which of the following areas is this configured? A. Inbound Sender Controls B. Inbound Relay Enforcement C. Inbound Connection Controls D. Inbound Intended Recipient ControlsAnswer: D www.biztek.pl
    • 70www.biztek.pl
    • 71Answer 24 (1)• Inbound intended recipients controls• This section allows you to restrict the name of recipients for inbound SMTP messages. A very useful feature is the "Verify that local domain recipient exist in the Domino Directory" field. This specifies whether or not the SMTP listener checks recipient names specified in RCPT TO commands against entries in the Domino Directory. If enabled, the domain part of an address specified in an SMTP RCPT TO command matches one of the configured local Internet domains; the SMTP listener checks all configured directories to determine whether or not the specified recipient is a valid user. If all lookups complete successfully and no matching user name is found, the SMTP server returns a 550 permanent failure response indicating that the user is unknown: • 550 bad_user@yourdomain.com ... No such user• Choosing this setting can help prevent messages sent to nonexistent users (for example, spam messages and messages intended for users who have left the organization) from accumulating in Mail.box as dead mail. To avoid messages from being rejected as a result of directory unavailability, Domino accepts messages when an attempted directory lookup does not complete successfully. Please refer to Figure 6 for more information. www.biztek.pl
    • 72Question 25Trisha wants to set up Activity Trends for her Domino environment. Where should Trishago to configure Activity Trends? A. Server document B. Program document C. Connection document D. Configuration documentAnswer: D www.biztek.pl
    • 73Answer 25 (1)• Activity Trends is part of the Domino Administrator. Activity Trends collects and stores activity statistics as current observations and historical trends. The activity statistics relate to the server, databases, users, and connections of users to databases.• You can explore the collected data to see how database workload is distributed across servers.• Using the data, Activity Trends recommends a resource-balancing plan. Then, working with the Domino Change Manager, which is a part of the Domino server, Activity Trends provides a workflow that facilitates implementing the recommended changes. www.biztek.pl
    • 74Answer 25 (2) www.biztek.pl
    • 75Question 26Carla is attempting to utilize Directory Assistance to prevent group lookups from theprimary Domino Directory for database authorization. However, she cannot get this tofunction correctly. Which if the following is the cause? A. Group lookups are not possible from the primary Domino Directory B. You can never exclude the primary Domino Directory from this type of functionality C. The primary Domino Directory must be moved to last in the search order for Directory Assistance D. She must create an exclusion rule in the Directory Assistance database that includes the primary Domino DirectoryAnswer: B www.biztek.pl
    • 76Answer 26 (1)• When a Web client authenticates with a server, by default, the server checks the primary IBM® Lotus® Domino® Directory to see if the client certificate exists in the Person document. If your organization uses a secondary Domino Directory and/or an LDAP directory to verify client certificates, you can set up Domino to check those additional directories. To do so, you set up the secondary Domino and LDAP directories as trusted domains in the Directory Assistance database.• When you mark the domain as trusted, Domino searches the primary Domino Directory for the user and then searches the trusted secondary Domino and LDAP directories. When you set up directory assistance, you specify the order in which Domino searches the secondary directories.• The hierarchical name returned by the Domino Directory or LDAP directory is checked against the trusted rule in the Directory Assistance database to verify that the organization and organizational units match the specified rule. For example, if the user name returned is Dave Lawson/Acme, the Directory Assistance document must include the rule */Acme. www.biztek.pl
    • 77Question 27What tool can an administrator use to see how database workload is distributed acrossservers and recommend a resource-balancing plan? A. Trend Analysis B. Activity Trends C. Activity Logging D. Transaction LoggingAnswer: B www.biztek.pl
    • 78Answer 27 (1)• IBM® Lotus® Domino® server resource utilization can be separated into two types, system activity and user activity. • Activity Logging servers account for their time precisely, recording user activity by person, database, and access protocol. When summarized and averaged, or trended over time, activity logging of trended statistics provides a way to measure and compare workloads across servers. You can use this information to identify the most active users and databases on each server. Using the Domino Change Manager, you can automate the creation and execution of workload redistribution plans to load a new server, decommission an old one, or balance workloads across unevenly burdened servers. • Activity Trends is part of the Domino Administrator. Activity Trends collects and stores activity statistics as current observations and historical trends. The activity statistics relate to the server, databases, users, and connections of users to databases. You can explore the collected data to see how database workload is distributed across servers. Using the data, Activity Trends recommends a resource- balancing plan. Then, working with the Domino Change Manager, which is a part of the Domino server, Activity Trends provides a workflow that facilitates implementing the recommended changes. www.biztek.pl
