Lotus 190-980 Domino 8.5 System Administration Fundamentals

6,521 views

Published on

Materiały z warsztatów poświęconych egzaminowi LOT980 Domino 8.5 System Administration Fundamentals. Serdecznie zapraszamy!

Published in: Education

Lotus 190-980 Domino 8.5 System Administration Fundamentals

  1. 1. 190 -980 : IBM Lotus Notes Domino 8.5 System Administration Operating Fundamentals
  2. 2. Informacje o egzaminie (1) <ul><li>Q uestions: 73 </li></ul><ul><li>Time allowed : 90 minutes </li></ul><ul><li>P assing score: 75% </li></ul><ul><li>Test languages: English </li></ul><ul><li>Exam Type: Multiple Choice </li></ul><ul><li>Covers Lotus Notes Domino 8.5 material as it relates to these competency areas: </li></ul><ul><ul><li>Install and Configure </li></ul></ul><ul><ul><li>Mail </li></ul></ul><ul><ul><li>Manage and Maintain </li></ul></ul><ul><ul><li>Managing Servers </li></ul></ul><ul><ul><li>Platform Support </li></ul></ul><ul><ul><li>Security </li></ul></ul>
  3. 3. Możliwe i dostępne zasoby <ul><li>Aby przygotować się do egzaminu: </li></ul><ul><ul><li>Niezbędne jest pewne doświadczenie w administracji. </li></ul></ul><ul><ul><li>Niezbędna jest umiejętność korzystania z dokumentacji systemu oraz innych dostępnych w sieci zasobów. </li></ul></ul><ul><ul><li>Zaleca się udział we wszystkich kursach administracyjnych. </li></ul></ul><ul><li>http://publib.boulder.ibm.com/infocenter/domhelp/v8r0/index.jsp </li></ul><ul><li>http://www-03.ibm.com/certify/tests/ovrL980.shtml </li></ul>
  4. 4. Question: 1 <ul><li>Which type of server installation provides standard Domino application services and custom Domino databases for Notes and Web clients, as well as support for clusters? </li></ul><ul><li>Domino Utility Server </li></ul><ul><li>Domino Database Server </li></ul><ul><li>Domino Messaging Server </li></ul><ul><li>Domino Enterprise Server </li></ul><ul><li>Answer: A </li></ul>
  5. 5. Answer 1 <ul><li>Domino Utility Server – usługi aplikacyjne dla Lotus Notes i sieci Web. Wspiera także klastry serwerów, ale nie można korzystać z poczty elektronicznej. </li></ul><ul><li>Domino Messaging Server – dostarcza usług pocztowych i nie można korzystać z aplikacji. </li></ul><ul><li>Domino Enterprise Server – zawiera możliwości obu typów serwerów. </li></ul>
  6. 6. Question 2 <ul><li>The Certification log records information related to which of the following? </li></ul><ul><li>Certification, recertification and name changes </li></ul><ul><li>DOLS certificates, SSL key expirations and Internet Sites </li></ul><ul><li>Recertification, self-signed certificates and SSL key expirations </li></ul><ul><li>Group membership, self-signed certificates and S/MIME certificates </li></ul><ul><li>Answer: A </li></ul>
  7. 7. Answer 2 <ul><li>The Certification Log template is a special template used to create a database that keeps a record of the certified users of a Notes system. </li></ul><ul><li>If a system certifier chooses to create the log, each time he or she certifies a new user, a record of that person's certification is added to the database. </li></ul>
  8. 8. Question 3 <ul><li>You have made the following entry in the server's notes.ini file </li></ul><ul><li>Allow_Access_lan7=* ($Groups) </li></ul><ul><li>Which of the following will this entry provide? </li></ul><ul><li>Every group in the Domino Directory will be allowed access over lan7 </li></ul><ul><li>Everyone in the Domino Directory that cannot be found in a group can access the server over lan7 </li></ul><ul><li>Every group in the Domino Directory will be denied access to all other ports on the Domino server </li></ul><ul><li>No one in the Domino Directory will be able to access lan7 unless you first access another port and authenticate as part of a group </li></ul><ul><li>Answer: A </li></ul>
  9. 9. Answer 3 <ul><li>http://www.ibm.com/developerworks/lotus/documentation/notes-ini/ </li></ul><ul><li>Allow_Access_portname </li></ul><ul><li>Applies to: Servers </li></ul><ul><li>Specifies servers, users, and groups that can access a server port. The portname parameter indicates the name of the port you enabled in the Port Setup dialog box and in the Server document. </li></ul><ul><li>An asterisk represents everyone listed in the Domino Directory . An asterisk followed by a view name represents everyone listed in that view of the Domino Directory. An asterisk followed by a slash (/) and a hierarchical certifier's name represents everyone certified by that certifier. </li></ul><ul><li>Allow_Access_lan3 = * </li></ul><ul><li>(All users listed in the Domino Directory can use the LAN3 port on this server) </li></ul>
  10. 10. Question: 4 <ul><li>Brittany opened her composite application in Designer and no provisioning occurred. Which of the following files are read for provisioning information when a composite application is open in the Lotus Notes client? </li></ul><ul><li>ca.xml </li></ul><ul><li>composite.xml </li></ul><ul><li>provisioning.properties </li></ul><ul><li>applications.properties </li></ul><ul><li>Answer: A </li></ul>
  11. 11. Answer 4 (1)
  12. 12. Answer 4 (2)
  13. 13. Answer 4 (3) Właściwości elementu w aplikacji
  14. 14. Answer 4 (4) <ul><li>Composite applications are aggregations of multiple components brought together for a business purpose. These components can have different types and are developed with different tools. </li></ul><ul><li>Composite applications and components can be run on either the rich client (Lotus Notes or Lotus Expeditor) or projected on a browser via WebSphere Portal. </li></ul><ul><li>CA definitions can be read from either Lotus Notes/Domino or WebSphere Portal. </li></ul><ul><li>NSF based composite application definitions are stored as design notes in NSFs and can even be read from local databases. </li></ul><ul><li>Composite applications deal with the following component types: </li></ul><ul><ul><li>NSF components - a NSF component is a Notes NSF </li></ul></ul><ul><ul><li>Eclipse components - technically an Eclipse ViewPart. This includes all technologies that you can use in an ViewPart (for example, SWT, AWT, embedded browser etc.) </li></ul></ul><ul><ul><li>Local portlet components: technically plugins with .WAR files in them </li></ul></ul><ul><ul><li>Portlet components </li></ul></ul><ul><ul><li>WebSphere Portlet Factory components </li></ul></ul>
  15. 15. Answer 4 (5) <ul><li>The following are some other common terms that are used when discussing composite applications in Lotus Notes: </li></ul><ul><ul><li>Notes application - This was formerly called a &quot;Notes database.&quot; An IBM Lotus Notes application can have many views, framesets, etc. </li></ul></ul><ul><ul><li>NSF component - A Notes database used in a composite application </li></ul></ul><ul><ul><li>Component view for NSF components - Defines what is displayed in a palette in the Composite Application Editor. This is represented as one rectangle in the Editor user interface (for example, a Notes view, a Notes form) </li></ul></ul><ul><ul><li>NSF-based application - An NSF file that stores one or multiple composite application XML files (ca.xml) . </li></ul></ul>
  16. 16.
  17. 17. Answer 4 (6) <ul><li>With provisioning available to composite applications, each time you log in to the Standard client, the system checks the provisioning server (for example, the Home Portal) to determine if there are updates available. </li></ul><ul><li>If updates are available, or if user policy settings have changed since your last login, you are prompted to update the composite application or client. </li></ul>
  18. 18. Answer 4 (7) <ul><li>Update site feature in Domino Designer </li></ul><ul><li>In this release of Domino Designer, the updatesite.ntf template is provided which implements a complete Eclipse Update Site . </li></ul><ul><li>This template serves as the Eclipse-based update site hosted in an NSF on a Domino server. The update site database, based on updatesite.ntf, is essentially the IBM Lotus Domino Eclipse site server. It dynamically provides the site.xml and a set of features and plug-in JARs. </li></ul><ul><li>Update site locations for each feature are included in the site.xml file, which resides in the same updateSite directory as the features, images, and plug-ins and which should accompany your composite application. </li></ul><ul><li>The site.xml file lists all of the features contained within the updateSite folder. It also contains a URL for each feature that specifies where the feature is located. This location is used during original feature provisioning as well as during feature updates. </li></ul>
  19. 19. Answer 4 (8) <ul><li>You can define a list of update sites in an update site.nsf (using the updatesite.ntf template) which is used in place of or in addition to the capability to define a list of servers using the Server Configuration document in Domino administrator client. </li></ul><ul><li>Although multiple copies of this database are possible, in general the number will be one or small. There is no access control on individual features and plug-ins; the only access control is contained in the feature deployment document and in the composite application on the pages/components that refer to the features contained in this database. </li></ul>
  20. 20. Question 5 <ul><li>Which of the following are required to be enabled for Server Fast Restart to function? </li></ul><ul><li>Cleanup Script </li></ul><ul><li>Fault Recovery </li></ul><ul><li>maximum Fault Limits </li></ul><ul><li>Server Shutdown Timeout </li></ul><ul><li>Answer: B </li></ul>
  21. 21. Answer 5 (1) <ul><li>Server Fast Restart allows a new Domino instance to start while NSD diagnostics are being run on the initial Domino server instance. </li></ul><ul><li>The fault-recovery system is initialized before the Domino Directory can be read . During this initialization, fault-recovery settings are read from the NOTES.INI file, and then later read from the Domino Directory and saved back to the NOTES.INI file: </li></ul><ul><ul><li>Open the Server document, click Edit Server, and click the Basics tab. </li></ul></ul><ul><ul><li>In the Fault Recovery section, check &quot;Automatically Restart Server After Fault/Crash Enabled. </li></ul></ul>
  22. 22. Answer 5 (2) <ul><li>You can set up fault recovery to automatically handle server crashes . When the server crashes, it shuts itself down and then restarts automatically . </li></ul><ul><li>A fatal error such as an operating system exception or an internal panic terminates each Lotus Domino process and releases all associated resources. The startup script detects the situation and restarts the server. </li></ul><ul><li>Domino records crash information in the data directory. When the server restarts, Domino checks to see if it is restarting after a crash. </li></ul><ul><li>If it is, an e-mail is sent automatically to the person or group in the &quot;Mail Fault Notification to&quot; field. The e-mail contains the time of the crash, the server name, and, if available, the FAULT_RECOVERY.ATT file, which includes additional failure information from an optional cleanup script. </li></ul>
  23. 23. Answer 5 (3) <ul><li>Subject : NSD Host Name : WALTS-T61 User Name : SYSTEM Date : Fri May 15 11:53:29 2009 Windows Dir : C:Windows Arguments : &quot;C:IBMLotusNotes8nsd.exe&quot; -dumpandkill -termstatus 1 -dlgopts showwait -crashpid 4524 -crashtid 5540 -runtime 300 -ini &quot;C:IBMLotusNotes8notes.ini&quot; -svcreq 128 NSD Version : 8.5.00.8318 (Release 8.5) OS Version : Windows/Vista 6.0 [64-bit] (Build 6001), PlatID=2, Service Pack 1 (2 Processors) Running as 32-bit Windows application on 64-bit Windows Build time : Sat Dec 6 01:58:24 2008 Latest file mod : Fri Nov 14 21:25:15 2008 Notes Core Version : Release 8.5 (32-bit client) Notes Standard Version : 8.5_20081211.1925 <@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@> Section: System Data -> OS Process Table (Time 11:53:36) <@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@> <@@ ------ System Data -> Active Users (Time 11:53:36) ------ @@> UID Name 0 SYSTEM 1013 wseymour <@@ ------ System Data -> Processes (Time 11:53:36) ------ @@> INFO PID PPID UID STIME COMMAND 0000 0000 0 ??? [[System Process]: 0000] 0250 0004 0 05/15 11:35:26 [ smss: 0250] </li></ul>
