SlideShare a Scribd company logo
1




LOT-925
Installing and Configuring IBM Lotus Notes and Domino 8.5




                                 www.biztek.pl
2


IBM Certified System Administrator –
Lotus Notes and Domino 8.5
• In June 2011, the IBM Certification        • Individuals who wish to certify on
  Program for Lotus Software                   Lotus Notes Domino 8.5, but have
  announced the restructuring of the           not achieved certification on Lotus
  Lotus Notes Domino 8.5 core                  Notes Domino 7.0 or 8.0 should
  certification paths.                         follow the applicable path(s) below:
• In October 2011, the new core tests
  were released. The old exams                  • Pass LOT-925: Installing and
  remained available for those who                Configuring IBM Lotus Notes and
  had begun the certification process             Domino 8.5 AND
  through to the end of the year.               • Pass LOT-926: Managing and
• Having been withdrawn on                        Maintaining IBM Lotus Notes and
  December 31st, they are no longer               Domino 8.5 Environments.
  available.




                                    www.biztek.pl
3




Test information
• Number of questions: 56                    • Defining and Managing Policies
• Time allowed in minutes: 75                • Install and Configure
• Required passing score: 74%                • Mail
• Test languages: English                    • Manage and Maintain
• Note: There are 56 scored items            • Managing Servers
 and 2 unscored items.                       • Platform Support
                                             • Security
• Exam Type: Multiple Choice.




                                    www.biztek.pl
4




Important links
• Aby przygotować się do egzaminu:
   • Niezbędne jest pewne doświadczenie w administracji.
   • Niezbędna jest umiejętność korzystania z dokumentacji systemu oraz innych
     dostępnych w sieci zasobów.
   • Zaleca się udział we wszystkich kursach administracyjnych.
• http://publib.boulder.ibm.com/infocenter/domhelp/v8r0/index.jsp
• http://www-03.ibm.com/certify/certs/14003305.shtml
• http://www-10.lotus.com/ldd/dominowiki.nsf




                                       www.biztek.pl
5




Question 1
• Which of the following are optional advanced services that must be enabled manually
 when first configuring and installing the Domino server?

  A. SMTP server
  B. Agent Manager
  C. Calendar Connector
  D. DOLS (Domino Off-Line Services)

Answer: A




                                      www.biztek.pl
6




Answer 1 (1)




               www.biztek.pl
7




Question 2
• In order to create a Domino cluster, which rights are required for you to have to the
  Domino Directory?

   A. Editor access rights and ClusterModifier role
   B. Reader access rights and ServerWriter and ServerManager roles
   C. Designer access rights and ClusterCreator and ClusterModifier roles
   D. Author access and Delete Documents rights and the ServerModifier and
   ServerCreator roles

Answer: D




                                        www.biztek.pl
8




  Answer 2 (1)
• A Lotus Domino cluster is a group of two to
  six Lotus Domino servers that provides
  users with constant access to data, balances
  the workload between servers, improves
  server performance, and maintains
  performance when the size of your
  enterprise increases.
• The servers in a cluster contain replicas of
  databases that you want to be readily
  available to users at all times.
• If a user tries to access a database on a
  cluster server that is unavailable, Domino
  opens a replica of that database on a
  different cluster server, if a replica is
  available.
• Domino continuously synchronizes
  databases so that whichever replica a user
  opens, the information is always identical.



 To create a cluster, you must have at least Author access, Delete Documents
 rights, and the ServerModifier and ServerCreator roles in the Lotus Domino
 Directory, and at least Author access to the Administration Requests
 database.

                                                 www.biztek.pl
9




Question 3
Jose set up Web authentication using primary and secondary directories. Which one of
the following describes the order in which he set up directories to be searched?

  A. Domino primary directory, then Domino secondary directories. This is the only
  option available.
  B. Domino primary directory, then either Domino or LDAP secondary
  directories. The administrator can specify the order of secondary searches.
  C. LDAP primary directory, then LDAP secondary directory, and then Domino
  secondary directories. This is the order in which secondary searches must be made.
  D. Domino primary directory, then Domino secondary directory, and then LDAP
  secondary directories. This is the order in which secondary searches must be made.




                                      www.biztek.pl
10




Answer 3 (1)
• When a Web client authenticates with a server, by default, the server checks the
  primary IBM® Lotus® Domino® Directory to see if the client certificate exists in
  the Person document. If your organization uses a secondary Domino Directory
  and/or an LDAP directory to verify client certificates, you can set up Domino to
  check those additional directories. To do so, you set up the secondary Domino
  and LDAP directories as trusted domains in the Directory Assistance database.
• When you mark the domain as trusted, Domino searches the primary Domino
  Directory for the user and then searches the trusted secondary Domino and
  LDAP directories. When you set up directory assistance, you specify the order in
  which Domino searches the secondary directories.
• The hierarchical name returned by the Domino Directory or LDAP directory is checked
  against the trusted rule in the Directory Assistance database to verify that the
  organization and organizational units match the specified rule. For example, if the user
  name returned is Dave Lawson/Acme, the Directory Assistance document must include
  the rule */Acme.




                                        www.biztek.pl
11




Answer 3 (2)
• The Directory Assistance database is used to configure the Directory Assistance
    feature.
•   If your organization includes multiple domains, you can set up directory
    assistance to enable users to browse and select names from Public Directories
    outside of their domain, for example when they address mail, define database
    access control lists (ACL), or complete a NAMES field in documents.
•   When users send mail to recipients in another domain, directory assistance also allows
    Notes to resolve the names before sending the memo.
•   To set up directory assistance, you create the Directory Assistance database
    from the DA50.NTF template. In the Directory Assistance database you define
    naming rules that associate naming hierarchies with each domain--this allows
    Notes to search only Public Directories of domains associated with those
    naming hierarchies when resolving the name of a recipient from another domain.
•   You also use the Directory Assistance database to point to one or more strategically-
    located replicas of each domain's Public Directory. You then create a replica of the
    Directory Assistance database on all servers in each domain.




                                         www.biztek.pl
12




Answer 3 (3)
• To set up directory assistance for a remote LDAP
  directory, create a Directory Assistance document
  for the directory in a directory assistance database
  as follows. Make sure you have read about
  directory assistance services and concepts.
   • Make sure you have created and replicated a
      directory assistance database and have set up
      servers to use it.
   • If you are using the remote LDAP directory for
      any purpose other than LDAP service referrals,
      use the TCP/IP ping utility to test that the IBM®
      Lotus® Domino(tm) servers that will use the
      LDAP directory can connect to the remote
      LDAP directory server.
   • From the Domino Administrator, choose File -
      Open Server, select a server that you have set
      up to use the directory assistance database,
      and click OK.
   • Click the Configuration tab.
   • In the left pane, expand Directory - Directory
      Assistance. If you see "Server Error: File does
      not exist," the server you selected in step 4 is
      not set up to use the directory assistance
      database.
   • Click Add Directory Assistance.


                                               www.biztek.pl
13




   Answer 3 (4)
• Example of directory assistance for one
  secondary Domino Directory
   • Company X uses two domains, Domain A and
     Domain B. Each domain creates its own
     directory assistance database that has a
     Directory Assistance document for the other
     domain's Domino Directory, so that users
     from each domain can address mail easily to
     users in the other domain, and so servers in
     each domain can search groups in the other
     domain's directory when authorizing database
     access. If servers in both domains instead
     used replicas of one directory assistance
     database that included documents for both
     directories, they could enable only one of the
     domain directories for group authorization.
   • Network connections between domains are
     slow, so the company creates replicas of the
     Domain B directory on two Domain A servers
     for servers in Domain A to use, and creates
     replicas of the Domain A directory on two
     Domain B servers for servers in Domain B to
     use.
   • The following images shows the settings for
     the Domain B Directory Assistance document
     in the directory assistance database that
     servers in Domain A use. Domain B uses a
     similar document for the Domain A directory
     in its directory assistance database.
                                                www.biztek.pl
14




Answer 3 (5)




               www.biztek.pl
15




Question 4
A Notes mail message is sent by Miguel to an Internet address through an adjacent
Domino domain over NRPC that then sends mail to the Internet over SMTP. Miguel is
now attempting to recall the mail message. Which of the following will be the result of his
attempt?
   A. He will receive an email that he cannot recall the email message.
   B. He will immediately receive a prompt that the message is not enabled for message
   recall.
   C. He will receive a message from the Internet recipients mail server that the message
   cannot be recalled.
   D. He will successfully recall the message if it is allowed in the server configuration
   and enabled in his user policy.




                                        www.biztek.pl
16




Answer 4 (1)




               www.biztek.pl
17




Answer 4 (2)
• The requirements for Message Recall are:                  • Message Recall works only on mail that is
   • A Lotus Domino V8 or later server containing             routed over NRPC. This means that neither
      the mail to be recalled.                                mail routed to the Internet nor internal mail
   • A mail file based on a Lotus Notes V8 or later
                                                              routed over SMTP can be successfully
      mail template with which to recall the                  recalled.
      message.                                              • If a Mail Policy exists that limits the use of this
   • A copy of the mail message in the sender’s
                                                              feature for a user, this policy applies and can limit
      mail file. (This is usually found in the Sent           the feature’s functionality. If there is no policy, or if
      view, but the Message Recall button is also             the policy allows a user to change the recall
      found in the All Documents view.)                       setting, each user can choose to disable the
                                                              feature in his or her Mail Preferences.
   • Permission given at the server to perform
                                                            • Only mail that resides on a Lotus Domino V8 or
      Message Recall (and optionally at the policy            later server can be successfully recalled. The
      and the recipient’s mail-file level, where the          Lotus Domino V8 router does the work, so a recall
      feature can be turned off).                             request sent to a Lotus Domino V7 server does
• Message Recall not only works with these                    not succeed, and the recalling user receives a
  minimal requirements but also works even if the             report stating that the server does not support
  recalling user is on a server that is not Lotus             Message Recall.
  Domino V8.
• All that is required is a Lotus Notes V8 mail
  template containing the button to recall the
  message and that the message being called
  resides on a Domino V8 server.
• Moreover, interim servers between the recaller
  and the recipient can be any version because the
  request at that point is simply an email message.




                                                 www.biztek.pl
18




Question 5
In order for Peggy to establish alternate message recall settings on a per server basis,
which of the following is the best solution?

   A. Configure the message recall settings in an organization level policy.
   B. Configure the message recall settings in each server's notes.ini file.
   C. Configure the message recall settings in each server configuration
   document.
   D. Configure the message recall settings in explicit policies and manually apply to
   users.




                                        www.biztek.pl
19




Answer 5 (1)
• Lotus Notes and Domino V8 ship with Message Recall enabled. Whether you build a new
  system from scratch or upgrade servers and users, this feature is ready to use.
• The Server Configuration document is used to configure Message Recall. This central
  location lets you easily allow or disallow it for all servers. Mail Policy documents can
  further refine the settings, as can individual user preferences.
• If you do not have any Server Configuration documents, Message Recall is still turned on
  by default, and the default settings, listed here, apply:
    • Message Recall: Enabled.
    • Allow recall of messages with unread status: Unread Only.
    • Do not allow recall of messages older than: 14 days.




                                       www.biztek.pl
20




Question 6
While configuring an Internet Site document, Kira has left the option blank for which
Domino server hosts the site.
What is the default action the server will perform with this option not configured?

   A. The Internet Site will not be loaded on any Domino server.
   B. The Internet Site will be loaded on all Domino servers in the domain.
   C. The Internet Site will only accept connections for the first IP Address on the server
   D. The Internet Site will only accept connections for the hostname in the server
   document




                                         www.biztek.pl
21




Answer 6 (1)
• You can use Web Site documents to host Web sites on IBM® Lotus® Domino®. The
  Web Site document is one type of Internet Site.
• Web Site documents contain Web site configuration information and are
  managed through the ServersInternet Sites view along with other types of
  Internet site documents. However, for backward compatibility the Domino HTTP
  task still supports the R5 ServersWeb Configurations view.
• To enable the Internet Sites view, in the Basics section of the Server document,
  when converting from Web Server Configuration, click "Loads Internet
  configurations from ServerInternet Sites documents.