    • 79Question 28The Domino startup has aborted due to the system time being too far in advance ascompared to the Domino server time. Which of the following next steps would be the bestchoice to get the Domino server to start immediately? A. Edit the notes.ini to remove the line LAST_OS_UPDATE_TIME B. Delete the notes.ini file from the server and restart the server C. Edit the notes.ini and type a colon or a semicolon in front of the parameter LAST_DOMINO_TIME_ABORT D. Rename the notes.ini to <timestamp>notes.ini and restart the server where <timestamp> is the correct operating system timeAnswer: C www.biztek.pl
    • 80Answer 28 (1)• http://www.lntoolbox.com/en/notesini-reference.html• Use IBM® Lotus ® Dominos™ NOTES.INI settings to prevent the system clock on the Domino server from being reset to an incorrect time.• The system clock time can be changed to an incorrect time, often to a future time, due to system or human error. These incorrect changes to a future time are called forward time changes. When a forward time change occurs on the system clock, all date and time stamps for all documents and databases also change.• There are two time settings impacted by forward time changes to the system clock settings: • Operating system (OS) time • Internal IBM Lotus Domino time• Forward time changes to the system clock can occur while the Domino server is running or while the server is shut down. Use the following NOTES.INI settings to help prevent forward time changes. • Last_Domino_Time= Last recorded internal Domino time • Restart_Time_Interval= Value in seconds. The maximum time difference allowed between the OS time and the Last_Domino_Time. The default value is 3600 seconds. • Restart_Time_Action= Value of 1 indicates that restarting the Domino server is canceled and a message indicating this is written to the file NOTES.INI. If Restart_Time_Action= is set any value other than 1, the OS time is used. • Reset_Time_Interval= Value in seconds of the maximum time change allowed. www.biztek.pl
    • 81Question 29Your enterprise users receive large lists of ambiguous names when performing namelook-ups for addressing mail messages. Which of the following will remove theambiguous names? A. Remove the alternate directories from the cluster directory B. Disable specific directories from mail lookups in admin4.nsf C. Enable specific directories to be utilized for credentials only in Directory Assistance D. Specify that the primary Domino Directory is the only mail addressing source within the server configuration documentAnswer: C www.biztek.pl
    • 82Answer 29 (1) Limiting directories to authentication-only lookups• You may need to deploy a directory for authentication purposes only if: • You have both an IBM® Lotus® Domino® and an LDAP directory that contain some identical names. • You do not use the LDAP directorys names for mailing. • Your mail clients are experiencing "Ambiguous name" dialog boxes when sending mail.• It is becoming common practice to use a corporate LDAP server to provide authentication (userid/password) services for single sign-on (SSO) purposes. Often, these LDAP servers are not configured, deployed, or intended to support mail routing (or other Domino-based) directory lookups.• Because Domino does not support a universal name mapping scheme for Domino-style identities (fullnames or distinguished names of the form cn=xxxx, ou=yyyy, o=zzzz) and the less (or differently) constrained distinguished name formats that are implemented by various LDAP directories, deploying an LDAP directory to be used for authorization can cause name ambiguity problems with some Domino services if duplicate entries exist in the native Domino directories and the LDAP directory being deployed. Since duplicate entries are usually the case if the LDAP directory is being deployed to allow SSO, or to provide LDAP-based authentication for Internet services, it is necessary to avoid sending certain lookups to the LDAP directories. Otherwise, sending email can result in an a large number of unnecessary lookups to the LDAP directory, thereby decreasing performance. www.biztek.pl
    • 83Answer 29 (2)• You indicate that a directory should be used only for authentication on the Basics tab of the Directory Assistance document as follows: • set Group Authorization to Yes or enable one of the Naming Contexts (Rules) as Trusted for Credentials". This reveals a new setting - "Use exclusively for Group Authorization or Credential Authentication." • The default setting for "Use exclusive for Group Authorization or Credential Authentication" is "No." Change it to "Yes" to limit searches on this directory strictly for authentication.• If neither setting is enabled, the directory will be searched. www.biztek.pl
    • 84Question 30Domino uses which type of document to determine how to connect to another server forreplication and mail routing? A. Server B. Domain C. Program D. ConnectionAnswer: D www.biztek.pl
    • 85Answer 30 (1)• Servers must connect to each other to exchange data, for example to replicate databases and exchange mail. You can create connections between servers across a local area network (LAN) or wide area network (WAN); using a dialup modem or remote access service; using a passthru server, which is a server that acts as an intermediary server between a client and its destination; or over the Internet.• Connections between servers -- that is, your connection topology -- should enable servers to exchange information reliably and efficiently, maximizing the capacity of the physical network, while minimizing connection-related costs. www.biztek.pl
    • Komponenty przesyłu poczty (6). Różne sieci DNN. A B CONNECTION SERVER 1 SERVER 2 Recipient Router Router s Mail Mail Mail Box Box Box W przypadku różnych sieci DNN wiadomość wysłana będzie wg. ustawień w dokumencie Connection! 86