  24. 24. Question 6 <ul><li>While installing the first Domino server, Alan is presented with a list of Internet services. Which of the following are selections for Alan under Internet services? </li></ul><ul><li>Database Replicator, Ports and Web Interfaces </li></ul><ul><li>Directory engines, Schedule Management and Billing </li></ul><ul><li>W eb browsers, Internet Mail clients and Directory services </li></ul><ul><li>Protocols, Domino Enterprise Connection Services and Web Statistics </li></ul><ul><li>Answer: C </li></ul>
  25. 25. Answer 6
  26. 26. Question 7 <ul><li>David modified the names of the ID vault administrators for the organization. When the names were modified, they were adjusted in the vault database ACL and also in which of the following locations? </li></ul><ul><li>The Domino server log.nsf </li></ul><ul><li>The vault certificate document in the Domino Directory </li></ul><ul><li>The idvault.log file for the assigned ID vault database </li></ul><ul><li>The vault document in the Security - ID Vaults view of the Domino Directory </li></ul><ul><li>Answer: D </li></ul>
  27. 27. Answer 7
  28. 28. Question 8 <ul><li>Marie, a Domino user, is sending an email to a person not found in the Domino Directory. In what message format will the router send the message? </li></ul><ul><li>The format will always be in MIME </li></ul><ul><li>The format will always be in SMTP </li></ul><ul><li>The format will always be in Notes Rich Text </li></ul><ul><li>D. The format will be decided by the type of address being sent to </li></ul><ul><li>Answer: D </li></ul>
  29. 29. Answer 8 (1) <ul><li>Przesyłanie poczty elektronicznej: </li></ul><ul><ul><li>W przesłaniu poczty elektronicznej pomiędzy użytkownikami biorą udział różne komponenty (mailer, skrzynka pocztowa routera poczty). </li></ul></ul><ul><ul><li>Skrzynki pocztowe użytkowników mogą znajdować się na tym samym (pojedynczym) serwerze. </li></ul></ul><ul><ul><li>Skrzynki pocztowe użytkowników mogą znajdować się na różnych serwerach, ale w tej samej sieci DNN (Domino Named Network). </li></ul></ul><ul><ul><li>Skrzynki pocztowe użytkowników mogą znajdować się na różnych serwerach i w różnych sieciach DNN (Domino Named Network). </li></ul></ul>Wiadomość pocztowa Router Mail Box Skrzynka pocztowa odbiorcy
  30. 30. Answer 8 (2) <ul><li>The Router periodically checks MAIL.BOX for new or changed messages. When it finds a message that requires processing, the Router reads the recipient list and for each recipient determines whether the destination mail file is on the current server or a different server. </li></ul><ul><li>When a recipient's mail file is not on the local server, but is in the Domino domain, Domino calculates how to route the message to the recipient's server and whether to use SMTP or Notes routing (NRPC). The configuration of the local server and the message format determine how Domino moves the message to the server. </li></ul><ul><li>For messages in MIME format, if the local server can send SMTP within the local Internet domain and the home mail server can receive SMTP, the Router uses SMTP to send the message. Otherwise the message is routed using NRPC. </li></ul>
  31. 31. Answer 8 (3)
  32. 32. Answer 8 (4) <ul><li>When necessary, the Router converts the format of the message. Conversion can occur during message delivery and during message transfer. </li></ul><ul><li>For example, if a recipient's Person document specifies MIME storage for incoming mail, but the original message was sent in Notes rich text format, the Router converts the message to MIME before delivering it to the local recipient's mail file . </li></ul><ul><li>To determine whether the receiving server can handle MIME messages, the sending server checks the Server document of the receiving server to find out what version of Domino it's running. </li></ul>
  33. 33. Question: 9 <ul><li>Each port on a Domino server may be in how many Notes Named Networks? </li></ul><ul><li>One </li></ul><ul><li>Two </li></ul><ul><li>Four </li></ul><ul><li>Seven </li></ul><ul><li>Answer: A </li></ul>
  34. 34. Answer 9 <ul><li>W przypadku rozbudowanych systemów serwery mogą być „pogrupowane” w tzw. sieci DNN (Domino Named Network). </li></ul><ul><li>Dwa serwery należą do tej samej sieci DNN: </li></ul><ul><ul><li>mają wspólny protokół (warunek wymagany) </li></ul></ul><ul><li>Cechy charakterystyczne dla sieci DNN: </li></ul><ul><ul><li>poczta elektroniczna są przesyłane w sposób automatyczny </li></ul></ul><ul><ul><li>użytkownicy „widzą” serwery w sieci DNN </li></ul></ul><ul><li>Jeden serwer Domino może należeć do kilku sieci DNN, każda z sieci DNN „współdzieli” jeden protokół. </li></ul>
  35. 35. Question: 10 <ul><li>Which server console command adds or changes a setting in the NOTES.INI file? </li></ul><ul><li>Load update </li></ul><ul><li>Enter change </li></ul><ul><li>Set Configuration </li></ul><ul><li>Update notes variable </li></ul><ul><li>Answer: C </li></ul>
  36. 36. Answer 10 (1) <ul><li>To improve view indexing performance, you can run multiple Update tasks . </li></ul><ul><li>Set Configuration </li></ul><ul><li>Set Configuration setting </li></ul><ul><li>This command a dds or changes a setting in the NOTES.INI file. </li></ul><ul><li>Tip : You can also use the IBM® Domino Administrator to add or change (edit) many settings in the NOTES.INI file using the Configuration Settings document. </li></ul><ul><li>Example: </li></ul><ul><ul><li>Set Configuration Replicators = 3 </li></ul></ul><ul><ul><li>Set Configuration Names = Names,Westnames </li></ul></ul>
  37. 37. Question: 11 <ul><li>Oscar has noticed that when the Domino server launches, the Router states that it is in the domain acme.com for receiving Internet email. </li></ul><ul><li>Oscar has yet to create a Global Domain document for his environment. Where is the server obtaining the domain name information? </li></ul><ul><li>From the server's host name </li></ul><ul><li>From the Ports tab of the server document </li></ul><ul><li>From the FQDN field on the server document </li></ul><ul><li>From a notes.ini variable SMTPMailDomain=acme.com </li></ul><ul><li>Answer: A </li></ul>
  38. 38. Answer 11
  39. 39. Question: 12 <ul><li>A Configuration Directory utilizes a primary Domino Directory for which of the following? </li></ul><ul><li>To negotiate replication settings and obtain the administrative server requests </li></ul><ul><li>To obtain information on Person, Group, Mail-In Database, and Resource documents </li></ul><ul><li>To obtain information on connection, program, schedule and certificate documents </li></ul><ul><li>To allow remote users to passthru to internal Domino servers as defined in the Configuration Directory </li></ul><ul><li>Answer: B </li></ul>
  40. 40. Answer 12 (1) <ul><li>A central directory architecture is an optional directory architecture you can implement in a Domino domain. </li></ul><ul><li>This architecture differs from the traditional distributed directory architecture in which every server in a domain has a full replica of the primary Domino Directory. </li></ul><ul><li>With a central directory architecture, some servers in the domain have selective replicas of a primary Domino Directory . </li></ul><ul><li>These replicas, which are known as Configuration Directories , contain only those documents that are used to configure servers in a Domino domain, such as Server, Connection, and Configuration Settings documents. </li></ul><ul><li>A server with a Configuration Directory uses a remote primary Domino Directory on another server to look up information about users and groups and other information related to traditional directory services. </li></ul>
  41. 41. Answer 12 (2) <ul><li>A central directory architecture: </li></ul><ul><ul><li>Provides servers with Configuration Directories quick access to new information because the servers aren't required to wait for the information to replicate to them. </li></ul></ul><ul><ul><li>Enables servers that store Configuration Directories to run on less powerful machines because they don't have to store and maintain the primary Domino Directory. </li></ul></ul><ul><ul><li>Provides tighter administrative control over directory management because only a few directory replicas contain user and group information. </li></ul></ul><ul><li>A server with a Configuration Directory connects to a remote server with a primary Domino Directory to look up information in the following documents that it doesn't store locally: </li></ul><ul><ul><li>Person </li></ul></ul><ul><ul><li>Group </li></ul></ul><ul><ul><li>Mail-in Database </li></ul></ul><ul><ul><li>Resource </li></ul></ul><ul><ul><li>Any custom documents you add </li></ul></ul>
  42. 42. Answer 12 (3)
  43. 43. Question: 13 <ul><li>Domino uses which of the following to determine the best, least-cost path to deliver mail? </li></ul><ul><li>The routing table </li></ul><ul><li>The MAPS server task </li></ul><ul><li>The SMTP updater task </li></ul><ul><li>The certification view in the Domino directory </li></ul><ul><li>Answer: A </li></ul>
  44. 44. Answer 13 <ul><li>The Router on each server maintains a dynamic routing table , which specifies the best route to each possible destination server. The routing table builds on information contained in the server's NOTES.INI file and in the Configuration Settings, Domain, Connection, and Server documents in the Domino Directory. </li></ul><ul><li>By default, at intervals of approximately 5 minutes , or after you restart the task, the Router examines the Domino Directory for changes that would warrant rebuilding the routing table. In cases where you want new settings to take effect immediately, but do not want to interrupt the flow of mail by stopping and restarting the Router, you can use a TELL command to force an update : </li></ul><ul><li>Tell router update config </li></ul><ul><li>The Router checks the Server, Server Configuration, Connection, Adjacent and Non-Adjacent domain documents , and the NOTES.INI file for changes that might effect the routing topology. </li></ul><ul><li>The Router then builds a new routing table that incorporates the changes. The Router reprocesses any messages currently in MAIL.BOX based on the new routing table. </li></ul><ul><li>The Router does not check the Global Domain document for changes in response to the update configuration command. The information contained in the Global Domain document is loaded into memory only after server initialization. It is not refreshed when the routing tables reload. </li></ul>
  45. 45. Question: 14 <ul><li>When a recipient's mail file is not on the local server, but is in the Domino domain, Domino calculates how to route the message to the recipient's server and whether to use SMTP or Notes routing (NRPC). What is the next determination of how the message is routed? </li></ul><ul><li>If the user's mailfile is running the same Domino version as the sender determines how the message is routed </li></ul><ul><li>The configuration of the local server and the message format determine how Domino moves the message to the server </li></ul><ul><li>If the local server can send SMTP within the local Internet domain and the home mail server can receive SMTP, the Router uses SMTP to send the message </li></ul><ul><li>The configuration of the SMTP task to allow relays on the destination server is read from the Domino Directory. If relays are allowed the message is sent NRPC </li></ul><ul><li>Answer: B </li></ul>