                                     www.biztek.pl
22




Answer 6 (2)
                      Hosting Web sites with Web Site documents
• Web sites are not explicitly associated with physical servers. A single Domino
  domain can support many Web sites. Each Web site can be associated with any
  number of host names or addresses. All servers in the same Domino domain can use
  the same Web Site documents in the Internet Sites view. You can specify which
  Domino servers support a Web site. Each Web site has its own security, file-protection,
  and URL rules, and you can modify them as needed.
• By default, Web Site documents are not associated with specific Domino servers.
  All servers that share the same Domino Directory -- that is, reside in the same Domino
  domain -- automatically use the same Web Site documents in the Internet Sites view.
  This means that you do not have to re-create the same Web configuration each time
  you add a new server to the domain. When you add or modify a Web Site document,
  the changes are picked up automatically by all servers in the domain.
• An optional field in the Web Site document allows you to specify the Domino
  servers that will host a site. Servers that are not listed in this field will not load
  the site configuration.




                                       www.biztek.pl
23




Answer 6 (3)
                                        To set up a Web Site
• To set up a Web site on a Domino server, you must complete these procedures.
   • Enable the Internet Sites view on your server.
   • Create an Internet Site document.
      • Configure default mapping rules for HTML, CGI, icon and Java files.
      • Configure DSAPI Filters, HTTP Methods, and WebDAV.
      • Configure Domino Web Engine settings for the Web site.
   • (Optional) Create a Web Site Rule document and specify rules (directory, substitution,
     redirection) for the Web site.
   • (Optional) Set up file protection.
   • (Optional) Create an authentication realm document for the Web site.




                                             www.biztek.pl
24




Question 7
Which ONE of the following is required when setting up transactional logging on a
server?

   A. Enable Transactional Logging in the server document.
   B. Add TRANS_LOG=1 to the server's NOTES.INI file.
   C. Create a Transactional Logging document in the Directory Catalog.
   D. Modify the NOTES.INI log settings to read LOG=LOG.NSF, TRANSLOG.NSF




                                       www.biztek.pl
25




Answer 7 (1)
• IBM® Lotus® Domino® supports                  • Use transaction logging to:
  transaction logging for servers that run         • Schedule regular backups.
  Domino 5 and later, and for databases             Backups based on transaction logs
  that are in a Domino 5 or later on-disk           are faster and easier than full
  structure.                                        database backups that do not use
• Transaction logging captures all the              transaction logging.
  changes made to a database and                  • Recover from a media failure. If
  writes them to a transaction log. The             you have a media failure, you can
  logged transactions are then written to           restore the most recent full backup
  disk in a batch, either when resources            from tape, then use the transaction
  are available or when scheduled.                  logs to add the data that was not
• A transaction is a related series of              written to disk.
  changes made to a database on a                 • Recover from a system crash.
  server. For example, opening a new                When the server restarts, it runs
  document, adding text, and saving the             through the end of the transaction
  document is one transaction. In this              logs and recovers any writes that
  case, the transaction consists of three           were not made to disk at the time
  separate implicit API calls: NotesOpen,           of the crash. Logged databases do
  NoteUpdate, and NoteClose.                        not require a consistency check.
                                                  • Log the database views. You can
                                                    avoid most view rebuilds.

                                      www.biztek.pl
26




Answer 7 (2)
• You can enable and set up transaction logging on any server.
  • Make sure that all the databases you want to log are in the Domino data directory,
    either at the root, or in a subdirectory.
  • From the IBM® Lotus® Domino® Administrator, click the Configuration tab, expand
    the Server section, and click "All Server Documents."
  • Select the Server Document for the Domino server you want to edit and then click
    Edit Server.
  • Click the Transactional Logging tab, complete these fields, and then save the
    document.




                                      www.biztek.pl
27




Answer 7 (3)




               www.biztek.pl
28




Answer 7 (4)
• When you enable transaction logging, Domino assigns a unique database
  instance ID (DBIID) to each Domino database. When Domino records a
  transaction in the log, it includes this DBIID. During recovery, Domino uses the
  DBIID to match transactions to databases.
• Some database maintenance activities, such as using the Compact command with
  options, cause Domino to reconstruct the database in such a way that old transaction
  log records are no longer valid. When this happens, a new DBIID is assigned to the
  database. From that point on, all new transactions recorded in the log for that database
  use the new DBIID. After a database is assigned a new DBIID, take a new full backup
  of the database. The new full backup captures the database in its current state with the
  new DBIID. Then, if you have to restore the database, Domino needs only the new
  transactions that contain the new DBIID.
• Domino assigns a new DBIID when:
    • You enable transaction logging for the first time.
    • You run the Compact task with an option -- for example, the option to reduce file
      size.
    • You run the Fixup task on corrupted databases.
    • You move a Domino database to a logged server.


                                        www.biztek.pl
29




Question 8
• When creating the ID Vault for your domain, which of the following cannot be the name
 of the vault?

  A. The name of the server the vault is created on
  B. The name of the administrator creating the vault
  C. The name of the group that will manage the id vault
  D. The same as an organizational unit used in the Domino domain

Answer: D




                                      www.biztek.pl
30




Answer 8 (1)




               www.biztek.pl
31




Answer 8 (2)
• Name of the ID vault.
   • The name defines the hierarchical identity of the vault and is also used to form the
     vault database file name and vault ID file name.
   • The name cannot be the same as an organization or organizational unit used
     in the Domino domain.
   • You cannot change the name after the vault is created.
• Vault ID file location and password
   • It is important to make a back up copy of the vault ID file. If the ID file is lost and
     there is no backup copy, the vault will need to be deleted and re-created.
   • Vault administrators require access to this ID file and password to add or remove
     vault replicas or to delete the ID vault.
• Vault primary server
   • You can specify only one server when you create a vault, which becomes the vault
     primary server.
   • To replicate the vault to other servers, and optionally to specify a different vault
     primary server, use the ID Vaults - Manage tool.
• Vault administrator
   • You must specify at least one vault administrator.

                                         www.biztek.pl
32




Question 9
• Given the following scenario, what will occur if the sender attempts to recall a message
  after 10 days have elapsed since it was originally sent to the recipient:
   - The sender and recipient are on the same mail server
   - The server is configured to allow message recall
   - The recipient is a member of a group policy that allows message recall
   - The sender is a member of a group policy that does not allow message recall
   - The sender has an explicit policy that allows message recall
   - Message recall is allowed for 14 days for the sender
   - Message recall is allowed for 8 days for the recipient


   A. The sender will be allowed to recall the sent message
   B. The sender will not be allowed to recall the sent message
   C. The sender will receive a non-delivery report back stating the message recall failed
   D. The sender will be prompted that they have exceeded the maximum time allowed
   for message recall

• Answer: A

                                        www.biztek.pl
33




Answer 9 (1)
The sender and recipient are on the same           OK
mail server
The server is configured to allow message          Reguirement
recall
The recipient is a member of a group policy that
allows message recall
The sender is a member of a group policy           Sender can not recall the
that does not allow message recall                 message, but …
The sender has an explicit policy that allows      Based on explicit polisy can
message recall                                     recall the message
Message recall is allowed for 14 days for the      Sender recalling after 10
sender                                             days
Message recall is allowed for 8 days for the
recipient

                                   www.biztek.pl
34




Answer 9 (2)
• What is the priority with respect to each other of the different types of policies?
   • Organizational
   • Explicit
   • Dynamic




                                         www.biztek.pl
35




Question 10
Chaz, the Domino administrator, has noticed performance issues when LDAP searches
are being performed against the Domino Directory. Which of the following is the best
offered solution to improve performance?

  A. Extend the LDAP schema to add new attributes
  B. Create a full text index of the Domino Directory
  C. Configure Directory Assistance to load all users into memory in advance
  D. Delete the ($LDAP) view in the Domino Directory and let it rebuild automatically

Answer: B




                                      www.biztek.pl
36




Answer 10 (1)
• Full-Text Indexing for LDAP Performance
  • LDAP servers receive many search requests, and you want to optimize these
      search requests to have the best performance.
  •   By default, full-text indexing of the Domino directory isn’t enabled. This means each
      search of the LDAP directory is a linear search.
  •   The more people in the directory, the longer the search can take. Enabling full-
      text indexing is especially important if nested groups are used within the
      Domino directory.
  •   Full-text indexing is enabled in the LDAP settings for the Domino server:
        • Set the field “Automatically Full-text Index Domino Directory?” to “Yes.”
        • After making this change, reload the LDAP schema to initiate the change by
          issuing the console command: tell ldap reloadschema.
  •   If a Domino server is being used to provide LDAP services, be sure to full-text
      index the Domino directory to avoid slow performance with linear searches.




                                        www.biztek.pl
37




Question 11
Each time Melissa creates a certifier ID, Domino creates a certifier ID file and which of
the following?

   A. Password database
   B. Certifier document
   C. Password hash file
   D. Certifier database

Answer: B




                                         www.biztek.pl
38




Answer 11 (1)
• The Certification Log template is a special template used to create a database that
  keeps a record of the certified users of a Notes system.
• If a system certifier chooses to create the log, each time he or she certifies a new user,
  certifier an appropriate record is added to the database.




                                         www.biztek.pl
39




Question 12
Tom set up a Domino domain and organization. Which one of the following describes the
difference between a Domino domain and a Domino organization?

  A. There is no difference. Domains and organizations function in the same manner.
  B. Domains refer to a company's hierarchical structure. Organizations refer to users
  who share a common organizational certifier.
  C. Domains are comprised of users and servers that share a common Domino
  Directory. Organizations define security and naming conventions.
  D. Domains define security and naming conventions. Organizations are comprised of
  users and servers that share a common Domino Directory.

Answer: C




                                      www.biztek.pl
40




Answer 12 (1)
• Domino domain is a collection of Domino
  servers and users that share a common
  Domino Directory. The primary function is mail
  routing. Users' domains are determined by the
  location of their server-based mail files.
• For a Domino server to communicate with a
  server in a different domain, you create a Domain
  document in the Domino Directory to define the
  name, location, and access to adjacent and non-
  adjacent Domino domains and non-Domino
  domains.
• Other domains are:
    • Foreign domain: A Domino domain and an
      external mail system such as SMP or cc:Mail.
      It specifies which outbound addresses are
      Internet addresses and where the Notes Mail
      Route sends those messages.
    • Global domain: A group of Domino domains,
      such as Sales1, Sales2, and Marketing, under
      a single Internet domain, such as acme.com.
      All outbound SMTP mail, whether it originates
      from the Sales1 or Marketing domains, has
      the return address acme.com.
• Domino directory A directory created
  automatically from the PUBNAMES.NTF template
  during first server setup that describes the users,
  servers, connections, and access control
  information for a Domino domain, or a directory
  created manually from PUBNAMES.NTF.

                                                 www.biztek.pl
41




Question 13
Directory assistance in Lotus Domino 8 enables you to specify when a secondary
directory must only be used for authentication. This provides which of the following
features?