  46. 46. Answer 14 (1) <ul><li>The Router periodically checks MAIL.BOX for new or changed messages. When it finds a message that requires processing, the Router reads the recipient list and for each recipient determines whether the destination mail file is on the current server or a different server. </li></ul><ul><li>When a recipient's mail file is not on the local server, but is in the Domino domain, Domino calculates how to route the message to the recipient's server and whether to use SMTP or Notes routing (NRPC). The configuration of the local server and the message format determine how Domino moves the message to the server. </li></ul><ul><li>For messages in MIME format, if the local server can send SMTP within the local Internet domain and the home mail server can receive SMTP, the Router uses SMTP to send the message. Otherwise the message is routed using NRPC. </li></ul><ul><li>When necessary, the Router converts the format of the message. Conversion can occur during message delivery and during message transfer. For example, if a recipient's Person document specifies MIME storage for incoming mail, but the original message was sent in Notes rich text format, the Router converts the message to MIME before delivering it to the local recipient's mail file. To determine whether the receiving server can handle MIME messages, the sending server checks the Server document of the receiving server to find out what version of Domino it's running. </li></ul>
  47. 47. Answer 14 (2)
  48. 48. Question: 15 <ul><li>POP3 and IMAP use which of the following for user authentication? </li></ul><ul><li>A Notes id file </li></ul><ul><li>Single sign-on (SSO) </li></ul><ul><li>Public and private keys </li></ul><ul><li>Username and Internet password </li></ul><ul><li>Answer: D </li></ul>
  49. 49. Answer 15
  50. 50. Question: 16 <ul><li>Notes Shared login is only available to which of the following? </li></ul><ul><li>Notes ID's protected by Smartcards </li></ul><ul><li>Notes IDs us ed in a Citrix environment </li></ul><ul><li>Notes IDs for users who have Windows mandatory profiles </li></ul><ul><li>Notes IDs on the computer where shared login was enabled </li></ul><ul><li>Answer: D </li></ul>
  51. 51. Answer 16 (1) <ul><li>If your Lotus Notes users‘ Windows passwords are synchronized with their Notes passwords, allowing them to use the same password for both Notes and their operating system you (or they) must have selected the custom feature &quot;Client Single Logon&quot; while installing Notes. </li></ul><ul><li>If possible, use the newer Notes shared login feature, which eliminates Notes passwords, rather than &quot;Client Single Logon&quot; </li></ul><ul><li>Notes shared login is enabled through policy configuration . </li></ul><ul><li>If &quot;Client Single Login&quot; is installed on clients, it must be uninstalled before Notes shared login can be enabled. </li></ul>
  52. 52. Answer 16 (2) <ul><li>Using Notes shared login to suppress password prompts </li></ul><ul><li>Notes shared login allows users to start Lotus Notes without having to provide Notes passwords. Instead, they only need to log in to Microsoft ® Windows ® using their Windows passwords. </li></ul><ul><li>When shared login is enabled, Notes IDs no longer have Notes passwords. Instead, a complex &quot;secret&quot; is used to protect the ID. This secret is encrypted using a M S Windows security mechanism and saved locally on users' computers. </li></ul><ul><li>Enabling shared login alters the ID so that shared login works only on the computer on which the feature is activated. This is a requirement because the feature relies on a Windows security infrastructure specific to that computer. </li></ul><ul><li>Shared login provides the following benefits: </li></ul><ul><ul><li>Users need to remember only their Windows passwords. </li></ul></ul><ul><ul><li>Notes shared login works without interruption when Windows passwords are changed either by users or by administrators on a Windows domain controller. </li></ul></ul><ul><ul><li>Administrators use policies to control who uses the feature and whether its use is required or optional. </li></ul></ul><ul><ul><li>Administrators are not required to manage Notes passwords or assist users who have forgotten their passwords because there are no longer Notes passwords. </li></ul></ul>
  53. 53. Answer 16 (3) <ul><li>When Notes shared login is enabled: </li></ul><ul><li>Security Settings for policies that relate to Notes passwords are not supported and are ignored. The User Security dialog box does not display fields relating to Notes passwords. </li></ul><ul><li>The &quot;Check password on Notes ID file&quot; security setting is not supported. Domino servers ignore this setting for IDs enabled for shared login. If you use pre-8.5 Domino servers, the setting should be disabled for users with these IDs. </li></ul><ul><li>If Notes users were synchronizing Internet passwords with Notes passwords in an earlier release, they must now begin managing their Internet passwords. </li></ul><ul><li>Shared login-enabled IDs that are stored in a Notes ID vault can be used from more than one Microsoft Windows computer without requiring users to make copies of the ID file. To use an ID on more than one computer when a Notes ID vault is not used, a user clicks &quot;Copy ID&quot; in the User Security dialog box to make a new, Notes-password-protected copy of the ID file. When the user runs Notes using the copied ID on another computer, the user's effective policy determines if the ID will be enabled for Notes shared login. </li></ul><ul><li>If Notes IDs are stored on a network share, the IDs can be used only from the computers on which shared login is activated. </li></ul><ul><li>To open an shared login-enabled ID through the Domino Administrator, you must always use the computer and the Windows login name that were used when the ID was shared login-enabled. </li></ul><ul><li>Roaming users who roam their IDs cannot use Notes shared login. </li></ul>
  54. 54. Question: 17 <ul><li>SMTP stands for which of the following? </li></ul><ul><li>Simple Mail Transport Protocol </li></ul><ul><li>Simple Mail Transfer Protocol </li></ul><ul><li>Standard Mail Transfer Protocol </li></ul><ul><li>Standard MailTransport Protocol </li></ul><ul><li>Answer: B </li></ul>
  55. 55. Question: 18 <ul><li>The purpose of the RnRMgr task is which of the following? </li></ul><ul><li>Create an individual document for each mail user in the new RnRBusytime database with busytime marked </li></ul><ul><li>Watch for reservation requests in an R R database and to process them in the order in which they arrive or were created </li></ul><ul><li>Scan all the mail users, rooms and resources in the domain and populate the busytime database with the freetime for each one </li></ul><ul><li>Obtain a list of all rooms and resources across the local and foreign domains and consolidate the freetime into a single busytime database on a daily basis </li></ul><ul><li>Answer: B </li></ul>
  56. 56. Answer 18 <ul><li>Processes all Rooms and Resources activities, such as meeting invitations, reschedules or cancellations, and updates the Busytime database ( busytime.nsf ) accordingly. </li></ul>
  57. 57. Question: 19 <ul><li>Where can you view server statistics in the Domino Administrator client? </li></ul><ul><li>Server tab > Statistics tab </li></ul><ul><li>Statistics tab > Server tab </li></ul><ul><li>Domino tab > Server Statistics tab </li></ul><ul><li>Server Statistics tab > Domino tab </li></ul><ul><li>Answer: A </li></ul>
  58. 58. Question: 20 <ul><li>Miranda wishes to deploy LDAP access to the Domino directory. However, she wishes to restrict the fields available to anonymous users. In what document are the fields selected that will be available to anonymous access? </li></ul><ul><li>LDAP Site document </li></ul><ul><li>Internet Site document </li></ul><ul><li>LDAP configuration document </li></ul><ul><li>Server configuration document </li></ul><ul><li>Answer: D </li></ul>
  59. 59. Answer 20 <ul><li>Step 1: Open the domain Configuration Settings document in the directory : </li></ul><ul><li>Click the Configuration tab. </li></ul><ul><li>In the left pane, expand Directory, then LDAP, and then select Settings. </li></ul><ul><li>Do one of the following: </li></ul><ul><li>If you see the prompt &quot;Unable to locate a Server Configuration document for this domain. Would you like to create one now?&quot; click Yes, then click the LDAP tab on the document. </li></ul><ul><li>If you do not see the prompt, click &quot;Edit LDAP Settings.&quot; </li></ul>
  60. 60. Question 21 <ul><li>In the Domino Administrator client how do you view a visual representation of the mail system structure? </li></ul><ul><li>T opologies tab > Mail and Messaging tab > Map section > Mail view </li></ul><ul><li>Server tab > Mail tab > Routing Map section > Server Connections view </li></ul><ul><li>Statistics tab > Messaging tab > Mail Routing section > Topology view </li></ul><ul><li>Messaging tab > Mail tab > Mail Routing Topology section > By Connections view </li></ul><ul><li>Answer: D </li></ul>
  61. 61. Question: 22 <ul><li>Rob runs the task UPDALL with the -R argument on his server. What will this accomplish? </li></ul><ul><li>It rebuilds indices in all views in all databases on the server. </li></ul><ul><li>It discards damaged indices in all views in all databases on the server. </li></ul><ul><li>It deletes all indices so that they can be recreated when users access them. </li></ul><ul><li>It removes unused space from indices in all views in all databases on the server. </li></ul><ul><li>Answer: A </li></ul>
  62. 62. Answer 22 <ul><li>You can use any of these methods of running the Updall task on a server: </li></ul><ul><ul><li>Task - Start tool in the Domino Administrator - Use this method if you don't want to use command-line options. </li></ul></ul><ul><ul><li>Load Updall console command-- Use this method if you're comfortable using command-line options or if you want to run Updall directly at the server console when there is no Domino Administrator running on the server. </li></ul></ul><ul><ul><li>Program document that runs Updall-- Use this method to schedule Updall to run at particular times. </li></ul></ul><ul><li>Run Updall on a Win32 platform - Use this method if you are unable to run Updall at the server console. This method requires that you use the &quot;n&quot; prefix -- for example, nupdall - R. </li></ul><ul><li>When you use these methods, you can include options that control what Updall updates. For example, you can update all views and not update any full-text search indexes. </li></ul><ul><li>Rebuild: Full-text indexes only </li></ul><ul><li>-X </li></ul><ul><li>Rebuilds full-text indexes and does not rebuild views. Use to rebuild full-text indexes that are corrupted. </li></ul><ul><li>Rebuild: All used views </li></ul><ul><li>-R </li></ul><ul><li>Rebuilds all used views. Using this option is resource-intensive, so use it as a last resort to solve corruption problems with a specific database. </li></ul><ul><li>Rebuild: Full-text indexes and additionally: All unused views </li></ul><ul><li>database –C </li></ul><ul><li>Rebuilds unused views and a full-text index in a database. Requires you to specify a database. </li></ul>
  63. 63. Question: 23 <ul><li>Lotus Notes Traveler server maintains a database with information pertaining to the cluster replicas of the mail files which are being synchronized with a Lotus Notes Traveler client. </li></ul><ul><li>The file name of this database is which of the following? </li></ul><ul><li>travcldir.nsf </li></ul><ul><li>mduserdir.nsf </li></ul><ul><li>ntsclcache.nsf </li></ul><ul><li>lntravcache.ndk </li></ul><ul><li>Answer: C </li></ul>
  64. 64. Answer 23 (1) <ul><li>Rebuilding the Cluster Cache database </li></ul><ul><li>When the Notes Traveler Cluster Cache database does not reflect changes to Domino mail clusters, a rebuild of the cluster cache database is required. </li></ul><ul><li>Lotus Notes Traveler server maintains a database with information pertaining to the cluster replicas of the mail files which are being synchronized with Lotus Notes Traveler clients. </li></ul><ul><li>This database is titled Traveler's Cluster Cache ( Ntsclcache.nsf ). Use the following steps to initiate a rebuild of the Lotus Notes Traveler Cluster Cache database. </li></ul><ul><ul><li>Open the Traveler's Cluster Cache database. </li></ul></ul><ul><ul><li>Select and delete either the users whose cluster information needs to be rebuilt or all of the entries. </li></ul></ul><ul><ul><li>Close the database. </li></ul></ul><ul><li>Tip : To refresh a user's cached entries (contained in Ntsclcache.nsf ), open the Domino console and enter : </li></ul><ul><li>tell traveler show username </li></ul>
  65. 65. Answer 23 (2)
  66. 66. Question: 24 <ul><li>Jerrod, a new Domino administrator, has been attempting to take corrective actions on some Domino Domain Monitoring events. </li></ul><ul><li>However, the actions are not available. Which of the following rights are required? </li></ul><ul><li>Manager rights to DDM.nsf </li></ul><ul><li>Execute CA role in DDM.nsf </li></ul><ul><li>Editor access to Admin4.nsf </li></ul><ul><li>Corrective role in Events4.nsf </li></ul><ul><li>Answer: B </li></ul>
  67. 67. Answer 24 (1) <ul><li>Modular documents are the reference documents for the Probable Cause , Possible Solution , and Corrective Actions statements. </li></ul><ul><li>Every Probable Cause statement, Possible Solution statement and Corrective Action statement has a corresponding Modular document. </li></ul><ul><li>The Probable Cause, Possible Solution, and Corrective Actions statements on Server and Addin Task Events documents are derived from the Modular documents. </li></ul>
  68. 68. Answer 24 (2) <ul><li>Domino Domain Monitoring - new features </li></ul><ul><li>WebSphere Services Probe - Use the WebSphere Services probe subtype to monitor whether protocol requests are being processed for WebSphere services.. </li></ul><ul><li>Enhancement to the Directory Probe - LDAP Search Response probe subtype -- Monitors the server's average search response time for LDAP searches. You may choose to monitor all searches executed on the server or limit monitoring to only the longest running searches stored in LDAP Server memory. Choosing the longest running searches option provides additional details on searches so they can be identified and addressed. </li></ul><ul><li>Administration probe type and Automatic Report Closing probe subtype - There is one administration probe subtype -- Automatic Report Closing. Use the Automatic Report Closing probe to close Event reports that have been open for a specified amount of time, but that are inactive during that time. </li></ul><ul><li>Common Actions button on Events document - You can use the Common Actions button to access a list of the most commonly performed actions for resolving events, and then choose an action. </li></ul><ul><li>Open the Domino Domain Monitoring database (DDM.NSF) when the Domino Administrator is started -- You can set an administration preference to open the Domino Domain Monitoring database (DDM.NSF) when the Domino Administrator client starts. </li></ul>
  69. 69. Answer 24 (3) <ul><li>New Execute CA role required to access Corrective Actions text and link -- To access the Corrective Action text and the link associated with a Corrective Action, you must be assigned the Execute CA role in the ACL for DDM.NSF. </li></ul><ul><li>New Modular documents -- Modular documents are the reference documents for the Probable Cause, Possible Solution, and Corrective Actions statements. Every Probable Cause, Possible Solution, and Corrective Action statement has a corresponding Modular document. </li></ul><ul><li>Server and Addin Task Events documents contain Lotus entries, Custom entries, or Stock entries -- The Server and Addin Task document contains general event detail for an event such as event type, subtype, severity, Addin Task name, and value. This document references information that is stored in Modular documents. You can create, modify or delete these documents. </li></ul>
  70. 70. Question: 25 <ul><li>A Foreign domain document defines the path between a Domino domain and which of the following? </li></ul><ul><li>Adjacent domains </li></ul><ul><li>Internet domains </li></ul><ul><li>External applications </li></ul><ul><li>Organizational domains </li></ul><ul><li>Answer: C </li></ul>
  71. 71. Answer 25 <ul><li>Lotus Domino treats external messaging applications, such as fax or pager gateways, as foreign domains. To route mail from a Domino domain to an external application, create a Foreign domain document . </li></ul><ul><li>A Foreign domain document defines the path between a Domino domain and an external application, such as a fax or pager gateway. A Foreign domain document identifies the Domino server that acts as the gateway to the external application. </li></ul><ul><li>Although Foreign domains are mostly used for third party applications, you can also use them to transfer messages between a Release 5.0 or later server and a Release 3.x SMTP server. </li></ul><ul><li>Restrictions that you set on this Foreign domain document apply only to the From domain of the previous hop. </li></ul><ul><li>These restrictions work in conjunction with those in the Configuration Settings document. Domino always defaults to the most restrictive entry. </li></ul><ul><li>To create a Foreign domain document </li></ul><ul><ul><li>From the Domino Administrator, click the Configuration tab and then expand the Messaging section. </li></ul></ul><ul><ul><li>Choose Domains. </li></ul></ul><ul><ul><li>Click Add Domain to create a new Domain document. </li></ul></ul>
  72. 72. Question: 26 <ul><li>You built a pre-existing Domino Domain Monitoring environment with customizations to Lotus provided Domino Domain Monitoring documents. </li></ul><ul><li>Which of the following types of entries are migrated to modular documents in Domino 8.5? </li></ul><ul><li>Stock </li></ul><ul><li>Probe </li></ul><ul><li>Event </li></ul><ul><li>Handler </li></ul><ul><li>Answer: A </li></ul>
  73. 73. Answer 26 <ul><li>Adding or Editing Stock Entries </li></ul><ul><li>You can add or modify Stock entries. Stock entries are Lotus Domino 8 entries . </li></ul><ul><li>Note The Server and Addin Task Event document is also called a Message document. </li></ul><ul><ul><li>From the Domino Administrator, open the database, DDM.NSF. </li></ul></ul><ul><ul><li>From an Event Report that references the Server and Addin Task Event document of interest, click the document link to open that Message document. </li></ul></ul><ul><ul><li>Click Edit Document. </li></ul></ul><ul><li>Note If the Stock Entries tab does not display, click Display Stock Entries . The Stock Entries tab appears. </li></ul>
  74. 74. Question: 27 <ul><li>You are building Domino Domain Monitoring probes in Domino 8.5 and wish to create a standard Possible Solution for all of them. </li></ul><ul><li>Which of the following document types allow this capability? </li></ul><ul><li>Modular </li></ul><ul><li>Embedded </li></ul><ul><li>Component </li></ul><ul><li>Corrective </li></ul><ul><li>Answer: A </li></ul>
  75. 75. Answer 27 <ul><li>Modular documents are the reference documents for the Probable Cause , Possible Solution , and Corrective Actions statements. </li></ul><ul><li>Every Probable Cause statement, Possible Solution statement and Corrective Action statement has a corresponding Modular document. </li></ul>
  76. 76. Question: 28 <ul><li>Streaming cluster replication uses which of the following to move unread marks and folder additions to clustered servers? </li></ul><ul><li>In-memory information </li></ul><ul><li>Scheduled replication </li></ul><ul><li>A temporary index directory </li></ul><ul><li>A database titled clurep.nsf </li></ul><ul><li>Answer: A </li></ul>
  77. 77. Answer 28 (1) <ul><li>Domino 8.X Clusters - new features : </li></ul><ul><ul><li>Improved server availability in a cluster - You can allow the use of auxiliary ports by entering this setting in the server's NOTES.INI file: Server_Cluster_Auxiliary_Port. Use this setting to improve the availability of servers in a cluster. </li></ul></ul><ul><ul><li>Streaming cluster replication - Streaming cluster replication (SCR) takes advantage of the fully connected nature of clusters and data streaming to produce a low-overhead cluster replicator. SCR decreases the scheduled replicator overhead for clusters and provides a significant reduction in cluster replicator latency. </li></ul></ul><ul><li>Streaming cluster replication (SCR) takes advantage of the fully-connected nature of clusters and data streaming to produce a low-overhead cluster replicator. SCR decreases the scheduled replicator overhead for clusters and provides a significant reduction in cluster replicator latency. As changes occur, for example, note changes, unread changes, and folder changes, the changes are captured and immediately queued to other replicas in the same cluster. The result is a more efficient cluster replication. </li></ul><ul><li>If your cluster contains any combination of current-release Domino servers and servers running releases earlier than 8, for the pre-Domino 8 servers, regular cluster replication is used to replicate between current and previous-release servers. </li></ul>
  78. 78. Answer 28 (2) <ul><li>Domino enables SCR when the following sequence of events occurs: </li></ul><ul><ul><li>A database is opened </li></ul></ul><ul><ul><li>Cluster replication replicates a change to another Domino (current-release) clustered replica </li></ul></ul><ul><ul><li>All references to the database are closed </li></ul></ul><ul><ul><li>A database is opened </li></ul></ul><ul><ul><li>On future changes in the database that needs to replicate, SCR replicates the change to the other Domino (current-release) servers. </li></ul></ul><ul><li>If SCR encounters any errors during replication, it returns control of the database to the standard cluster replicator to replicate the change and bring the database in sync. </li></ul><ul><li>As a change occurs to a clustered server's database, the specific change is &quot;captured&quot; and the change is immediately queued for replication to the source server's Domino (current-release) cluster mates that have a replica of the database. When the destination cluster-mates receive the change, they apply it to their replicas. </li></ul><ul><li>The performance benefits of streaming cluster replication are: </li></ul><ul><ul><li>SCR does not perform operations, such as database opens and note opens, across the network. Database changes are sent to the replicas with the assumption that the database replicas need the change. </li></ul></ul><ul><ul><li>SCR does not have to replicate one-to-one with each cluster-mate for a database that has changed. </li></ul></ul><ul><ul><li>The latency time for replication is immediate with SCR. </li></ul></ul>
  79. 79. Answer 28 (3) <ul><li>When a document is read in the Domino Web Access mail file, unread mark processing similar to the unread mark processing used in the Notes Client updates a copy of the unread mark table cached in memory , removing the noteid from the Unread Mark table. </li></ul><ul><li>However, for the Domino Web Access client this memory copy is cached at the server, whereas for the standard Notes Client the cache is maintained at the client. </li></ul><ul><li>When the Domino Web Access user closes the open session, the table is written back to the database in the same way that it is written when the session is closed from the Notes Client. </li></ul>
  80. 80. Question 29 <ul><li>Which of the following Domino database elements are utilized to create documents and display Web pages to a browser? </li></ul><ul><li>Forms </li></ul><ul><li>Views </li></ul><ul><li>Agents </li></ul><ul><li>Data notes </li></ul><ul><li>Answer: A </li></ul>
  81. 81. Answer 29 Element bazy danych Opis elementu Dokumenty Zawierają dane (tekst, grafikę, załączniki) Formularze ( Forms ) Używane do tworzenia dokumentów i wyświetlania stron w środowisku Web. Widoki ( Views ) Używane do wyświetlania dokumentów, dynamicznych tabel z zawartością . Agenci ( Agents ) Wyrażenie programistyczne automatyzujące działania. Uruchamiane według określonego harmonogramu.
  82. 82. Question: 30 <ul><li>Which of the following allow a single LDAP search to return the entire nested group membership for a user? </li></ul><ul><li>dominoAccessGroup </li></ul><ul><li>userGroupMembership </li></ul><ul><li>directoryUserListing </li></ul><ul><li>groupDominoMembership </li></ul><ul><li>Answer: A </li></ul>
  83. 83.
  84. 84.
  85. 85.