   A. This blocks email from being forwarded to adjacent domains
   B. This avoids NAMELookups to reduce the number of mbiguous Name dialog
   boxes
   C. This help you validate your choice of host name for receiving authentication
   requests
   D. This scans group member lists to ensure that each member exists in an available
   directory that is configured in directory assistance

Answer: B




                                        www.biztek.pl
42




Answer 13 (1)
• To configure directory assistance, you create a         • Each server process that provides directory
  directory assistance database from the                    services and detects a local directory
  template DA50.NTF, and replicate it to the                assistance database configuration loads
  servers that will use it.                                 directory information configured in the
• A server must have a local replica of a                   directory assistance database into an internal
  directory assistance database to use directory            memory table.
  assistance. Then you add the database file              • During server startup and thereafter at five-
  name to the "Directory Assistance database                minute intervals each server process checks
  name" field in the IBM® Lotus® Domino™                    for changes to the directory assistance
  Directory Server documents of these servers.              database configuration and if found, each
• You create a Directory Assistance document in             process reloads its internal memory table to
  the directory assistance database to describe             reflect the changes.
  a particular directory and how it will be used,         • To look up names in a Domino Directory or
  and to define how to connect to the directory             an Extended Directory Catalog, a server
  and to find alternate replicas for failover.              uses NAMELookup calls.
• To set up directory assistance for a Domino             • To look up names in a remote LDAP
  Directory or an Extended Directory Catalog ,              directory, a server uses a gateway feature
  you select "Notes" in the "Domain type" field in          that translates NAMELookup calls to LDAP
  the Directory Assistance document. To set up              operations, and then translates LDAP
  directory assistance for a remote LDAP                    operations back to NAMELookup calls - a
  directory, you select "LDAP" in the "Domain               Domino server doesn't have to run the
  type" field. You use one Directory Assistance             LDAP service to use a remote LDAP
  document to configure all the services for a              directory for directory services.
  directory and its replicas.



                                              www.biztek.pl
43
44




Answer 13 (2)
• Authentication/authorization-only secondary directories
• The directory assistance feature of Lotus Domino is a way for your Lotus Notes applications
  to achieve Internet authentication, group authorization, and mail addressing using secondary
  directories, both Lotus Domino and Lightweight Directory Access Protocol (LDAP). Some
  clients use separate directories for authentication/authorization and for mail addressing.
• Directory assistance in Lotus Domino 8 enables you to specify when a secondary
  directory must only be used for authentication/authorization (Figure 3-34). This avoids
  unnecessary NAMELookups to authentication/authorization directories, potentially
  reducing the number of “Ambiguous Name” dialog boxes and making mail lookup
  tasks more efficient, as well as reducing the load on authentication/authorization
  directory servers.




                                         www.biztek.pl
45




Question 14
John registered a new server. In which one of the following was the Server document
placed?

  A. NAMES.NSF
  B. CERTLOG.NSF
  C. CATALOG.NSF
  D. DIRECTORY.NSF

Answer: A




                                      www.biztek.pl
46




Question 15
Edison, the Domino Administrator, wants to enforce file security on HTML and Image
files. Which one of the following should he do?

  A. Enforce ECLs
  B. Create File Protection documents
  C. Use Protect Directories in the HTTPD.CNF files
  D. Domino does not allow security enforcement on HTML and Image files

Answer: B




                                      www.biztek.pl
47




Answer 15 (1)
• You can use the following security features to control Internet/intranet access to files on
  the servers:
   • File protection documents (file protection document for a specific Web Site).
   • Web realms (Web Site authentication realm document).
• File protection documents control access to non-database files that users can
  access via Web browsers. Like database file (.NSF) access control lists (ACLs),
  which specify the names of the users who can access them and the level of access
  they have, you can enforce file protection for files that browser users can access - for
  example, HTML, JPEG, and GIF.
• Also by specifying the level of access for these types of files and the names of the
  users who can access them.
• To create file protection for a Web Site document
   • From the Domino Administrator, choose Configuration - Web - Internet Sites.
   • Open the Web Site document for which you want to create file protection.
   • Click Web Site and choose "Create File Protection.
   • Click Administration and complete the Owners and Administrators fields.
   • Save the document.



                                         www.biztek.pl
48




Answer 15 (2)




                www.biztek.pl
49




Answer 15 (3)
• Using a IBM® Lotus® Domino® Web Site authentication realm, you can specify the
  text string that appears when a user tries to access a certain directory, or file on a
  Domino Web server.
• When the browser prompts the user for a name and password, the browser's
  authentication dialog displays the text string. The browser uses the realm to determine
  which credentials -- that is, user name and password -- to send with the URL for
  subsequent requests. The Domino Web server caches the user's credentials to use for
  different realms, in order to avoid prompting the user repeatedly for the same
  credentials.
• The realm string also applies to requests mapped to paths that have the specified path
  as their root, provided that the child paths of the root do not already have a specified
  realm. For example, the realm string specified for D:NOTESDATA also applies to a
  request mapped to D:NOTESDATAFINANCE, if the latter does not have a realm
  specification.
• From the Domino Administrator, choose Configuration - Web - Internet Sites.
   • Choose the Web Site document for which you want to create an authentication
      realm, and click Edit Document.
   • Click "Web Site" and choose "Create Authentication Realm."
   • Click the Basics tab and complete the fields.
   • Save the document.


                                        www.biztek.pl
50




Question 16
In what order is blacklist and whitelist filtering processed on a received SMTP message?

   A. DNS blacklists, DNS whitelists, private blacklists, private whitelists
   B. DNS whitelists, DNS blacklists, private whitelists, private blacklists
   C. Private blacklists, DNS blacklists, private whitelists, DNS whitelists
   D. Private whitelists, private blacklists, DNS whitelists, DNS blacklists

Answer: D




                                       www.biztek.pl
51




Answer 16 (1)
• Private whitelists – to specify the hosts and/or domains to exclude from blacklist
  processing. Hosts that are specified in private whitelists are exempt from blacklist checks.
  Whitelisted hosts bypass blacklist filter checks but there are other controls which may
  prevent the message from being accepted. Members of the private whitelist are still
  subjected to connection, relay, sender, and recipient controls. Being whitelisted does not
  guarantee that the message will be delivered to the recipient. Whitelists can be used
  independently of blacklists.
• When private whitelists are enabled, the SMTP listener task compares hosts that may be
  subject to relay enforcement against the defined private whitelist. If there is a match, the
  private blacklist, DNS whitelists, and DNS blacklists are skipped. Otherwise,
  processing continues beginning with the private blacklist.
• Private blacklists - Use private blacklists to specify hosts and/or domains responsible for
  sending unnecessary, unwanted mail to your Internet domain. For consistency, IBM ® Lotus®
  Domino's™ private blacklists follow the model currently used by existing anit-spam
  functionality. Private blacklists are stored in the Domino Directory to simplify the process of
  maintaining and distributing blacklist information between servers.
• When private blacklists are enabled, the SMTP listener task compares the names of hosts
  that may be subject to relay enforcement against the private blacklist prior to performing DNS
  blacklist queries. This prevents unnecessary DNS lookups. If the host is found in the private
  blacklist, the action specified in the field "Desired action when a connecting host is found in a
  private blacklist" in the Private Blacklist Filters section of the Configuration Settings
  document applies. If the host is not found in the private blacklists, processing continues with
  DNS whitelist filters and then DNS blacklist filters.

                                           www.biztek.pl
52




Answer 16 (2)
• DNS whitelists – when are enabled, the SMTP listener task determines whether a
  connecting host is a member of a DNS whitelist by relying on the results of a DNS
  query of a DNS blacklist-style host name. If the query returns an IP address, the host is
  added to the whitelist and the remaining DNS whitelists are not searched. If the host is
  not found in the DNS whitelist , processing continues with DNS blacklist filters. If the
  query returns an error indicating that the host name is not valid, the host is not added
  to the whitelist and may be subject to blacklist filtering if that is enabled.
• Note DNS whitelists can be used independently of blacklists but private
  blacklists override DNS whitelists.
• DNS blacklists - you can specify the site or sites the SMTP task uses to determine if a
  connecting host is a "known" open relay or spam source. Specify sites that support IP-
  based DNS blacklist queries.




                                        www.biztek.pl
53




Answer 16 (3)
• Whitelists allow messages from specified domains to be
  received.
• IBM supports both private blacklist and whitelist filters.
  With these configuration settings, it is important to
  understand how you can reduce spam and to know the
  order that Domino will check when blacklist and whitelist
  filters are enabled.
• If you enable private whitelist filters, when Domino
  receives an SMTP connection, it compares the IP
  address/host name against this list. The field "Whitelist
  the following hosts" should be used to enter the IP
  addresses or host names of systems that you want to
  whitelist. You can also use an asterisk (*) as a wild card.
  Members of the private whitelist are still subjected to
  connection, relay, sender, and recipient controls. Being
  whitelisted does not guarantee that the message will be
  delivered to the recipient.




                                         www.biztek.pl
54




Question 17
The server out-of-office service is configured in which of the following locations?

   A. Server document
   B. Server configuration document
   C. Mail.box on the Domino 8 mail server
   D. In each user's mailfile the service is to be enabled

Answer: B




                                         www.biztek.pl
55




Answer 17 (1)
• Out of Office service type Agent                           • From the Domino Administrator, click the
   • The Out of Office agent processing occurs                   Configuration tab.
      after the server mail rules and user mail              •   Click Server - Configurations.
      rules are applied but after the "before mail           •   Select the Server Configuration document you
      delivery" agent processing completes. By                   want to modify, and then click Edit Document.
      default, the agent executes four times                 •   Click Router/SMTP - Advanced - Control.
      each day on a schedule. The user can
      preprocess mail using rules or using the               •   In the Miscellaneous section, locate the field, Out
      "before delivery mail agent" in order to                   of Office service type.
      control spam.                                          •   Choose one of these:
    • The Out of Office agent becomes active when                 • Service -- Choose the Out of Office service
      the user enables it. The agent must be                          for users whose mail files reside in an all-
      manually disabled when the Out of Office time                   Domino 8 mail cluster supporting the IBM®
      period expires. The Out of Office agent                         Lotus® Notes® 8 mail template (MAIL8.NTF).
      supports delegation of Out of Office                            The Out of Office service supports Out of
      functionality but it is not integrated with                     Office time periods of less than one day, but
      Calendar management. The delegate must                          greater than one hour. The Out of Office
      have a minimum of Editor access in the ACL                      service is automatically disabled when the Out
      and rights to sign agents that run on behalf of                 of Office time period expires.
      others in the Server document. The minimum                  • Agent -- Choose the Out of Office agent for
      setting for Out of office agent is one day.                     users whose mail files reside on a cluster that
    • Use the server command Tell router O to                         has at least one pre-Domino 8 server. The
      display a list of all databases that have an                    minimum setting for Out of office agent is one
      active out of office service.                                   day. The agent must be manually disabled
•                                                                     when the Out of Office time period expires.
                                                             •   Click Save and Close.



                                                 www.biztek.pl
56




Answer 17 (2)




                www.biztek.pl
57




Question 18
The default port for SSL over SMTP is which one of the following?

   A. 389
   B. 465
   C. 636
   D. 995

Answer: B




                                       www.biztek.pl
58




Answer 18 (1)
• For networks, a port means an endpoint to a logical connection. The port number
 identifies what type of port it is. Here are the default email ports for:
  • POP3 - port 110
  • IMAP - port 143
  • SMTP - port 25
  • HTTP - port 80
  • Secure SMTP (SSMTP) - port 465
  • Secure IMAP (IMAP4-SSL) - port 585
  • IMAP4 over SSL (IMAPS) - port 993
  • Secure POP3 (SSL-POP) - port 995




                                         www.biztek.pl
59




Question 19
Which protocol must be enabled on the Domino server to support RSS feeds for mail
files?