  86. 86. Answer 30 (4) <ul><li>Determining all groups a user belongs to is essential for access control . </li></ul><ul><li>Can be an expensive when groups are nested </li></ul><ul><li>Person a member of 10 groups, each of those groups is a member of 10 groups, each of those groups… </li></ul><ul><li>In many deployments each person a member of >100 groups . </li></ul><ul><li>Must be done as efficiently as possible! </li></ul><ul><li>LDAP applications often perform many searches, one per nesting! </li></ul><ul><ul><li>Too expensive, need single search which returns entire nested membership . </li></ul></ul><ul><li>Solution!! </li></ul><ul><ul><li>. dominoAccessGroups </li></ul></ul><ul><ul><li>.ibm-allGroups </li></ul></ul>
  87. 87. Answer 30 (5) <ul><li>.dominoAccessgroups a llows applications to search for access groups in Lotus Domino LDAP server more efficiently .e.g. IBM WebSphere Portal software using groups in Lotus Domino directory via LDAP. </li></ul><ul><li>Operational attribute (modification not allowed) </li></ul><ul><ul><li>Single LDAP search returns all access groups person is member of </li></ul></ul><ul><ul><li>.CN=Gary Logie,OU=Accounting,O=Acme?dominoAccessGroups?base?(objectclass=*) </li></ul></ul><ul><li>Reduced network traffic, LDAP cache usage, and application complexity! </li></ul>
  88. 88. Answer 30 (6) <ul><li>The dominoAccessGroups operational attribute returns the LDAP DNs that represent the security (ACL) groups to which the object belongs. </li></ul><ul><li>Use of dominoAccessGroups can improve performance, as its use requires one LDAP request/response, regardless of the number of groups and nested groups to which the object belongs. The Domino LDAP server can take advantage of the existing group cache (for names lists). </li></ul><ul><li>If dominoAccessGroups is used, other LDAP client applications need not perform recursive searches , thereby reducing application complexity . </li></ul><ul><li>An LDAP client should determine if the LDAP server will serve up dominoAccessGroups by querying the root DSE's ibm-enabledCapabilities attribute and seeing if the OID for dominoAccessGroups, 2.16.840.1.113678.2.2.2.2.1355, is supported. </li></ul><ul><ul><li>[C:] ldapsearch -h hostname -s base &quot;(objectclass=*)&quot; ibm-enabledCapabilities </li></ul></ul><ul><ul><li>ibm-enabledcapabilities=2.16.840.1.113678.2.2.2.2.1354 </li></ul></ul><ul><ul><li>ibm-enabledcapabilities=2.16.840.1.113678.2.2.2.2.1355 </li></ul></ul><ul><li>While overall computation of group membership is faster with dominoAccessGroups, it is possible that the single search now exceeds the LDAP timeout previously used by each of the multiple nested group searches. </li></ul><ul><li>If you discover that your searches that return dominoAccessGroup are timing out, increase the LDAP Timeout value in the Default Configuration Document for the Domino domain. </li></ul>
  89. 89. Question: 31 <ul><li>The ADC prompting is disabled but the Send to IBM option is enabled. Which of the following prompts will the user receive? </li></ul><ul><li>The Notes client end user is prompted to specify whether to send a diagnostic report to their company administrator and to IBM </li></ul><ul><li>A diagnostic report is not sent to the company administrator but the Notes client end user is prompted to specify whether to send a diagnostic report to IBM </li></ul><ul><li>The Notes client end user sees no messages or prompts enabled with no regarding diagnostic collection and reporting. A diagnostic prompting report is sent to the administrator </li></ul><ul><li>A dialog box displays information to the end user that a diagnostic report will be sent to their company administrator. The end user is also prompted as to whether they would like to send a diagnostic report to IBM </li></ul><ul><li>Answer: D </li></ul>
  90. 90. Answer 31 (1) <ul><li>Automatic Diagnostic Data Collection means that, when a Notes client or Domino server crashes, we gather all the necessary data to debug the crash and send it to a mail-in database when the client or server restarts. </li></ul><ul><li>For the ADC Admin can use: </li></ul><ul><li>crash_sendtoibm=1 </li></ul><ul><li>Use the Server Configuration document to set up automatic diagnostic data collection on the server : </li></ul><ul><ul><li>C lick the Configuration tab. </li></ul></ul><ul><ul><li>Click Server - Configurations. </li></ul></ul><ul><ul><li>Select the Server Configuration document you want to edit and click Edit Configuration. </li></ul></ul><ul><ul><li>Click the Diagnostics tab and complete these fields. </li></ul></ul>
  91. 91. Answer 31 (2) <ul><li>Setting up automatic diagnostic data collection on clients </li></ul><ul><li>Use the desktop policy settings document to set up automatic diagnostic data collection on clients. If you have already created a desktop policy settings document, open that document and complete the fields on the Diagnostics tab. </li></ul><ul><li>If you have not already created a desktop policy settings document, complete the entire procedure to create the document. </li></ul>
  92. 92. Question: 32 <ul><li>The Domino Administrator client may access which of the following Web administration bookmarks? </li></ul><ul><li>Portal </li></ul><ul><li>Domino </li></ul><ul><li>Custom company applications </li></ul><ul><li>All of the above </li></ul><ul><li>Answer: D </li></ul>
  93. 93. Answer 32 <ul><li>Administration - new features (examples): </li></ul><ul><li>Web Administration Server Bookmarks -- Use the Web Administration Server Bookmarks features to connect to any remote administration console to administer specific servers from a single administration interface. For example, you can use this feature for IBM® WebSphere® and IBM® WebSphere® Portal administration, as well as IBM® Lotus® Quickr™, IBM® Lotus® Sametime®, or third-party software administration. </li></ul><ul><li>Domino and Portal server federated administration -- You can administer an IBM Lotus Domino 8.x server and an IBM® WebSphere® Portal server 6.0 or 6.0.0.1 from the Portal server administration user interface (UI) on the same Portal server. </li></ul><ul><li>Using update site controls with feature install and update -- New server-managed settings have been added to the Domino Administrator server Configuration Settings document. These options enable the administrator to control how the Eclipse update manager feature installs and updates features and composite applications in the Notes client. </li></ul><ul><li>NSF-based update site template enhancements -- This release contains several enhancements to the Eclipse Update Site (8) template (UPDATESITE.NTF) introduced in IBM® Lotus® Notes® 8.0. </li></ul><ul><li>Notes Widgets and Live Text functionality access and catalog application, template, and policy settings -- A new Widgets catalog application, and its Widget Catalog (8), template ( TOOLBOX.NTF ), are introduced in this release. The administrator can control user access to Widgets and Live Text functionality and Notes Live Text using Domino Desktop policy settings or PLUGIN_CUSTOMIZATION.INI file settings. As well, the administrator can create the server-managed widget catalog using a new template (TOOLBOX.NTF) and control catalog access using policy or preferences and standard ACLs. </li></ul>
  94. 94. Question: 33 <ul><li>Which of the following statements about the COMPACT server task is TRUE? </li></ul><ul><li>The Compact process reindexes views. </li></ul><ul><li>By default, compact runs every day at 3pm. </li></ul><ul><li>Compact may be scheduled via a program document. </li></ul><ul><li>Compact is listed in the TASKS line on all Notes 6 workstations. </li></ul><ul><li>Answer: C </li></ul>
  95. 95. Answer 33
  96. 96. Question: 34 <ul><li>DAOS has been enabled on your Domino server for mailfiles in the Human Resources department. Which of the following compression types must be selected on the mailfiles for attachments? </li></ul><ul><li>LZ 1 </li></ul><ul><li>ZIP </li></ul><ul><li>Crider </li></ul><ul><li>Huffman </li></ul><ul><li>Answer: A </li></ul>
  97. 97. Answer 34 <ul><li>Solution Lotus Notes/Domino® 6 uses LZ1 compression for file attachments. </li></ul><ul><li>LZ1 stands for &quot;Lempel-Zev class 1&quot;; it is a different method of compression from that of the Huffman algorithm, which is the method by which Notes/Domino R5 compresses attachments. </li></ul><ul><li>Because LZ1 compression can save you a considerable amount of disk space, it is favored over the Huffman method. </li></ul><ul><li>Note : LZ1 file compression is available only when files are uploaded via a Notes client and not for files uploaded via the web. </li></ul>
  98. 98. Question: 35 <ul><li>If there is no entry in the replication history of a database, if access rights have changed, or if the selective replication settings have changed, the Replicator performs what function next? </li></ul><ul><li>It has to search all documents in the source database, not just those that have changed since the last replication </li></ul><ul><li>It has to search all deleted documents from the destination database, not just those that have changed since the last replication </li></ul><ul><li>It has to verify if the connection is from a Notes client or Domino server. If the connection is from a Notes client it will immediately begin a pull and overwrite any server data </li></ul><ul><li>It has to open a connection to the Administration Server for the database to inquire if scheduled replication is authorized </li></ul><ul><li>Answer: A </li></ul>
  99. 99. Answer 35 (1) <ul><li>Repli kacja (replication) jest proces em synchronizacji dokumentów (zmian) pomiędzy aplikacjami Domino: </li></ul><ul><ul><li>Replikacja Serwer – Serwer (Server To Server) </li></ul></ul><ul><ul><li>Replikacja Klient – Serwer (Workstation To Server) </li></ul></ul><ul><li>Proces replikacji pozwala na synchronizację danych pomiędzy specjalnymi kopiami aplikacji (replikami). </li></ul><ul><li>Elementy składowe biorące udział w procesie replikacji, to, między innymi: </li></ul><ul><ul><li>Replicator – zadanie na serwerze Domino. </li></ul></ul><ul><ul><li>Replica ID – specjalny numer aplikacji (bazy danych). </li></ul></ul><ul><ul><li>Unique Notes Identification Number ( UNID ) – numer identyfikujący dokument w aplikacji. </li></ul></ul><ul><ul><li>Replication History – historia przebiegu procesu replikacji aplikacji Domino. </li></ul></ul>
  100. 100. Answer 35 (2) <ul><li>1. Replication is initiated by a server or a workstation in one of the following ways: </li></ul><ul><ul><ul><li>Replication schedule settings in a Connection document take effect. </li></ul></ul></ul><ul><ul><ul><li>A replication command to replicate immediately is issued at the server console. The server console commands include replicate, pull, push, and load replica. </li></ul></ul></ul><ul><ul><ul><li>Settings in a Program document. The Program document starts a new task on the server rather than sending work to an existing task. </li></ul></ul></ul><ul><ul><ul><li>A replication command to replicate immediately is issued by an end-user working in the Notes client user interface. This is done from a workstation only, not from a server. </li></ul></ul></ul><ul><ul><ul><li>Scheduled replication from a Notes client. This is done from a workstation only. </li></ul></ul></ul><ul><li>The servers authenticate each other by finding a certificate in common and testing to be sure that certificates are authentic . </li></ul>
  101. 101. Answer 35 (3) <ul><li>2. Replicator constructs a list of local files to replicate and asks the remote server to find those that have a match with the list of local files . </li></ul><ul><ul><li>Note If the server initiating the replication cannot connect to the remote server, or if it cannot search the remote server (Server B), replication fails. </li></ul></ul><ul><li>3. When the Replicator finds a match, it looks at the replication history to find the last time the replicas replicated. The Replicator uses the history in the local database which is the destination database when &quot;pulling&quot; and is the source database when &quot;pushing.&quot; Typically there are two such entries, one for each direction (push/pull). </li></ul><ul><ul><li>If there is no entry in the replication history, if access rights have changed, or if the selective replication settings have changed, the Replicator has to search all documents in the source database, not just those that have changed since the last replication . </li></ul></ul>
  102. 102. Answer 35 (4) <ul><li>4. Replicator searches the source replica for changes that have occurred since the last replication. </li></ul><ul><ul><li>The Replicator constructs a list of documents in the source database that have changed since the last successful replication. (For a pull, the source is the database on the remote server; for a push, the source is the database on the local server.) The list is restricted by the Selective Replication Settings. The time that the search begins is recorded in the replication history so that succeeding replications do not process changes that have been replicated. </li></ul></ul><ul><ul><li>If the data in the source database has not changed since last successful replication to the destination database, no replications take place and the replication history is not updated. </li></ul></ul><ul><li>5. Replication between the source database and the destination database occurs. Replication history is updated fro replication from source database to destination database. If access is sufficient, replication history for both the source and destination databases is updated. </li></ul><ul><ul><li>If replication is not successful, the replication history is not updated and the next replication will search the same databases again. </li></ul></ul>
  103. 103. Answer 35 (5)
  104. 104. Question: 36 <ul><li>Mandy, the Domino administrator, has created an Adminp request for a named server. However, the request will not post to the target server directly. Which of the following best describes why she is unable to perform this operation? </li></ul><ul><li>The target server is in a different Domino domain </li></ul><ul><li>She does not have administrator rights on the target named server </li></ul><ul><li>The source and destination servers do not have direct connectivity </li></ul><ul><li>She is not listed as an editor or higher in the admin4.nsf database </li></ul><ul><li>Answer: C </li></ul>
  105. 105. Answer 36 (1) <ul><li>Proces administracyjny jest usługą serwera Domino ( adminp ), która automatyzuje codzienne zadania administracyjne: </li></ul><ul><ul><li>Zadania związane ze zmiana nazwy: zmiana nazwy użytkownika, zmiana nazwy grupy, usuwanie użytkownika, usuwanie grupy, usuwanie nazwy serwera z systemu, recertyfikacja użytkownika. </li></ul></ul><ul><ul><li>Zadania związane ze skrzynką pocztową: usuwanie pliku poczty, przeniesienie pliku poczty na inny serwer. </li></ul></ul><ul><ul><li>Zadania związane z serwerem Domino – informacje w dokumencie serwera. </li></ul></ul><ul><ul><li>Zarządzanie użytkownikami „wędrującymi”, czyli tzw. Roaming user . </li></ul></ul><ul><ul><li>Zarządzanie skrzynkami pocztowymi (zmiany na liście ACL). </li></ul></ul><ul><ul><li>Zadania związane z aktualizacją dokumentu Person (wersja Klienta Lotus Notes, informacje o platformie systemowej). </li></ul></ul><ul><ul><li>Zadania związane z replikacją (tworzenie replik, przenoszenie, usuwanie). </li></ul></ul>
  106. 106. Answer 36 (2) <ul><li>Administration Requests (ADMIN4.NSF) jest tworzona automatycznie na serwerze administracyjnym (pierwsze uruchomienie serwera): </li></ul><ul><ul><li>Żądanie wykonania pracy jest umieszczane w bazie danych admin4.nsf. </li></ul></ul><ul><ul><li>Wynik wykonania zadania jest również przechowywany w bazie danych (jako odpowiedni rejestr). </li></ul></ul><ul><ul><li>W celu zakończenia prac proces administracyjny umieszcza informację w bazie danych. Następnie informacje te są replikowane w domenie (każdy z dodatkowych serwerów posiada replikę bazy danych). </li></ul></ul><ul><li>W przypadku jednego serwera Domino proces administracyjny nie jest zbytnio skomplikowany. </li></ul><ul><li>W przypadku domeny serwerów (kilka serwerów) zasada działania procesu administracyjnego jest następująca: </li></ul><ul><ul><li>Krok 1 : Żądanie jest zgłaszane do bazy danych Administration Requests (admin4.nsf) </li></ul></ul><ul><ul><li>Krok 2 : Zmiany są replikowane w domenie </li></ul></ul><ul><ul><li>Krok 3 : Serwer administracyjny wykonuje odpowiednie czynności i zmienia status w admin4.nsf </li></ul></ul><ul><ul><li>Krok 4 : Zmiany są replikowane w domenie </li></ul></ul>
  107. 107. Question: 37 <ul><li>Susan has created a list of IP Addresses for the web server that are allowed access and a list of IP Addresses that are denied access. </li></ul><ul><li>Both are placed in the appropriate fields. Which field takes precedence BY DEFAULT when the same IP address is found in both lists? </li></ul><ul><li>The Allow Access field </li></ul><ul><li>The Deny Access field </li></ul><ul><li>The Substitution Access field </li></ul><ul><li>An error will be presented stating an address may not be in both fields </li></ul><ul><li>Answer: A </li></ul>
  108. 108. Answer 37 (1) <ul><li>Controlling access to Web sites </li></ul><ul><li>You can control the Web sites that users access. For example, you might want to prevent users from browsing sites that are not work-related. </li></ul><ul><li>When you specify access settings, keep these tips in mind: </li></ul><ul><ul><li>Use a DNS name rather than an IP address. Entering an IP address forces the Web Navigator to take extra steps to perform a Domain Name System (DNS) lookup. If the DNS cannot resolve an IP address, access to that site is denied. </li></ul></ul><ul><ul><li>A more specific reference overrides a less specific reference. For example, if you enter www.*.com in the &quot;Deny access&quot; field and enter www.ibm.com in the &quot;Allow access&quot; field, users can access www.ibm.com but cannot access sites with names such as www.lotus.com. </li></ul></ul><ul><li>If you enter an identical reference in both the &quot;Allow access&quot; and &quot;Deny access&quot; fields, the &quot;Allow access&quot; entry overrides the &quot;Deny access&quot; entry. </li></ul><ul><li>There is an implied [*] in the &quot;Allow access&quot; field at all times. This [*] allows access to all sites by default, unless you enter settings in the &quot;Deny access&quot; field to override this default. </li></ul>
  109. 109. Answer 37 (2) <ul><li>To control access to Web sites </li></ul><ul><ul><li>C lick the Configuration tab, and then open the Server document for the Web Navigator server. </li></ul></ul><ul><ul><li>Click the Server Tasks - Web Retriever tab, complete these fields, and then save the document . </li></ul></ul>
  110. 110. Question: 38 <ul><li>The Access Control List right of 'Delete Documents' is an option for which of the following? </li></ul><ul><li>Author </li></ul><ul><li>Editor </li></ul><ul><li>Manager </li></ul><ul><li>All of the above </li></ul><ul><li>Answer: D </li></ul>
  111. 111. Answer 38
  112. 112. Question: 39 <ul><li>Notes shared login allows users to start Lotus Notes with their Notes IDs without having to provide Notes passwords. Instead, which of the following do they need to provide? </li></ul><ul><li>A secret passphrase </li></ul><ul><li>A Windows password </li></ul><ul><li>Passwords from more than one person </li></ul><ul><li>An unlock code from the ID vault on their home server </li></ul><ul><li>Answer: B </li></ul>
  113. 113. Answer 39 <ul><li>If your Lotus Notes users‘ Windows passwords are synchronized with their Notes passwords, allowing them to use the same password for both Notes and their operating system you (or they) must have selected the custom feature &quot;Client Single Logon&quot; while installing Notes. </li></ul><ul><li>Note If possible, use the newer Notes shared login feature, which eliminates Notes passwords, rather than &quot;Client Single Logon.&quot; </li></ul><ul><li>Notes shared login is enabled through policy configuration. If &quot;Client Single Login&quot; is installed on clients, it must be uninstalled before Notes shared login can be enabled. </li></ul>
  114. 114. Question: 40 <ul><li>Paul, the Domino administrator, mistakenly modified the administration server for the Domino Directory to modify name fields for the Action settings. Which of the following effects could this change have on the Domino environment? </li></ul><ul><li>Explicit polices will have to be reapplied to users </li></ul><ul><li>Critical names could be removed from the Domino Directory </li></ul><ul><li>All users will recertified with the Organization certifier </li></ul><ul><li>The Administration ECL will be refreshed for all users and pushed to the workstations </li></ul><ul><li>Answer: B </li></ul>
  115. 115. Answer 40
  116. 116. Question: 41 <ul><li>A user accesses a database with the Notes client. The user matches both a wildcard and group entry in the database Access Control List. Which of the following rights is the user granted? </li></ul><ul><li>Group </li></ul><ul><li>Wildcard </li></ul><ul><li>- Default- </li></ul><ul><li>Anonymous </li></ul><ul><li>Answer: A </li></ul>
  117. 117. Answer 41 <ul><li>Scenariusz 1 : Użytkownik należy do dwóch grup. W tym przypadku wygrywa bardziej uprzywilejowane prawo dostępu (grupa z większym prawem dostępu). </li></ul><ul><li>Scenariusz 2 : Użytkownik należy do grupy, ale występuje również jako użytkownik (ACL). W takim przypadku wygrywa indywidualne prawo dostępu. </li></ul><ul><li>Scenariusz 3 : Użytkownik należy do dwóch grup, w tym do Deny List Only . W tym przypadku oznacza to, że osoba nie ma prawa dostępu bez względu na prawa wynikające z innych grup. </li></ul><ul><li>Kolejność sprawdzania praw jest następująca: </li></ul><ul><ul><li>Explicit entry </li></ul></ul><ul><ul><li>group entry </li></ul></ul><ul><ul><li>wildcard entry </li></ul></ul><ul><ul><li>Default- entry </li></ul></ul>
  118. 118. Question: 42 <ul><li>Access Control List (ACL) entries are checked in a specific order when a user authenticates. </li></ul><ul><li>Which of the following correctly identifies that order? </li></ul><ul><li>Anonymous entry > group entry > server entry > wildcard entry </li></ul><ul><li>Server entry > -Default- entry > anonymous entry > group entry </li></ul><ul><li>Explicit entry > group entry > wildcard entry > -Default- entry </li></ul><ul><li>Wildcard entry > deny access entry > group entry > explicit entry </li></ul><ul><li>Answer: C </li></ul>
  119. 119. Answer 42
  120. 120. Question: 43 <ul><li>A user is attempting to send an encrypted mail message to another user on the same Domino system. Which of the following is utilized to encrypt the message? </li></ul><ul><li>The sender's public key </li></ul><ul><li>The sender's private key </li></ul><ul><li>The recipient's public key </li></ul><ul><li>The recipient's private key </li></ul><ul><li>Answer: C </li></ul>
  121. 121. Answer 43 <ul><li>Encrypted and signed mail </li></ul><ul><li>These two options deal specifically with mail messages. The first ensures that only intended recipient(s) can actually read mail . Someone else might gain access to a message, but he or she will not be able to read it without the Notes ID of the true recipient. </li></ul><ul><li>Signing a mail message assures the receiver that the message is not tampered with during transmission. Just like an ink signature, electronic mail signing proves you were the only person who edited the message. While composing an e-mail message, see Delivery Options -> Basic -> Sign & Encrypt. </li></ul>
  122. 122. Question: 44 <ul><li>Paul has configured a database to Enforce a Consistent Access Control List. </li></ul><ul><li>When that database is replicated locally, information about the group membership of the person doing the replication is stored what location? </li></ul><ul><li>In the database </li></ul><ul><li>In the id file of the user </li></ul><ul><li>In the security preferences </li></ul><ul><li>In the personal address book </li></ul><ul><li>Answer: A </li></ul>
  123. 123. Answer 44 (1) <ul><li>Enforcing a consistent access control list </li></ul><ul><li>You can ensure that an ACL remains identical on all database replicas on servers, as well as on all local replicas that users make on workstations or laptops. </li></ul><ul><li>Select the &quot;Enforce a consistent Access Control List&quot; setting on a replica whose server has Manager access to other replicas to keep the access control list the same across all server replicas of a database. If you select a replica whose server does not have Manager access to other replicas, replication will fail because the server has inadequate access to replicate the access control list. </li></ul><ul><li>If you replicate a database locally, the database ACL recognizes your access as it is known to the server. This happens automatically for local replication, regardless of whether &quot;Enforce a consistent access control list&quot; is enabled. </li></ul><ul><li>It should be noted that local replicas with &quot;Enforce a consistent access control list&quot; enabled attempt to honor the information in the ACL and determine who can do what accordingly. </li></ul>
  124. 124. Answer 44 (2) <ul><li>However, they have some limitations. One limitation is that group information is generated on the server, not at the local replica. When a database is replicated locally, information about the group membership of the person doing the replication is stored in the database for use in ACL checking. If a person/identity other than the one doing the replication accesses the local replica, there will be no group membership information available for that person, and the ACL can use only the person's identity, not group membership, to check access . </li></ul><ul><li>Additionally, enforcing a consistent access control list does not provide additional security for local replicas. To keep data in local replicas secure, encrypt the database. </li></ul><ul><li>If you change a local or remote server database replica's ACL when the &quot;Enforce a consistent access control list across all replicas&quot; option is selected, the database stops replicating. The log file records a message indicating that replication could not proceed because the program could not maintain a uniform access control list on replicas. </li></ul>