  A. RSS
  B. HTTP
  C. IMAP
  D. LDAP

Answer: B




                                     www.biztek.pl
60




Answer 19 (1)
• You can enable RSS feeds for IBM®
    Lotus® Domino® Web Access mail.
    When feeds are enabled, a feeds icon
    displays in the Inbox.
•   Then, feed readers that are built into
    browsers or that have browser
    extensions, automatically detect that a
    feed link is present from a user's
    Domino Web Access Inbox.
•   If enabled, users can subscribe to the
    feed so that the feed reader application
    detects new mail.
•   Since Domino Web Access mail files are
    generally not accessible by anonymous
    users, the feed reader application must
    support storing authentication
    information to the mail server to retrieve
    the latest feed.
•   You should be aware that HTTP traffic
    to your IBM® Lotus® Domino® mail
    server may increase if many users
    subscribe to these feeds within
    external feed readers.
                                        www.biztek.pl
61




Question 20
Which task reads the mail.box for new or changed messages that require processing?

  A. SMTP
  B. Amgr
  C. Adminp
  D. Router

Answer: D




                                     www.biztek.pl
62




Question 21
Without manually restarting the SMTP server task, how often will it automatically check
for changes to Configuration Settings documents?

   A. Never
   B. Two minutes
   C. Hourly
   D. Daily at midnight

Answer: B




                                       www.biztek.pl
63




Answer 21 (1)
• The SMTP service controls the SMTP listener on the Lotus Domino server.
• By default, whenever you restart the SMTP service, and at two-minute intervals, the
  SMTP service automatically checks the NOTES.INI file, Configuration Settings
  document, and Server document to see if any settings have changed.
• If the service detects that settings have changed, it rebuilds its internal configuration to
  incorporate the changes.
• To update the SMTP service configuration
    • Modify settings in the NOTES.INI file, Configuration Settings document, or Server
      document.
    • At the server console, enter:
                                    Tell smtp update config
• If the server's logging level is set to Informational or Verbose, the server console
  displays messages to indicate when the update begins and completes.




                                          www.biztek.pl
64




Question 22
Pedro, a Domino administrator, has enabled the Inbox maintenance feature from a mail
policy document. How is the Inbox maintenance feature trigged and where does it run?

  A. The Inbox maintenance agent is enabled by default to run at 2 AM on all mail
  servers in the domain.
  B. The Administration Process periodically runs the Inbox Maintenance agent
  on each user's home server.
  C. Every time a user opens their mail file the Inbox maintenance agent runs locally on
  the user's workstation.
  D. The Inbox maintenance agent runs on a user's home server and is manually
  triggered by selecting Tools - Inbox maintenance from within their mail file.

Answer: B




                                      www.biztek.pl
65




Answer 22 (1)
• Inbox maintenance feature improves server performance by reducing the size of
  users' Inboxes in mail files.
• When you enable the Inbox maintenance feature, the Administration Process
  periodically runs the Inbox Maintenance agent on the IBM® Lotus® Notes® client
  users' home server, that is, the server that stores the mail files containing the users'
  Inboxes.
• The Inbox Maintenance agent resides in the mail template, MAIL8.NTF. The agent
  removes documents from the Inbox based on settings you define in the Server
  document or the mail policy settings document.
• The settings that are specified in the Server document override the Inbox Maintenance
  settings in the mail policy settings document.




                                        www.biztek.pl
66




Answer 22 (2)
• Enable Inbox maintenance in the Server document by specifying a value in the field
  "Start executing Inbox Maintenance agent on," in the Server Tasks - Administration
  Process tab. In that field, specify one or more days of the week on which to run the
  Inbox Maintenance agent.
• In the field "Start executing Inbox Maintenance at," specify the time to begin running
  the agent. If a day is not specified in the field "Start executing Inbox Maintenance agent
  on," the feature is not enabled and the agent does not run regardless of whether the
  "Start executing Inbox Maintenance at" field contains a time at which to run the agent.
  If Inbox maintenance is enabled but the field "Start executing Inbox Maintenance at" is
  blank, the Inbox Maintenance agent runs at the default time of 1:00 AM. This feature is
  disabled by default.




                                        www.biztek.pl
67




Answer 22 (3)
• You also use the settings in the Server document to specify whether to maintain
  inboxes for selected users on the home server, or to maintain inboxes based on policy
  settings.
• If the Server document setting "Maintain inboxes based on policies" is chosen, inboxes
  are maintained according to the settings specified in the mail policy settings document,
  unless the Inbox Maintenance settings are not specified in the mail policy settings
  document.
• If the settings are not defined in the mail policy setting document, Inbox maintenance is
  not performed. The Server document also contains the settings that control which
  documents are removed from a user's Inbox by the agent and when they are removed.
  The settings are "Remove documents older than [X] days from Inbox" and "Do not
  remove unread documents from Inbox."




                                        www.biztek.pl
68




Question 23
iNotes requires which of the following server tasks to be running?

   A. IMAP
   B. SMTP
   C. DOLS
   D. HTTP

Answer: D




                                        www.biztek.pl
69




Question 24
The ACME corporation is receiving a large amount of mail that is addressed to users that
are not listed in the Domino Directory. The administrator wants to configure the server to
check that recipients are listed in the directory and to refuse any mail addressed to a
group name. In which of the following areas is this configured?

   A. Inbound Sender Controls
   B. Inbound Relay Enforcement
   C. Inbound Connection Controls
   D. Inbound Intended Recipient Controls

Answer: D




                                        www.biztek.pl
70




www.biztek.pl
71




Answer 24 (1)
• Inbound intended recipients controls
• This section allows you to restrict the name of recipients for inbound SMTP
  messages. A very useful feature is the "Verify that local domain recipient exist in
  the Domino Directory" field. This specifies whether or not the SMTP listener
  checks recipient names specified in RCPT TO commands against entries in the
  Domino Directory. If enabled, the domain part of an address specified in an SMTP
  RCPT TO command matches one of the configured local Internet domains; the
  SMTP listener checks all configured directories to determine whether or not the
  specified recipient is a valid user. If all lookups complete successfully and no
  matching user name is found, the SMTP server returns a 550 permanent failure
  response indicating that the user is unknown:
   • 550 bad_user@yourdomain.com ... No such user
• Choosing this setting can help prevent messages sent to nonexistent users (for
  example, spam messages and messages intended for users who have left the
  organization) from accumulating in Mail.box as dead mail. To avoid messages from
  being rejected as a result of directory unavailability, Domino accepts messages when
  an attempted directory lookup does not complete successfully. Please refer to Figure 6
  for more information.


                                         www.biztek.pl
72




Question 25
Trisha wants to set up Activity Trends for her Domino environment. Where should Trisha
go to configure Activity Trends?

  A. Server document
  B. Program document
  C. Connection document
  D. Configuration document

Answer: D




                                      www.biztek.pl
73




Answer 25 (1)
• Activity Trends is part of the Domino Administrator. Activity Trends collects and stores
  activity statistics as current observations and historical trends. The activity statistics relate
  to the server, databases, users, and connections of users to databases.
• You can explore the collected data to see how database workload is distributed across
  servers.
• Using the data, Activity Trends recommends a resource-balancing plan. Then, working
  with the Domino Change Manager, which is a part of the Domino server, Activity Trends
  provides a workflow that facilitates implementing the recommended changes.




                                          www.biztek.pl
74




Answer 25 (2)




                www.biztek.pl
75




Question 26
Carla is attempting to utilize Directory Assistance to prevent group lookups from the
primary Domino Directory for database authorization. However, she cannot get this to
function correctly. Which if the following is the cause?

   A. Group lookups are not possible from the primary Domino Directory
   B. You can never exclude the primary Domino Directory from this type of
   functionality
   C. The primary Domino Directory must be moved to last in the search order for
   Directory Assistance
   D. She must create an exclusion rule in the Directory Assistance database that
   includes the primary Domino Directory

Answer: B




                                       www.biztek.pl
76




Answer 26 (1)
• When a Web client authenticates with a server, by default, the server checks the
  primary IBM® Lotus® Domino® Directory to see if the client certificate exists in
  the Person document. If your organization uses a secondary Domino Directory
  and/or an LDAP directory to verify client certificates, you can set up Domino to
  check those additional directories. To do so, you set up the secondary Domino
  and LDAP directories as trusted domains in the Directory Assistance database.
• When you mark the domain as trusted, Domino searches the primary Domino Directory
  for the user and then searches the trusted secondary Domino and LDAP directories.
  When you set up directory assistance, you specify the order in which Domino searches
  the secondary directories.
• The hierarchical name returned by the Domino Directory or LDAP directory is checked
  against the trusted rule in the Directory Assistance database to verify that the
  organization and organizational units match the specified rule. For example, if the user
  name returned is Dave Lawson/Acme, the Directory Assistance document must include
  the rule */Acme.




                                        www.biztek.pl
77




Question 27
What tool can an administrator use to see how database workload is distributed across
servers and recommend a resource-balancing plan?

  A. Trend Analysis
  B. Activity Trends
  C. Activity Logging
  D. Transaction Logging

Answer: B




                                      www.biztek.pl
78




Answer 27 (1)
• IBM® Lotus® Domino® server resource utilization can be separated into two types,
 system activity and user activity.
  • Activity Logging servers account for their time precisely, recording user activity by
    person, database, and access protocol. When summarized and averaged, or
    trended over time, activity logging of trended statistics provides a way to measure
    and compare workloads across servers. You can use this information to identify
    the most active users and databases on each server. Using the Domino Change
    Manager, you can automate the creation and execution of workload redistribution
    plans to load a new server, decommission an old one, or balance workloads across
    unevenly burdened servers.
  • Activity Trends is part of the Domino Administrator. Activity Trends collects and
    stores activity statistics as current observations and historical trends. The activity
    statistics relate to the server, databases, users, and connections of users to
    databases. You can explore the collected data to see how database workload is
    distributed across servers. Using the data, Activity Trends recommends a resource-
    balancing plan. Then, working with the Domino Change Manager, which is a part of
    the Domino server, Activity Trends provides a workflow that facilitates implementing
    the recommended changes.



                                       www.biztek.pl
79




Question 28
The Domino startup has aborted due to the system time being too far in advance as
compared to the Domino server time. Which of the following next steps would be the best
choice to get the Domino server to start immediately?

  A. Edit the notes.ini to remove the line LAST_OS_UPDATE_TIME
  B. Delete the notes.ini file from the server and restart the server
  C. Edit the notes.ini and type a colon or a semicolon in front of the parameter
  LAST_DOMINO_TIME_ABORT
  D. Rename the notes.ini to <timestamp>notes.ini and restart the server where
  <timestamp> is the correct operating system time

Answer: C




                                      www.biztek.pl
80




Answer 28 (1)
• http://www.lntoolbox.com/en/notesini-reference.html
• Use IBM® Lotus ® Domino's™ NOTES.INI settings to prevent the system clock on the
  Domino server from being reset to an incorrect time.
• The system clock time can be changed to an incorrect time, often to a future time, due to
  system or human error. These incorrect changes to a future time are called forward time
  changes. When a forward time change occurs on the system clock, all date and time stamps
  for all documents and databases also change.
• There are two time settings impacted by forward time changes to the system clock settings:
    • Operating system (OS) time
    • Internal IBM Lotus Domino time
• Forward time changes to the system clock can occur while the Domino server is running or
  while the server is shut down. Use the following NOTES.INI settings to help prevent forward
  time changes.
    • Last_Domino_Time= Last recorded internal Domino time
    • Restart_Time_Interval= Value in seconds. The maximum time difference allowed
      between the OS time and the Last_Domino_Time. The default value is 3600 seconds.
    • Restart_Time_Action= Value of 1 indicates that restarting the Domino server is canceled
      and a message indicating this is written to the file NOTES.INI. If Restart_Time_Action= is
      set any value other than 1, the OS time is used.
    • Reset_Time_Interval= Value in seconds of the maximum time change allowed.



                                          www.biztek.pl
81




Question 29
Your enterprise users receive large lists of ambiguous names when performing name
look-ups for addressing mail messages. Which of the following will remove the
ambiguous names?