  125. 125. Question: 45 <ul><li>A Domino domain is a group of Domino servers that share the same which of the following? </li></ul><ul><li>Physical LAN </li></ul><ul><li>Domino Directory </li></ul><ul><li>Network Protocol </li></ul><ul><li>Organization certifier </li></ul><ul><li>Answer: B </li></ul>
  126. 126. Answer 45 <ul><li>Domeną jest zestawienie serwerów i użytkowników korzystających ze wspólnego katalogu Domino (Domino Directory) . </li></ul><ul><li>Pojedyncza domena może składać się z wielu serwerów IBM Lotus Domino . Na każdym z nich „istnieje” replika katalogu Domino . </li></ul><ul><li>Bez względu na „wielkość” systemu pocztowego i baz danych zawsze należy zainstalować, konfigurować i uruchomić pierwszy serwer w organizacji: </li></ul><ul><ul><li>Tworzony jest katalog Domino i inne bazy administracyjne </li></ul></ul><ul><ul><li>Tworzony jest plik cert.id, główny plik certyfikacyjny organizacji (firmy). </li></ul></ul>
  127. 127. Question: 46 <ul><li>While utilizing the Lotus Notes 8.5 client, you are creating new local replicas of server databases. </li></ul><ul><li>Which of the following is the default encryption setting? </li></ul><ul><li>Simple </li></ul><ul><li>Medium </li></ul><ul><li>Moderate </li></ul><ul><li>Strong </li></ul><ul><li>Answer: B </li></ul>
  128. 128. Question: 47 <ul><li>To obtain more recent information about the status of a X.509 certificate, you would utilize which of the following? </li></ul><ul><li>CRL </li></ul><ul><li>SSL </li></ul><ul><li>OCSP </li></ul><ul><li>NDCC </li></ul><ul><li>Answer: C </li></ul>
  129. 129. Answer 47 (1) <ul><li>X.509 Certificate Standard </li></ul><ul><li>X.509 is an international standard for what should be included in a digital certificate. </li></ul><ul><li>Here is the definition from webpedia.com: </li></ul><ul><ul><li>A widely used standard for defining digital certificates. X.509 (Version 1) was first issued in 1988 as a part of the ITU X.500 Directory Services standard. When X.509 was revised in 1993, two more fields were added resulting in the Version 2 format. These two additional fields support directory access control. X.509 Version 3 defines the format for certificate extensions used to store additional information regarding the certificate holder and to define certificate usage. Collectively, the term X.509 refers to the latest published version, unless the version number is stated. </li></ul></ul>
  130. 130. Answer 47 (2) <ul><li>X.509 is that a certificate is required to have the following information: </li></ul><ul><ul><li>Version - X.509 standard version number. </li></ul></ul><ul><ul><li>Serial Number - A sequence number given to each certificate. </li></ul></ul><ul><ul><li>Signature Algorithm Identifier - Name of the algorithm used to sign this certificate by the issuer </li></ul></ul><ul><ul><li>Issuer Name - Name of the issuer. </li></ul></ul><ul><ul><li>Validity Period - Period during which this certificate is valid. </li></ul></ul><ul><ul><li>Subject Name - Name of the owner of the public key. </li></ul></ul><ul><ul><li>Subject Public Key Information - The public key and its related information. </li></ul></ul><ul><li>X.509 define how a certificate contents should be written. It does define how certificate contents should be encoded to store in files. </li></ul>
  131. 131. Answer 47 (3) <ul><li>The Online Certificate Status Protocol (OCSP) enables applications to determine the (revocation) state of an identified certificate. </li></ul><ul><li>OCSP may be used to satisfy some of the operational requirements of providing more timely revocation information than is possible with CRLs and may also be used to obtain additional status information. </li></ul><ul><li>An OCSP client issues a status request to an OCSP responder and suspends acceptance of the certificate in question until the responder provides a response. </li></ul><ul><li>This protocol specifies the data that needs to be exchanged between an application checking the status of a certificate and the server providing that status. </li></ul><ul><li>http://www.faqs.org/rfcs/rfc2560.html#ixzz0n2iceTxy </li></ul>
  132. 132. Answer 47 (4) <ul><li>Lotus Domino 8 introduces support for Online Certificate Status Protocol (OCSP) , RFC 2560. </li></ul><ul><li>OCSP support enhances security for S/MIME signature verification, S/MIME encrypted sender verification, and SSL certificate verification. </li></ul><ul><li>This standard determines the revocation state of an X.509 certificate, giving more up-to-date information than a certification revocation list (CRL) because there is no CRL cache involved. </li></ul><ul><li>On the Lotus Notes client, enable OCSP through a security policy ( Keys and Certificates tab of the security policy settings document ). </li></ul>
  133. 133. Question: 48 <ul><li>Which of the following fields grants the highest level of agent access on the server? </li></ul><ul><li>Run restricted LotusScript/Java agents </li></ul><ul><li>Run unrestricted methods and operations </li></ul><ul><li>Run restricted Simple and Formula agents </li></ul><ul><li>Run unrestrict LotusScript/operating commands </li></ul><ul><li>Answer: B </li></ul>
  134. 134. Answer 48
  135. 135. Question: 49 <ul><li>The TCP Authentication field &quot;Redirect TCP to SSL&quot; is set to &quot;No&quot;. What effect does this setting have? </li></ul><ul><li>To allow clients and servers to use SSL or TCP/IP to access the Web site </li></ul><ul><li>To allow clients and servers to use TCP/IP and POP3 to access the web site </li></ul><ul><li>To require clients and servers to use the SSL protocol to access the Web site </li></ul><ul><li>To require clients and servers to utilize LDAP to retrieve authentication information </li></ul><ul><li>Answer: A </li></ul>
  136. 136. Answer 49 (1) <ul><li>Setting up security for Internet site documents </li></ul><ul><li>To set up security for Internet site documents, you can enable SSL server and client authentication, name-and-password authentication, or anonymous access for Internet and Intranet clients. </li></ul><ul><li>In order to enable SSL for Internet sites, you must configure the SSL port on the Server document and set up SSL on the server by obtaining a server certificate and key ring from an Internet certificate authority. </li></ul>
  137. 137. Answer 49 (2) <ul><li>To set up SSL authentication, you must create a server key ring file for each Internet site document. However, if the Internet site documents are for the same organization, but are created for different protocols, a single server key ring file can be used. Be sure to enter the server key ring file name in the appropriate field on the Security tab of each site document. </li></ul><ul><li>Note For Web sites, the common name on the server key ring must match the DNS name to which the IP address in the Web Site document is mapped. The IP address must be stored in the field &quot;Host name or addresses to map to this site,&quot; which is located on the Web Site document. </li></ul><ul><li>If you enable Redirect TCP to SSL in a Web Site document, both the host name and the IP address must be stored in this field. </li></ul>
  138. 138. Answer 49 (2) <ul><li>In Lotus Domino, it is possible to effectively prohibit access to an Internet site by selecting &quot;no&quot; for all authentication options in an Internet site Document. </li></ul><ul><li>These options include TCP authentication, SSL authentication, and TCP anonymous access. </li></ul><ul><ul><li>C lick Configuration - Web - Internet sites. </li></ul></ul><ul><ul><li>Choose the Internet site document to modify, and click Edit Document. </li></ul></ul><ul><ul><li>Click Security, and complete these fields . </li></ul></ul>
  139. 139. Answer 49 (3) <ul><li>Anonymous (Internet sites, except IMAP and POP3) : </li></ul><ul><ul><li>Yes - To allow anonymous access to this site </li></ul></ul><ul><ul><li>No - To prohibit anonymous access </li></ul></ul><ul><li>Name & password </li></ul><ul><ul><li>Yes - To require a user to authenticate with the user's name and Internet password to access the site </li></ul></ul><ul><ul><li>No - To not require name and password authentication </li></ul></ul><ul><li>Redirect TCP to SSL (Applies to Web Site only): </li></ul><ul><ul><li>Yes - To require clients and servers to use the SSL protocol to access the Web site . </li></ul></ul><ul><ul><li>No - To allow clients and servers to use SSL or TCP/IP to access the Web site . </li></ul></ul>
  140. 140. Question: 50 <ul><li>The password quality scale for ID files has which of the following ranges? </li></ul><ul><li>1-18 </li></ul><ul><li>0-24 </li></ul><ul><li>1-10 </li></ul><ul><li>0-16 </li></ul><ul><li>Answer: D </li></ul>
  141. 141. Answer 50 (1) <ul><li>When creating passwords for user, server, or certifier IDs, you need to understand the criteria by which Domino measures password strength and security . </li></ul><ul><li>Domino measures this criteria according to the level assigned on its password quality scale. The scale assigns a minimum level of quality to the password on an ID file. Domino bases the password quality on the number and variety of characters in the password. </li></ul><ul><li>The algorithm used to calculate password quality is used to enforce the selection of passwords that are sufficiently complex to meet the password quality scale level chosen to protect user ID files. When a user is registered, the user's ID file contains a password strength value. This setting is enforced if the user changes the password. </li></ul>
  142. 142. Answer 50 (2) <ul><li>The scale ranges from 0 (weakest -- no password required) to 16 (strongest). A quality of 1 indicates that any password satisfies the criteria. Domino defines default levels for certifier, server, and user password quality. </li></ul><ul><li>Password strength is not the same as password length . Not all passwords of equal length have equal strength in the password quality scale. For example, the 8-character word &quot;password&quot; (because it is a word) and the 8-character word &quot;1168Acme&quot; (because it contains numbers and alphabetic characters) do not carry the same level of character complexity and do not have equal strength on the quality scale. </li></ul>
  143. 143. Answer 50 (3) <ul><li>Tips for assigning passwords and scale </li></ul><ul><li>Do not use words in a password that are in the Domino spell-check dictionary. Passwords containing words found in a Domino spell-check dictionary are generally weaker than passwords of equal length that do not contain words from the spell-check dictionary. </li></ul><ul><li>Use mixed-case words and words that contain numbers and punctuation for passwords instead of entirely lowercase alphabet characters. To make a password stronger without making it longer, avoid using words; instead use mixed-case characters and include punctuation and numbers. </li></ul>
  144. 144. Answer 50 (4) <ul><li>Use a passphrase instead of a password. A complete sentence, especially one with a word or two misspelled, is a strong password that an attacker would have difficulty guessing. </li></ul><ul><li>Use passwords that have a quality of 12 or higher. Passwords that have a quality of 12 or higher are resistant to an automated attack. Passwords that have a quality below 4 are easy to guess. </li></ul><ul><li>Set a default value for all Password Quality Scale fields so that all passwords assigned to servers, users, and certifier IDs in your organization have appropriate levels of complexity. </li></ul>
  145. 145. Question: 51 <ul><li>A database designer can assign special access to database design elements and database functions by creating which of the following? </li></ul><ul><li>A. Roles </li></ul><ul><li>B. Entries </li></ul><ul><li>C. Programs </li></ul><ul><li>D. Sections </li></ul><ul><li>Answer: A </li></ul>
  146. 146. Answer 51 <ul><li>Za zabezpieczenia dostępu do bazy danych odpowiada ACL ( Access Control List ): </li></ul><ul><ul><li>Manager </li></ul></ul><ul><ul><li>Designer </li></ul></ul><ul><ul><li>Editor </li></ul></ul><ul><ul><li>Author </li></ul></ul><ul><ul><li>Reader </li></ul></ul><ul><ul><li>Depositor </li></ul></ul><ul><ul><li>No Access </li></ul></ul><ul><li>ACL można uzupełnić za pomocą tzw. roli ( roles ): </li></ul><ul><ul><ul><li>Dobrym przykładem jest Domino Directory </li></ul></ul></ul>
  147. 147. Question: 52 <ul><li>Your company, ACME Marble, has users located around the globe and Organizational Unit certifiers have been created for each geographic area. </li></ul><ul><li>You have created an ID vault for the /ACMEMarble organization level that is replicated as well as geographic vaults for Americas, Europe, Asia and Australia on servers located in those regions. If a user in Europe has a vault policy, in which of the following vaults will the id be placed? </li></ul><ul><li>The local vault for Europe will collect the user ID </li></ul><ul><li>The conflict will not allow any ID to be collected by a vault </li></ul><ul><li>The ID will be placed in both the geographic and organizational vaults </li></ul><ul><li>The main vault for /ACMEMarble overrides the geographic vaults and will collect the id </li></ul><ul><li>Answer: A </li></ul>