  A. Remove the alternate directories from the cluster directory
  B. Disable specific directories from mail lookups in admin4.nsf
  C. Enable specific directories to be utilized for credentials only in Directory
  Assistance
  D. Specify that the primary Domino Directory is the only mail addressing source within
  the server configuration document

Answer: C




                                      www.biztek.pl
82




Answer 29 (1)
                         Limiting directories to authentication-only lookups
• You may need to deploy a directory for authentication purposes only if:
    • You have both an IBM® Lotus® Domino® and an LDAP directory that contain some
       identical names.
    • You do not use the LDAP directory's names for mailing.
    • Your mail clients are experiencing "Ambiguous name" dialog boxes when sending
       mail.
• It is becoming common practice to use a corporate LDAP server to provide
  authentication (userid/password) services for single sign-on (SSO) purposes. Often,
  these LDAP servers are not configured, deployed, or intended to support mail routing
  (or other Domino-based) directory lookups.
• Because Domino does not support a universal name mapping scheme for Domino-style
  identities (fullnames or distinguished names of the form cn=xxxx, ou=yyyy, o=zzzz) and the
  less (or differently) constrained distinguished name formats that are implemented by various
  LDAP directories, deploying an LDAP directory to be used for authorization can cause name
  ambiguity problems with some Domino services if duplicate entries exist in the native Domino
  directories and the LDAP directory being deployed. Since duplicate entries are usually the
  case if the LDAP directory is being deployed to allow SSO, or to provide LDAP-based
  authentication for Internet services, it is necessary to avoid sending certain lookups to the
  LDAP directories. Otherwise, sending email can result in an a large number of unnecessary
  lookups to the LDAP directory, thereby decreasing performance.


                                          www.biztek.pl
83




Answer 29 (2)
• You indicate that a directory should be used only for authentication on the Basics tab of
  the Directory Assistance document as follows:
    • set Group Authorization to Yes or enable one of the Naming Contexts (Rules) as
      'Trusted for Credentials". This reveals a new setting - "Use exclusively for Group
      Authorization or Credential Authentication."
    • The default setting for "Use exclusive for Group Authorization or Credential
      Authentication" is "No." Change it to "Yes" to limit searches on this directory strictly
      for authentication.
• If neither setting is enabled, the directory will be searched.




                                          www.biztek.pl
84




Question 30
Domino uses which type of document to determine how to connect to another server for
replication and mail routing?

  A. Server
  B. Domain
  C. Program
  D. Connection

Answer: D




                                      www.biztek.pl
85




Answer 30 (1)
• Servers must connect to each other to exchange data, for example to replicate
  databases and exchange mail. You can create connections between servers
  across a local area network (LAN) or wide area network (WAN); using a dialup
  modem or remote access service; using a passthru server, which is a server that
  acts as an intermediary server between a client and its destination; or over the
  Internet.
• Connections between servers -- that is, your connection topology -- should
  enable servers to exchange information reliably and efficiently, maximizing the
  capacity of the physical network, while minimizing connection-related costs.




                                    www.biztek.pl
Komponenty przesyłu poczty (6). Różne sieci DNN.



                                   A                   B
                                       CONNECTION


        SERVER 1                                                    SERVER 2



                                                                                     Recipient'
                          Router                           Router
                                                                                         s
                           Mail                             Mail
                                                                                     Mail Box
                           Box                              Box




 W przypadku różnych sieci DNN wiadomość wysłana będzie wg. ustawień w dokumencie Connection!


                                               86

More Related Content

What's hot

How to Create a Perfect Profile: A Hitchiker's Guide to A Smarter Workforce
How to Create a Perfect Profile: A Hitchiker's Guide to A Smarter WorkforceHow to Create a Perfect Profile: A Hitchiker's Guide to A Smarter Workforce
How to Create a Perfect Profile: A Hitchiker's Guide to A Smarter Workforce
Mitch Cohen
 
HCL Domino Volt Installation, Configuration & New Features
HCL Domino Volt Installation, Configuration & New FeaturesHCL Domino Volt Installation, Configuration & New Features
HCL Domino Volt Installation, Configuration & New Features
hemantnaik
 
IBM Mail Support for Microsoft Outlook
IBM Mail Support for Microsoft OutlookIBM Mail Support for Microsoft Outlook
IBM Mail Support for Microsoft Outlook
jayeshpar2006
 
Self Healing Capabilities of Domino 10
Self Healing Capabilities of Domino 10Self Healing Capabilities of Domino 10
Self Healing Capabilities of Domino 10
Kim Greene Consulting, Inc.
 
Open Mic on Managed Mail Replica
Open Mic on Managed Mail ReplicaOpen Mic on Managed Mail Replica
Open Mic on Managed Mail Replica
jayeshpar2006
 
IBM Lotus Notes & Domino: The Road Ahead (2008)
IBM Lotus Notes & Domino: The Road Ahead (2008)IBM Lotus Notes & Domino: The Road Ahead (2008)
IBM Lotus Notes & Domino: The Road Ahead (2008)
Davalen LLC
 
DNP-What's New in IBM Lotus Domino Administration
DNP-What's New in IBM Lotus Domino AdministrationDNP-What's New in IBM Lotus Domino Administration
DNP-What's New in IBM Lotus Domino Administration
Ray Bilyk
 
Installing community surveys in connections 5.5
Installing community surveys in connections 5.5Installing community surveys in connections 5.5
Installing community surveys in connections 5.5
Roberto Boccadoro
 
Ibm lotus domino integration using ibm tivoli directory integrator redp4629
Ibm lotus domino integration using ibm tivoli directory integrator redp4629Ibm lotus domino integration using ibm tivoli directory integrator redp4629
Ibm lotus domino integration using ibm tivoli directory integrator redp4629Banking at Ho Chi Minh city
 
Update to IBM Connections 5 CR1 step by-step guide
Update to IBM Connections 5 CR1 step by-step guideUpdate to IBM Connections 5 CR1 step by-step guide
Update to IBM Connections 5 CR1 step by-step guide
Roberto Boccadoro
 
Unc318 microsoft communications server “14” lync 2010 what's new in conferenc...
Unc318 microsoft communications server “14” lync 2010 what's new in conferenc...Unc318 microsoft communications server “14” lync 2010 what's new in conferenc...
Unc318 microsoft communications server “14” lync 2010 what's new in conferenc...
Daniel Ullmark
 
Planning for other features lync server 2010 (rc)
Planning for other features lync server 2010 (rc)Planning for other features lync server 2010 (rc)
Planning for other features lync server 2010 (rc)
Daniel Ullmark
 
Planning for your organization lync server 2010 (rc)
Planning for your organization lync server 2010 (rc)Planning for your organization lync server 2010 (rc)
Planning for your organization lync server 2010 (rc)
Daniel Ullmark
 
Features of SmartCloud Notes in Hosted and Hybrid Environments
Features of SmartCloud Notes in Hosted and Hybrid EnvironmentsFeatures of SmartCloud Notes in Hosted and Hybrid Environments
Features of SmartCloud Notes in Hosted and Hybrid Environments
Ranjit Rai
 
Ibm connections 5.0 installation step-by-step (windows and tds)
Ibm connections 5.0   installation step-by-step (windows and tds)Ibm connections 5.0   installation step-by-step (windows and tds)
Ibm connections 5.0 installation step-by-step (windows and tds)
Fuangwith Sopharath
 
Planning for im and conferencing lync server 2010 (rc)
Planning for im and conferencing lync server 2010 (rc)Planning for im and conferencing lync server 2010 (rc)
Planning for im and conferencing lync server 2010 (rc)
Daniel Ullmark
 
bccon-2014 adm04 ibm-domino-64bit-all-you-need-to-know
bccon-2014 adm04 ibm-domino-64bit-all-you-need-to-knowbccon-2014 adm04 ibm-domino-64bit-all-you-need-to-know
bccon-2014 adm04 ibm-domino-64bit-all-you-need-to-know
ICS User Group
 
IBM Connect Switzerland - Der entspannte Administrator
IBM Connect Switzerland - Der entspannte AdministratorIBM Connect Switzerland - Der entspannte Administrator
IBM Connect Switzerland - Der entspannte Administrator
Klaus Bild
 
Composite applications tutorial
Composite applications tutorialComposite applications tutorial
Composite applications tutorialdominion
 
Populating your domino directory or any domino database with tivoli directory...
Populating your domino directory or any domino database with tivoli directory...Populating your domino directory or any domino database with tivoli directory...
Populating your domino directory or any domino database with tivoli directory...dominion
 

What's hot (20)

How to Create a Perfect Profile: A Hitchiker's Guide to A Smarter Workforce
How to Create a Perfect Profile: A Hitchiker's Guide to A Smarter WorkforceHow to Create a Perfect Profile: A Hitchiker's Guide to A Smarter Workforce
How to Create a Perfect Profile: A Hitchiker's Guide to A Smarter Workforce
 
HCL Domino Volt Installation, Configuration & New Features
HCL Domino Volt Installation, Configuration & New FeaturesHCL Domino Volt Installation, Configuration & New Features
HCL Domino Volt Installation, Configuration & New Features
 
IBM Mail Support for Microsoft Outlook
IBM Mail Support for Microsoft OutlookIBM Mail Support for Microsoft Outlook
IBM Mail Support for Microsoft Outlook
 
Self Healing Capabilities of Domino 10
Self Healing Capabilities of Domino 10Self Healing Capabilities of Domino 10
Self Healing Capabilities of Domino 10
 
Open Mic on Managed Mail Replica
Open Mic on Managed Mail ReplicaOpen Mic on Managed Mail Replica
Open Mic on Managed Mail Replica
 
IBM Lotus Notes & Domino: The Road Ahead (2008)
IBM Lotus Notes & Domino: The Road Ahead (2008)IBM Lotus Notes & Domino: The Road Ahead (2008)
IBM Lotus Notes & Domino: The Road Ahead (2008)
 
DNP-What's New in IBM Lotus Domino Administration
DNP-What's New in IBM Lotus Domino AdministrationDNP-What's New in IBM Lotus Domino Administration
DNP-What's New in IBM Lotus Domino Administration
 
Installing community surveys in connections 5.5
Installing community surveys in connections 5.5Installing community surveys in connections 5.5
Installing community surveys in connections 5.5
 
Ibm lotus domino integration using ibm tivoli directory integrator redp4629
Ibm lotus domino integration using ibm tivoli directory integrator redp4629Ibm lotus domino integration using ibm tivoli directory integrator redp4629
Ibm lotus domino integration using ibm tivoli directory integrator redp4629
 
Update to IBM Connections 5 CR1 step by-step guide
Update to IBM Connections 5 CR1 step by-step guideUpdate to IBM Connections 5 CR1 step by-step guide
Update to IBM Connections 5 CR1 step by-step guide
 
Unc318 microsoft communications server “14” lync 2010 what's new in conferenc...
Unc318 microsoft communications server “14” lync 2010 what's new in conferenc...Unc318 microsoft communications server “14” lync 2010 what's new in conferenc...
Unc318 microsoft communications server “14” lync 2010 what's new in conferenc...
 