  148. 148. Answer 52 (1) <ul><li>Platforma w wersji 8.5 oferuje następujące sposoby zarządzania plikami user.id : </li></ul><ul><ul><li>Przechowywanie kopii plików na serwerze plików – podczas rejestracji użytkownika można zapisać kopię pliku user.id na serwerze. </li></ul></ul><ul><ul><li>ID File Recovery – opisany wcześniej mechanizm tworzenie kopii plików user.id oraz „odzyskiwania” hasła dostępu do pliku. </li></ul></ul><ul><ul><li>Notes ID Vault - bardzo użyteczna opcja, wspomagająca administratora w „inteligentnym” zarządzaniu plikami ID oraz odzyskiwaniu hasła: </li></ul></ul><ul><ul><ul><li>Pliki ID są przechowywane w osobnej bazie danych. </li></ul></ul></ul><ul><ul><ul><li>Administrator może przypisać bazę danych za pomocą Policy. </li></ul></ul></ul><ul><ul><ul><li>Możliwość zresetowania hasła do pliku ID, wygenerowanie hasła i wysłanie go do użytkownika pocztą elektroniczną. </li></ul></ul></ul><ul><ul><ul><li>Możliwość audytowania i śledzenia żądań i dostępu do bazy danych. </li></ul></ul></ul>
  149. 149. Answer 52 (2) <ul><li>ID Vault pozwala w sposób natywny i bezpieczny odzyskać i zresetować hasło, odzyskać zagubiony plik user.id, itd.: </li></ul><ul><ul><li>Odzyskanie hasła. </li></ul></ul><ul><ul><li>Reset hasła do pliku user.id. </li></ul></ul><ul><ul><li>Odzyskiwanie zagubionego pliku user.id. </li></ul></ul><ul><ul><li>Możliwość synchronizacji hasła wielu kopii user.id. </li></ul></ul><ul><ul><li>Zmiana nazwy użytkowników. </li></ul></ul><ul><ul><li>Zarządzanie kluczami szyfrowania. </li></ul></ul><ul><li>Uwaga: Możliwości te były także dostępne w poprzednich wersjach, ID Vault zwiększa jedynie łatwość używania oraz możliwości zarządzania plikami user.id. </li></ul><ul><li>Wymagania: </li></ul><ul><ul><li>Przynajmniej jeden serwer w wersji 8.5. </li></ul></ul><ul><ul><li>Lotus Notes 8.5 oraz Domino Administrator 8.5. </li></ul></ul><ul><ul><li>Jeden identyfikator ID z prawem dostępu Editor do katalogu Domino (oraz z prawami tworzenia szablonów i baz danych na serwerze). </li></ul></ul><ul><ul><li>Dostęp do certyfikatorów dodawanych do ID Vault. </li></ul></ul><ul><ul><li>Odpowiednio skonfigurowane ustawienia Security Policy dla ID Vault. </li></ul></ul>
  150. 150. Question: 53 <ul><li>Server Fast Restart allows a new Domino instance to start while NSD diagnostics are being run on the initial Domino server instance. </li></ul><ul><li>Which of the following processes handle the initiation of a new Domino instance? </li></ul><ul><li>NSD </li></ul><ul><li>f aultmon </li></ul><ul><li>Serverrecovery </li></ul><ul><li>diagnosticcollector </li></ul><ul><li>Answer: B </li></ul>
  151. 151. Answer 53 (1) <ul><li>What is Server Fast Restart? </li></ul><ul><li>When a Domino outage occurs, Fast Restart allows a new Domino instance to start while NSD diagnostics are being run on the initial Domino server instance. </li></ul><ul><li>When diagnostics are completed the initial Domino server instance is automatically terminated. In the current release, Server Fast Restart is only available on AIX and Solaris versions of the Domino server. </li></ul><ul><li>How does Server Fast Restart work? </li></ul><ul><li>All files and connections in use by the initial Domino instance are closed but processes and shared memory remain active until NSD diagnostics are completed. </li></ul><ul><li>The new instance will be started by a Server Fast Restart process called faultmon . </li></ul><ul><ul><li>When the initial Domino instance fails, it will send a message to a monitoring program called faultmon . </li></ul></ul><ul><ul><li>faultmon receives the message over a named pipe, and restarts Domino. faultmon has two options for restarting the new Domino instance; the default option is to start the new Domino instance in the background, while the second option allows the user to specify a script to start the new Domino instance. </li></ul></ul>
  152. 152. Answer 53 (2) <ul><li>How to configure Server Fast Restart? </li></ul><ul><li>Server Fast Restart is an extension of Fault Recovery. To use this feature, Fault Recovery must already be enabled in the Server document. Server Fast Restart will honor the NSD &quot;Timeout is ignored but N crashes in M minutes&quot; settings in the Server document. </li></ul><ul><li>1. To enable Server Fast Restart the following must be added to the Notes.INI file: </li></ul><ul><li>SERVER_FAST_RESTART=1 </li></ul><ul><li>Debug_DisableOSFileLocks=1 </li></ul><ul><li>2. (Optional) To enable a script to start the new Domino instance, add the following to the Notes.INI file: </li></ul><ul><li>SERVER_FAST_RESTART_SCRIPT=<path to script including script name> </li></ul><ul><li>Following is a sample script which assumes you have xwindows installed and running: </li></ul><ul><li>rome:carolynn{506}% more rapidstart </li></ul><ul><li>#!/usr/bin/csh -f </li></ul><ul><li>setenv DISPLAY rome:0.0 </li></ul><ul><li>/usr/dt/bin/dtterm -e /local1/M4/lotus/bin/server & </li></ul><ul><li>3. Start faultmon in the Domino data directory: </li></ul><ul><li>/opt/m4/lotus/bin/faultmon </li></ul><ul><li>4. Start Domino as normal </li></ul>
  153. 153. Question: 54 <ul><li>You are attempting to utilize the widget catalog to provision features from your central update site for your Standard Notes clients. You have populated the widget catalog on the server. When will the client receive the new feature? </li></ul><ul><li>When the user's local widgets catalog is updated </li></ul><ul><li>When the user next synchronizes their locally stored policies </li></ul><ul><li>When the administrator adds the proper role to users in the widget catalog </li></ul><ul><li>When the user's desktop policy is refreshed with the new widget information </li></ul><ul><li>Answer: A </li></ul>
  154. 154. Answer 54 (1) <ul><li>Lotus Notes 8.0.1 includes Notes Widgets, which automatically allow you to see Live text and act on it to get work done more quickly. </li></ul><ul><li>For example, you see a flight number in an email - you simply click to check the flight status. You can extend these tools and make them available to your organization or team, so that Lotus Notes documents can automatically recognize and enhance data that is important to you. </li></ul><ul><li>You can easily integrate Notes widgets into any existing Notes application - and these tools seamlessly use third party services (Web sites, Google gadgets, feeds, and so on) to increase individual or team productivity within your organization. </li></ul><ul><li>TOOLBOX.NTF </li></ul>
  155. 155. Answer 54 (2) <ul><li>Create the catalog, for example named TOOLBOX.NSF , using the supplied TOOLBOX.NTF template. </li></ul><ul><li>Assign ACLs to control access rights to the catalog application for administrators, power users, and end users. </li></ul><ul><li>Administrators and power users need read and write access to the catalog. </li></ul><ul><li>Administrators must be granted the [Admins] role in the catalog Access Control List (ACL). Administrators also need one of the following access rights to the catalog ( Manager , Designer , Editor ). </li></ul><ul><li>End users may not be set up to browse and access the catalog directly but rather to obtain widget actions automatically by way of their membership in specific widget categories. End users, if they are not allowed to create and configure widgets, need Reader access to the catalog; otherwise it is recommended that end users are granted Author access to the catalog. </li></ul>
  156. 156. Answer 54 (3) <ul><li>Once you have created the catalog, optionally create an initial set of categories for the catalog. </li></ul><ul><li>There are two types of predefined categories in the catalog - administrator categories and categories. Both of these categories are defined in the Administration/Keyword view. Administrator categories are named &quot;ADMIN-Categories&quot;, while the other categories keyword is named &quot;Categories&quot;. </li></ul><ul><li>You can assign policies or preferences to designate user access to the catalog. </li></ul><ul><li>Enable the &quot;Toolbox Sweeper&quot; agent, which is a scheduled agent set to run against new and modified documents. This agent ensures that Widget documents are properly created and populated . </li></ul><ul><li>A local copy of the catalog will be created on the user's client system and periodically updated based on a 24 hour (default) replication schedule. </li></ul>
  157. 157. Question: 55 <ul><li>Why did Tom designate Server1/Boise/Acme as the Administration Server for the Domino Directory? </li></ul><ul><li>To make sure that all new users were registered on Server1/Boise/Acme. </li></ul><ul><li>To prevent users from making changes to the Domino Directory on Server1/Boise/Acme. </li></ul><ul><li>To force administrators to make all changes to the Domino Directory on Server1/Boise/Acme. </li></ul><ul><li>To ensure that the Administration Process would process all Domino Directory changes on Server1/Boise/Acme. </li></ul><ul><li>Answer: D </li></ul>
  158. 158. Answer 55
  159. 159. Question: 56 <ul><li>After enabling DAOS for a mail database on your server, which of the following compact task must be run on the database to complete the initialization for DAOS on that database? </li></ul><ul><li>A. In-place </li></ul><ul><li>B. Copy-style </li></ul><ul><li>C. Revert database </li></ul><ul><li>D. Discard view indexes </li></ul><ul><li>Answer: B </li></ul>
  160. 160. Answer 56
  161. 161. Question: 57 <ul><li>When changing the order in which ports are listed in the server Setup Ports dialog box, where does this also change the Ports listing? </li></ul><ul><li>In the server document </li></ul><ul><li>In the server notes.ini </li></ul><ul><li>In the server ports document </li></ul><ul><li>In the server configuration document </li></ul><ul><li>Answer: B </li></ul>
  162. 162. Answer 57
  163. 163. Question: 58 <ul><li>While creating the ID Vault, you must configure the organizations that trust the vault for ID storage. Which of the following does this create? </li></ul><ul><li>User policy configurations </li></ul><ul><li>ID Vault administrator accounts </li></ul><ul><li>Vault Trust Certificates in the Domino Directory </li></ul><ul><li>Certifier ID files of the organizations or organizational units with Vault Trust Certificates </li></ul><ul><li>Answer: C </li></ul>
  164. 164. Answer 58
  165. 165. Question: 59 <ul><li>The site update database in Domino supports which of the following security controls for distributing updates? </li></ul><ul><li>Schema </li></ul><ul><li>Encryption </li></ul><ul><li>Author fields </li></ul><ul><li>Reader Fields </li></ul><ul><li>Answer: D </li></ul>
  166. 166. Answer 59 (1) <ul><li>This application allows you to provision features and plugins to Eclipse-based applications like IBM Lotus Notes 8, IBM Lotus Sametime 7.5 and the Eclipse IDE itself. </li></ul>
  167. 167. Answer 59 (2)
  168. 168. Answer 59 (3) <ul><li>A new template was introduced called UPDATESITE.NTF.  This template can be used to create an NSF-based update site that can provide site.xml features and plug-ins.   </li></ul><ul><li>Once you create this database, you can import all your update sites into this database and point your clients to this consolidated site.   </li></ul><ul><li>Since it's a Notes database, it can be replicated across the organization for geographical considerations, and you can use Domino security to provide fine-grained access to the applications. </li></ul><ul><li>So using Domino as an update site provides: </li></ul><ul><ul><li>Robust Domino-based security such as ACLs and reader fields for fine-grained access control . </li></ul></ul><ul><ul><li>Easy replication of features and plugins (read: http access from anywhere) . </li></ul></ul><ul><ul><li>Intelligent analysis and meta-data presentation of the entire update site in easy-to-read Notes documents (all plug-ins used by a feature are doc-linked) . </li></ul></ul><ul><ul><li>Built-in tools to import/merge from other update sites and... </li></ul></ul>
  169. 169. Question: 60 <ul><li>Your Domino server has been configured for DAOS and all mailfiles have also been enabled successfully. </li></ul><ul><li>In which of the following times will consolidation occur when a user saves an attachment that meets the defined DAOS size settings? </li></ul><ul><li>Immediately </li></ul><ul><li>The next time the DAOS service runs </li></ul><ul><li>After the user closes his current Notes session </li></ul><ul><li>The schedule defined in the server configuration document </li></ul><ul><li>Answer: A </li></ul>
  170. 170. Answer 60 Skompresowane załączniki są przechowywane w dedykowanym katalogu, na przykład „dodatkowym” dysku (D:DAOS).
  171. 171. Question: 61 <ul><li>Lotus iNotes allows features that send requests to external servers or Web

×