Planning for other features lync server 2010 (rc)
Planning for other features lync server 2010 (rc)Planning for other features lync server 2010 (rc)
Planning for other features lync server 2010 (rc)
 
Planning for your organization lync server 2010 (rc)
Planning for your organization lync server 2010 (rc)Planning for your organization lync server 2010 (rc)
Planning for your organization lync server 2010 (rc)
 
Features of SmartCloud Notes in Hosted and Hybrid Environments
Features of SmartCloud Notes in Hosted and Hybrid EnvironmentsFeatures of SmartCloud Notes in Hosted and Hybrid Environments
Features of SmartCloud Notes in Hosted and Hybrid Environments
 
Ibm connections 5.0 installation step-by-step (windows and tds)
Ibm connections 5.0   installation step-by-step (windows and tds)Ibm connections 5.0   installation step-by-step (windows and tds)
Ibm connections 5.0 installation step-by-step (windows and tds)
 
Planning for im and conferencing lync server 2010 (rc)
Planning for im and conferencing lync server 2010 (rc)Planning for im and conferencing lync server 2010 (rc)
Planning for im and conferencing lync server 2010 (rc)
 
bccon-2014 adm04 ibm-domino-64bit-all-you-need-to-know
bccon-2014 adm04 ibm-domino-64bit-all-you-need-to-knowbccon-2014 adm04 ibm-domino-64bit-all-you-need-to-know
bccon-2014 adm04 ibm-domino-64bit-all-you-need-to-know
 
IBM Connect Switzerland - Der entspannte Administrator
IBM Connect Switzerland - Der entspannte AdministratorIBM Connect Switzerland - Der entspannte Administrator
IBM Connect Switzerland - Der entspannte Administrator
 
Composite applications tutorial
Composite applications tutorialComposite applications tutorial
Composite applications tutorial
 
Populating your domino directory or any domino database with tivoli directory...
Populating your domino directory or any domino database with tivoli directory...Populating your domino directory or any domino database with tivoli directory...
Populating your domino directory or any domino database with tivoli directory...
 

Viewers also liked

System e akceptacje (www.teamsoft.pl)
System e akceptacje (www.teamsoft.pl)System e akceptacje (www.teamsoft.pl)
System e akceptacje (www.teamsoft.pl)
Marek Zawadzki
 
D8750 (D8L75): Administration Operating Fundamentals
D8750 (D8L75): Administration Operating FundamentalsD8750 (D8L75): Administration Operating Fundamentals
D8750 (D8L75): Administration Operating Fundamentals
Marek Zawadzki
 
D8L75_D8750 Lotus Domino 8.5 System Administration Fundamentals
D8L75_D8750 Lotus Domino 8.5 System Administration FundamentalsD8L75_D8750 Lotus Domino 8.5 System Administration Fundamentals
D8L75_D8750 Lotus Domino 8.5 System Administration FundamentalsMarek Zawadzki
 
Lotus 190-980 Domino 8.5 System Administration Fundamentals
Lotus 190-980 Domino 8.5 System Administration FundamentalsLotus 190-980 Domino 8.5 System Administration Fundamentals
Lotus 190-980 Domino 8.5 System Administration Fundamentals
Marek Zawadzki
 
What is WebDAV - uploaded by Murali Krishna Nookella
What is WebDAV - uploaded by Murali Krishna NookellaWhat is WebDAV - uploaded by Murali Krishna Nookella
What is WebDAV - uploaded by Murali Krishna Nookella
muralikrishnanookella
 
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...
NerdGirlJess
 
IBM Sametime 9 Complete - Basic Features Installation - From Zero To Hero - F...
IBM Sametime 9 Complete - Basic Features Installation - From Zero To Hero - F...IBM Sametime 9 Complete - Basic Features Installation - From Zero To Hero - F...
IBM Sametime 9 Complete - Basic Features Installation - From Zero To Hero - F...
Frank Altenburg
 
Event Management 111110ieu
Event Management 111110ieuEvent Management 111110ieu
Event Management 111110ieu
Hakan Turkkusu
 
Naruto 245
Naruto 245Naruto 245
Naruto 245
Miánime Ánime
 
บทที่7 ใหม่1
บทที่7 ใหม่1บทที่7 ใหม่1
บทที่7 ใหม่1Phuntita
 
Ipard programı 4.mod 09.08.2012
Ipard programı 4.mod 09.08.2012Ipard programı 4.mod 09.08.2012
Ipard programı 4.mod 09.08.2012adex25
 
Sourajit Aiyer - Financial Express, Bangladesh - Deepening capital markets in...
Sourajit Aiyer - Financial Express, Bangladesh - Deepening capital markets in...Sourajit Aiyer - Financial Express, Bangladesh - Deepening capital markets in...
Sourajit Aiyer - Financial Express, Bangladesh - Deepening capital markets in...
South Asia Fast Track
 
Sap bodi bods online training course
Sap bodi bods online training courseSap bodi bods online training course
Sap bodi bods online training course
Newyorksys.com
 
RA Youtube channel
RA Youtube channelRA Youtube channel
RA Youtube channelRaadAfyouni
 
Crowfunding - Principles & Technics
Crowfunding - Principles & Technics Crowfunding - Principles & Technics
Crowfunding - Principles & Technics
ecobuild.brussels
 
Got nuffin but love media
Got nuffin but love mediaGot nuffin but love media
Got nuffin but love mediaGabby Vicentè
 
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu 218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu exodumuser
 

Viewers also liked (20)

System e akceptacje (www.teamsoft.pl)
System e akceptacje (www.teamsoft.pl)System e akceptacje (www.teamsoft.pl)
System e akceptacje (www.teamsoft.pl)
 
D8750 (D8L75): Administration Operating Fundamentals
D8750 (D8L75): Administration Operating FundamentalsD8750 (D8L75): Administration Operating Fundamentals
D8750 (D8L75): Administration Operating Fundamentals
 
D8L75_D8750 Lotus Domino 8.5 System Administration Fundamentals
D8L75_D8750 Lotus Domino 8.5 System Administration FundamentalsD8L75_D8750 Lotus Domino 8.5 System Administration Fundamentals
D8L75_D8750 Lotus Domino 8.5 System Administration Fundamentals
 
Lotus 190-980 Domino 8.5 System Administration Fundamentals
Lotus 190-980 Domino 8.5 System Administration FundamentalsLotus 190-980 Domino 8.5 System Administration Fundamentals
Lotus 190-980 Domino 8.5 System Administration Fundamentals
 
What is WebDAV - uploaded by Murali Krishna Nookella
What is WebDAV - uploaded by Murali Krishna NookellaWhat is WebDAV - uploaded by Murali Krishna Nookella
What is WebDAV - uploaded by Murali Krishna Nookella
 
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...
BP108 Admin for the Developer -- Build and Secure Your Own IBM Lotus Domino S...
 
IBM Sametime 9 Complete - Basic Features Installation - From Zero To Hero - F...
IBM Sametime 9 Complete - Basic Features Installation - From Zero To Hero - F...IBM Sametime 9 Complete - Basic Features Installation - From Zero To Hero - F...
IBM Sametime 9 Complete - Basic Features Installation - From Zero To Hero - F...
 
Event Management 111110ieu
Event Management 111110ieuEvent Management 111110ieu
Event Management 111110ieu
 
Naruto 245
Naruto 245Naruto 245
Naruto 245
 
บทที่7 ใหม่1
บทที่7 ใหม่1บทที่7 ใหม่1
บทที่7 ใหม่1
 
5η συνάντηση
5η συνάντηση5η συνάντηση
5η συνάντηση
 
Ipard programı 4.mod 09.08.2012
Ipard programı 4.mod 09.08.2012Ipard programı 4.mod 09.08.2012
Ipard programı 4.mod 09.08.2012
 
Sourajit Aiyer - Financial Express, Bangladesh - Deepening capital markets in...
Sourajit Aiyer - Financial Express, Bangladesh - Deepening capital markets in...Sourajit Aiyer - Financial Express, Bangladesh - Deepening capital markets in...
Sourajit Aiyer - Financial Express, Bangladesh - Deepening capital markets in...
 
Sap bodi bods online training course
Sap bodi bods online training courseSap bodi bods online training course
Sap bodi bods online training course
 
RA Youtube channel
RA Youtube channelRA Youtube channel
RA Youtube channel
 
Crowfunding - Principles & Technics
Crowfunding - Principles & Technics Crowfunding - Principles & Technics
Crowfunding - Principles & Technics
 
Got nuffin but love media
Got nuffin but love mediaGot nuffin but love media
Got nuffin but love media
 
La prairie
La prairieLa prairie
La prairie
 
Unit sukan permainan
Unit sukan permainanUnit sukan permainan
Unit sukan permainan
 
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu 218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu
218653019 dreptul-familiei-dan-lupascu-cristiana-mihaela-craciunescu
 

Similar to LOT-925 Installing and Configuring IBM Lotus Notes and Domino 8.5

6421 b Module-11
6421 b Module-116421 b Module-11
6421 b Module-11
Bibekananada Jena
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10
gameaxt
 
The Dev-Admin Chimera: Customising Connections (with Gab Davis)
The Dev-Admin Chimera: Customising Connections (with Gab Davis)The Dev-Admin Chimera: Customising Connections (with Gab Davis)
The Dev-Admin Chimera: Customising Connections (with Gab Davis)
Mark Myers
 
09 - Active Directory.ppt
09 - Active Directory.ppt09 - Active Directory.ppt
09 - Active Directory.ppt
ssuserf7cd2b
 
60 Admin Tips
60 Admin Tips60 Admin Tips
60 Admin Tips
Gabriella Davis
 
MCSA 70-412 Chapter 05
MCSA 70-412 Chapter 05MCSA 70-412 Chapter 05
MCSA 70-412 Chapter 05
Computer Networking
 
April, 2021 OpenNTF Webinar - Domino Administration Best Practices
April, 2021 OpenNTF Webinar - Domino Administration Best PracticesApril, 2021 OpenNTF Webinar - Domino Administration Best Practices
April, 2021 OpenNTF Webinar - Domino Administration Best Practices
Howard Greenberg
 
Got Problems? Let's Do a Health Check
Got Problems? Let's Do a Health CheckGot Problems? Let's Do a Health Check
Got Problems? Let's Do a Health CheckLuis Guirigay
 
Uklug 2011 client management
Uklug 2011 client managementUklug 2011 client management
Uklug 2011 client managementdominion
 
Implementing Domain Name
Implementing Domain NameImplementing Domain Name
Implementing Domain Name
Napoleon NV
 
Microsoft Offical Course 20410C_07
Microsoft Offical Course 20410C_07Microsoft Offical Course 20410C_07
Microsoft Offical Course 20410C_07
gameaxt
 
The lazy administrator, how to make your life easier by using tdi to automate...
The lazy administrator, how to make your life easier by using tdi to automate...The lazy administrator, how to make your life easier by using tdi to automate...
The lazy administrator, how to make your life easier by using tdi to automate...
Klaus Bild
 
The lazy administrator, how to make your life easier by using tdi to automate...
The lazy administrator, how to make your life easier by using tdi to automate...The lazy administrator, how to make your life easier by using tdi to automate...
The lazy administrator, how to make your life easier by using tdi to automate...
Wannes Rams
 
Domino testing presentation
Domino testing presentationDomino testing presentation
Domino testing presentation
Ari Elias-Bachrach
 
Active Directory Fundamentals
Active Directory FundamentalsActive Directory Fundamentals
Active Directory Fundamentals
Angie Miller
 
Directory Services Nma Unit-1
Directory Services Nma Unit-1Directory Services Nma Unit-1
Directory Services Nma Unit-1
GPAPassedStudents
 

Similar to LOT-925 Installing and Configuring IBM Lotus Notes and Domino 8.5 (20)

10135 b 02
10135 b 0210135 b 02
10135 b 02
 
6421 b Module-11
6421 b Module-116421 b Module-11
6421 b Module-11
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10
 
The Dev-Admin Chimera: Customising Connections (with Gab Davis)
The Dev-Admin Chimera: Customising Connections (with Gab Davis)The Dev-Admin Chimera: Customising Connections (with Gab Davis)
The Dev-Admin Chimera: Customising Connections (with Gab Davis)
 
09 - Active Directory.ppt
09 - Active Directory.ppt09 - Active Directory.ppt
09 - Active Directory.ppt
 
60 Admin Tips
60 Admin Tips60 Admin Tips
60 Admin Tips
 
MCSA 70-412 Chapter 05
MCSA 70-412 Chapter 05MCSA 70-412 Chapter 05
MCSA 70-412 Chapter 05
 
April, 2021 OpenNTF Webinar - Domino Administration Best Practices
April, 2021 OpenNTF Webinar - Domino Administration Best PracticesApril, 2021 OpenNTF Webinar - Domino Administration Best Practices
April, 2021 OpenNTF Webinar - Domino Administration Best Practices
 
Got Problems? Let's Do a Health Check
Got Problems? Let's Do a Health CheckGot Problems? Let's Do a Health Check
Got Problems? Let's Do a Health Check
 
Uklug 2011 client management
Uklug 2011 client managementUklug 2011 client management
Uklug 2011 client management
 
Implementing Domain Name
Implementing Domain NameImplementing Domain Name
Implementing Domain Name
 
Microsoft Offical Course 20410C_07
Microsoft Offical Course 20410C_07Microsoft Offical Course 20410C_07
Microsoft Offical Course 20410C_07
 
The lazy administrator, how to make your life easier by using tdi to automate...
The lazy administrator, how to make your life easier by using tdi to automate...The lazy administrator, how to make your life easier by using tdi to automate...
The lazy administrator, how to make your life easier by using tdi to automate...
 
The lazy administrator, how to make your life easier by using tdi to automate...
The lazy administrator, how to make your life easier by using tdi to automate...The lazy administrator, how to make your life easier by using tdi to automate...
The lazy administrator, how to make your life easier by using tdi to automate...
 
Domino testing presentation
Domino testing presentationDomino testing presentation
Domino testing presentation
 
Active Directory Fundamentals
Active Directory FundamentalsActive Directory Fundamentals
Active Directory Fundamentals
 
Resume
ResumeResume
Resume
 
10135 b 08
10135 b 0810135 b 08
10135 b 08
 
Active directoryfinal
Active directoryfinalActive directoryfinal
Active directoryfinal
 
Directory Services Nma Unit-1
Directory Services Nma Unit-1Directory Services Nma Unit-1
Directory Services Nma Unit-1
 

More from Marek Zawadzki

Archcraft Linux introduction. Lets see how it does look?
Archcraft Linux introduction. Lets see how it does look?Archcraft Linux introduction. Lets see how it does look?
Archcraft Linux introduction. Lets see how it does look?
Marek Zawadzki
 
CrystalOS Linux introduction. Lets see how it looks.
CrystalOS Linux introduction. Lets see how it looks.CrystalOS Linux introduction. Lets see how it looks.
CrystalOS Linux introduction. Lets see how it looks.
Marek Zawadzki
 
CachyOS Linux System introduction. Lets see how it looks?
CachyOS Linux System introduction. Lets see how it looks?CachyOS Linux System introduction. Lets see how it looks?
CachyOS Linux System introduction. Lets see how it looks?
Marek Zawadzki
 
Bluestar Linux introduction. Lets see how it looks?
Bluestar Linux introduction. Lets see how it looks?Bluestar Linux introduction. Lets see how it looks?
Bluestar Linux introduction. Lets see how it looks?
Marek Zawadzki
 
Bodhi Linux introduction. Lets see how it looks?
Bodhi Linux introduction. Lets see how it looks?Bodhi Linux introduction. Lets see how it looks?
Bodhi Linux introduction. Lets see how it looks?
Marek Zawadzki
 
Arco Linux Introduction. Lets see how it looks?
Arco Linux Introduction. Lets see how it looks?Arco Linux Introduction. Lets see how it looks?
Arco Linux Introduction. Lets see how it looks?
Marek Zawadzki
 
Alma Linux Introduction. Lets see how it looks?
Alma Linux Introduction. Lets see how it looks?Alma Linux Introduction. Lets see how it looks?
Alma Linux Introduction. Lets see how it looks?
Marek Zawadzki
 
Projekt unijny eakceptacje (mobilny obieg dokumentów)
Projekt unijny eakceptacje (mobilny obieg dokumentów)Projekt unijny eakceptacje (mobilny obieg dokumentów)
Projekt unijny eakceptacje (mobilny obieg dokumentów)
Marek Zawadzki
 
Projekt unijny eSerwisowanie (prezentacja projektu)
Projekt unijny eSerwisowanie (prezentacja projektu)Projekt unijny eSerwisowanie (prezentacja projektu)
Projekt unijny eSerwisowanie (prezentacja projektu)
Marek Zawadzki
 
ST_735 Administering IBM Lotus Sametime 8
ST_735 Administering IBM Lotus Sametime 8ST_735 Administering IBM Lotus Sametime 8
ST_735 Administering IBM Lotus Sametime 8
Marek Zawadzki
 
D8510 application development fundamentals demo
D8510 application development fundamentals demoD8510 application development fundamentals demo
D8510 application development fundamentals demo
Marek Zawadzki
 

More from Marek Zawadzki (11)

Archcraft Linux introduction. Lets see how it does look?
Archcraft Linux introduction. Lets see how it does look?Archcraft Linux introduction. Lets see how it does look?
Archcraft Linux introduction. Lets see how it does look?
 
CrystalOS Linux introduction. Lets see how it looks.
CrystalOS Linux introduction. Lets see how it looks.CrystalOS Linux introduction. Lets see how it looks.
CrystalOS Linux introduction. Lets see how it looks.
 
CachyOS Linux System introduction. Lets see how it looks?
CachyOS Linux System introduction. Lets see how it looks?CachyOS Linux System introduction. Lets see how it looks?
CachyOS Linux System introduction. Lets see how it looks?
 
Bluestar Linux introduction. Lets see how it looks?
Bluestar Linux introduction. Lets see how it looks?Bluestar Linux introduction. Lets see how it looks?
Bluestar Linux introduction. Lets see how it looks?
 
Bodhi Linux introduction. Lets see how it looks?
Bodhi Linux introduction. Lets see how it looks?Bodhi Linux introduction. Lets see how it looks?
Bodhi Linux introduction. Lets see how it looks?
 
Arco Linux Introduction. Lets see how it looks?
Arco Linux Introduction. Lets see how it looks?Arco Linux Introduction. Lets see how it looks?
Arco Linux Introduction. Lets see how it looks?
 
Alma Linux Introduction. Lets see how it looks?
Alma Linux Introduction. Lets see how it looks?Alma Linux Introduction. Lets see how it looks?
Alma Linux Introduction. Lets see how it looks?
 
Projekt unijny eakceptacje (mobilny obieg dokumentów)
Projekt unijny eakceptacje (mobilny obieg dokumentów)Projekt unijny eakceptacje (mobilny obieg dokumentów)
Projekt unijny eakceptacje (mobilny obieg dokumentów)
 
Projekt unijny eSerwisowanie (prezentacja projektu)
Projekt unijny eSerwisowanie (prezentacja projektu)Projekt unijny eSerwisowanie (prezentacja projektu)
Projekt unijny eSerwisowanie (prezentacja projektu)
 
ST_735 Administering IBM Lotus Sametime 8
ST_735 Administering IBM Lotus Sametime 8ST_735 Administering IBM Lotus Sametime 8
ST_735 Administering IBM Lotus Sametime 8
 
D8510 application development fundamentals demo
D8510 application development fundamentals demoD8510 application development fundamentals demo
D8510 application development fundamentals demo
 

Recently uploaded

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 

Recently uploaded (20)

CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 

LOT-925 Installing and Configuring IBM Lotus Notes and Domino 8.5

  • 1. 1 LOT-925 Installing and Configuring IBM Lotus Notes and Domino 8.5 www.biztek.pl
  • 2. 2 IBM Certified System Administrator – Lotus Notes and Domino 8.5 • In June 2011, the IBM Certification • Individuals who wish to certify on Program for Lotus Software Lotus Notes Domino 8.5, but have announced the restructuring of the not achieved certification on Lotus Lotus Notes Domino 8.5 core Notes Domino 7.0 or 8.0 should certification paths. follow the applicable path(s) below: • In October 2011, the new core tests were released. The old exams • Pass LOT-925: Installing and remained available for those who Configuring IBM Lotus Notes and had begun the certification process Domino 8.5 AND through to the end of the year. • Pass LOT-926: Managing and • Having been withdrawn on Maintaining IBM Lotus Notes and December 31st, they are no longer Domino 8.5 Environments. available. www.biztek.pl
  • 3. 3 Test information • Number of questions: 56 • Defining and Managing Policies • Time allowed in minutes: 75 • Install and Configure • Required passing score: 74% • Mail • Test languages: English • Manage and Maintain • Note: There are 56 scored items • Managing Servers and 2 unscored items. • Platform Support • Security • Exam Type: Multiple Choice. www.biztek.pl
  • 4. 4 Important links • Aby przygotować się do egzaminu: • Niezbędne jest pewne doświadczenie w administracji. • Niezbędna jest umiejętność korzystania z dokumentacji systemu oraz innych dostępnych w sieci zasobów. • Zaleca się udział we wszystkich kursach administracyjnych. • http://publib.boulder.ibm.com/infocenter/domhelp/v8r0/index.jsp • http://www-03.ibm.com/certify/certs/14003305.shtml • http://www-10.lotus.com/ldd/dominowiki.nsf www.biztek.pl
  • 5. 5 Question 1 • Which of the following are optional advanced services that must be enabled manually when first configuring and installing the Domino server? A. SMTP server B. Agent Manager C. Calendar Connector D. DOLS (Domino Off-Line Services) Answer: A www.biztek.pl
  • 6. 6 Answer 1 (1) www.biztek.pl
  • 7. 7 Question 2 • In order to create a Domino cluster, which rights are required for you to have to the Domino Directory? A. Editor access rights and ClusterModifier role B. Reader access rights and ServerWriter and ServerManager roles C. Designer access rights and ClusterCreator and ClusterModifier roles D. Author access and Delete Documents rights and the ServerModifier and ServerCreator roles Answer: D www.biztek.pl
  • 8. 8 Answer 2 (1) • A Lotus Domino cluster is a group of two to six Lotus Domino servers that provides users with constant access to data, balances the workload between servers, improves server performance, and maintains performance when the size of your enterprise increases. • The servers in a cluster contain replicas of databases that you want to be readily available to users at all times. • If a user tries to access a database on a cluster server that is unavailable, Domino opens a replica of that database on a different cluster server, if a replica is available. • Domino continuously synchronizes databases so that whichever replica a user opens, the information is always identical. To create a cluster, you must have at least Author access, Delete Documents rights, and the ServerModifier and ServerCreator roles in the Lotus Domino Directory, and at least Author access to the Administration Requests database. www.biztek.pl
  • 9. 9 Question 3 Jose set up Web authentication using primary and secondary directories. Which one of the following describes the order in which he set up directories to be searched? A. Domino primary directory, then Domino secondary directories. This is the only option available. B. Domino primary directory, then either Domino or LDAP secondary directories. The administrator can specify the order of secondary searches. C. LDAP primary directory, then LDAP secondary directory, and then Domino secondary directories. This is the order in which secondary searches must be made. D. Domino primary directory, then Domino secondary directory, and then LDAP secondary directories. This is the order in which secondary searches must be made. www.biztek.pl
  • 10. 10 Answer 3 (1) • When a Web client authenticates with a server, by default, the server checks the primary IBM® Lotus® Domino® Directory to see if the client certificate exists in the Person document. If your organization uses a secondary Domino Directory and/or an LDAP directory to verify client certificates, you can set up Domino to check those additional directories. To do so, you set up the secondary Domino and LDAP directories as trusted domains in the Directory Assistance database. • When you mark the domain as trusted, Domino searches the primary Domino Directory for the user and then searches the trusted secondary Domino and LDAP directories. When you set up directory assistance, you specify the order in which Domino searches the secondary directories. • The hierarchical name returned by the Domino Directory or LDAP directory is checked against the trusted rule in the Directory Assistance database to verify that the organization and organizational units match the specified rule. For example, if the user name returned is Dave Lawson/Acme, the Directory Assistance document must include the rule */Acme. www.biztek.pl
  • 11. 11 Answer 3 (2) • The Directory Assistance database is used to configure the Directory Assistance feature. • If your organization includes multiple domains, you can set up directory assistance to enable users to browse and select names from Public Directories outside of their domain, for example when they address mail, define database access control lists (ACL), or complete a NAMES field in documents. • When users send mail to recipients in another domain, directory assistance also allows Notes to resolve the names before sending the memo. • To set up directory assistance, you create the Directory Assistance database from the DA50.NTF template. In the Directory Assistance database you define naming rules that associate naming hierarchies with each domain--this allows Notes to search only Public Directories of domains associated with those naming hierarchies when resolving the name of a recipient from another domain. • You also use the Directory Assistance database to point to one or more strategically- located replicas of each domain's Public Directory. You then create a replica of the Directory Assistance database on all servers in each domain. www.biztek.pl
  • 12. 12 Answer 3 (3) • To set up directory assistance for a remote LDAP directory, create a Directory Assistance document for the directory in a directory assistance database as follows. Make sure you have read about directory assistance services and concepts. • Make sure you have created and replicated a directory assistance database and have set up servers to use it. • If you are using the remote LDAP directory for any purpose other than LDAP service referrals, use the TCP/IP ping utility to test that the IBM® Lotus® Domino(tm) servers that will use the LDAP directory can connect to the remote LDAP directory server. • From the Domino Administrator, choose File - Open Server, select a server that you have set up to use the directory assistance database, and click OK. • Click the Configuration tab. • In the left pane, expand Directory - Directory Assistance. If you see "Server Error: File does not exist," the server you selected in step 4 is not set up to use the directory assistance database. • Click Add Directory Assistance. www.biztek.pl
  • 13. 13 Answer 3 (4) • Example of directory assistance for one secondary Domino Directory • Company X uses two domains, Domain A and Domain B. Each domain creates its own directory assistance database that has a Directory Assistance document for the other domain's Domino Directory, so that users from each domain can address mail easily to users in the other domain, and so servers in each domain can search groups in the other domain's directory when authorizing database access. If servers in both domains instead used replicas of one directory assistance database that included documents for both directories, they could enable only one of the domain directories for group authorization. • Network connections between domains are slow, so the company creates replicas of the Domain B directory on two Domain A servers for servers in Domain A to use, and creates replicas of the Domain A directory on two Domain B servers for servers in Domain B to use. • The following images shows the settings for the Domain B Directory Assistance document in the directory assistance database that servers in Domain A use. Domain B uses a similar document for the Domain A directory in its directory assistance database. www.biztek.pl
  • 14. 14 Answer 3 (5) www.biztek.pl
  • 15. 15 Question 4 A Notes mail message is sent by Miguel to an Internet address through an adjacent Domino domain over NRPC that then sends mail to the Internet over SMTP. Miguel is now attempting to recall the mail message. Which of the following will be the result of his attempt? A. He will receive an email that he cannot recall the email message. B. He will immediately receive a prompt that the message is not enabled for message recall. C. He will receive a message from the Internet recipients mail server that the message cannot be recalled. D. He will successfully recall the message if it is allowed in the server configuration and enabled in his user policy. www.biztek.pl
  • 16. 16 Answer 4 (1) www.biztek.pl
  • 17. 17 Answer 4 (2) • The requirements for Message Recall are: • Message Recall works only on mail that is • A Lotus Domino V8 or later server containing routed over NRPC. This means that neither the mail to be recalled. mail routed to the Internet nor internal mail • A mail file based on a Lotus Notes V8 or later routed over SMTP can be successfully mail template with which to recall the recalled. message. • If a Mail Policy exists that limits the use of this • A copy of the mail message in the sender’s feature for a user, this policy applies and can limit mail file. (This is usually found in the Sent the feature’s functionality. If there is no policy, or if view, but the Message Recall button is also the policy allows a user to change the recall found in the All Documents view.) setting, each user can choose to disable the feature in his or her Mail Preferences. • Permission given at the server to perform • Only mail that resides on a Lotus Domino V8 or Message Recall (and optionally at the policy later server can be successfully recalled. The and the recipient’s mail-file level, where the Lotus Domino V8 router does the work, so a recall feature can be turned off). request sent to a Lotus Domino V7 server does • Message Recall not only works with these not succeed, and the recalling user receives a minimal requirements but also works even if the report stating that the server does not support recalling user is on a server that is not Lotus Message Recall. Domino V8. • All that is required is a Lotus Notes V8 mail template containing the button to recall the message and that the message being called resides on a Domino V8 server. • Moreover, interim servers between the recaller and the recipient can be any version because the request at that point is simply an email message. www.biztek.pl
  • 18. 18 Question 5 In order for Peggy to establish alternate message recall settings on a per server basis, which of the following is the best solution? A. Configure the message recall settings in an organization level policy. B. Configure the message recall settings in each server's notes.ini file. C. Configure the message recall settings in each server configuration document. D. Configure the message recall settings in explicit policies and manually apply to users. www.biztek.pl
  • 19. 19 Answer 5 (1) • Lotus Notes and Domino V8 ship with Message Recall enabled. Whether you build a new system from scratch or upgrade servers and users, this feature is ready to use. • The Server Configuration document is used to configure Message Recall. This central location lets you easily allow or disallow it for all servers. Mail Policy documents can further refine the settings, as can individual user preferences. • If you do not have any Server Configuration documents, Message Recall is still turned on by default, and the default settings, listed here, apply: • Message Recall: Enabled. • Allow recall of messages with unread status: Unread Only. • Do not allow recall of messages older than: 14 days. www.biztek.pl
  • 20. 20 Question 6 While configuring an Internet Site document, Kira has left the option blank for which Domino server hosts the site. What is the default action the server will perform with this option not configured? A. The Internet Site will not be loaded on any Domino server. B. The Internet Site will be loaded on all Domino servers in the domain. C. The Internet Site will only accept connections for the first IP Address on the server D. The Internet Site will only accept connections for the hostname in the server document www.biztek.pl
  • 21. 21 Answer 6 (1) • You can use Web Site documents to host Web sites on IBM® Lotus® Domino®. The Web Site document is one type of Internet Site. • Web Site documents contain Web site configuration information and are managed through the ServersInternet Sites view along with other types of Internet site documents. However, for backward compatibility the Domino HTTP task still supports the R5 ServersWeb Configurations view. • To enable the Internet Sites view, in the Basics section of the Server document, when converting from Web Server Configuration, click "Loads Internet configurations from ServerInternet Sites documents. www.biztek.pl
  • 22. 22 Answer 6 (2) Hosting Web sites with Web Site documents • Web sites are not explicitly associated with physical servers. A single Domino domain can support many Web sites. Each Web site can be associated with any number of host names or addresses. All servers in the same Domino domain can use the same Web Site documents in the Internet Sites view. You can specify which Domino servers support a Web site. Each Web site has its own security, file-protection, and URL rules, and you can modify them as needed. • By default, Web Site documents are not associated with specific Domino servers. All servers that share the same Domino Directory -- that is, reside in the same Domino domain -- automatically use the same Web Site documents in the Internet Sites view. This means that you do not have to re-create the same Web configuration each time you add a new server to the domain. When you add or modify a Web Site document, the changes are picked up automatically by all servers in the domain. • An optional field in the Web Site document allows you to specify the Domino servers that will host a site. Servers that are not listed in this field will not load the site configuration. www.biztek.pl
  • 23. 23 Answer 6 (3) To set up a Web Site • To set up a Web site on a Domino server, you must complete these procedures. • Enable the Internet Sites view on your server. • Create an Internet Site document. • Configure default mapping rules for HTML, CGI, icon and Java files. • Configure DSAPI Filters, HTTP Methods, and WebDAV. • Configure Domino Web Engine settings for the Web site. • (Optional) Create a Web Site Rule document and specify rules (directory, substitution, redirection) for the Web site. • (Optional) Set up file protection. • (Optional) Create an authentication realm document for the Web site. www.biztek.pl
  • 24. 24 Question 7 Which ONE of the following is required when setting up transactional logging on a server? A. Enable Transactional Logging in the server document. B. Add TRANS_LOG=1 to the server's NOTES.INI file. C. Create a Transactional Logging document in the Directory Catalog. D. Modify the NOTES.INI log settings to read LOG=LOG.NSF, TRANSLOG.NSF www.biztek.pl
  • 25. 25 Answer 7 (1) • IBM® Lotus® Domino® supports • Use transaction logging to: transaction logging for servers that run • Schedule regular backups. Domino 5 and later, and for databases Backups based on transaction logs that are in a Domino 5 or later on-disk are faster and easier than full structure. database backups that do not use • Transaction logging captures all the transaction logging. changes made to a database and • Recover from a media failure. If writes them to a transaction log. The you have a media failure, you can logged transactions are then written to restore the most recent full backup disk in a batch, either when resources from tape, then use the transaction are available or when scheduled. logs to add the data that was not • A transaction is a related series of written to disk. changes made to a database on a • Recover from a system crash. server. For example, opening a new When the server restarts, it runs document, adding text, and saving the through the end of the transaction document is one transaction. In this logs and recovers any writes that case, the transaction consists of three were not made to disk at the time separate implicit API calls: NotesOpen, of the crash. Logged databases do NoteUpdate, and NoteClose. not require a consistency check. • Log the database views. You can avoid most view rebuilds. www.biztek.pl
  • 26. 26 Answer 7 (2) • You can enable and set up transaction logging on any server. • Make sure that all the databases you want to log are in the Domino data directory, either at the root, or in a subdirectory. • From the IBM® Lotus® Domino® Administrator, click the Configuration tab, expand the Server section, and click "All Server Documents." • Select the Server Document for the Domino server you want to edit and then click Edit Server. • Click the Transactional Logging tab, complete these fields, and then save the document. www.biztek.pl
  • 27. 27 Answer 7 (3) www.biztek.pl
  • 28. 28 Answer 7 (4) • When you enable transaction logging, Domino assigns a unique database instance ID (DBIID) to each Domino database. When Domino records a transaction in the log, it includes this DBIID. During recovery, Domino uses the DBIID to match transactions to databases. • Some database maintenance activities, such as using the Compact command with options, cause Domino to reconstruct the database in such a way that old transaction log records are no longer valid. When this happens, a new DBIID is assigned to the database. From that point on, all new transactions recorded in the log for that database use the new DBIID. After a database is assigned a new DBIID, take a new full backup of the database. The new full backup captures the database in its current state with the new DBIID. Then, if you have to restore the database, Domino needs only the new transactions that contain the new DBIID. • Domino assigns a new DBIID when: • You enable transaction logging for the first time. • You run the Compact task with an option -- for example, the option to reduce file size. • You run the Fixup task on corrupted databases. • You move a Domino database to a logged server. www.biztek.pl
  • 29. 29 Question 8 • When creating the ID Vault for your domain, which of the following cannot be the name of the vault? A. The name of the server the vault is created on B. The name of the administrator creating the vault C. The name of the group that will manage the id vault D. The same as an organizational unit used in the Domino domain Answer: D www.biztek.pl
  • 30. 30 Answer 8 (1) www.biztek.pl
  • 31. 31 Answer 8 (2) • Name of the ID vault. • The name defines the hierarchical identity of the vault and is also used to form the vault database file name and vault ID file name. • The name cannot be the same as an organization or organizational unit used in the Domino domain. • You cannot change the name after the vault is created. • Vault ID file location and password • It is important to make a back up copy of the vault ID file. If the ID file is lost and there is no backup copy, the vault will need to be deleted and re-created. • Vault administrators require access to this ID file and password to add or remove vault replicas or to delete the ID vault. • Vault primary server • You can specify only one server when you create a vault, which becomes the vault primary server. • To replicate the vault to other servers, and optionally to specify a different vault primary server, use the ID Vaults - Manage tool. • Vault administrator • You must specify at least one vault administrator. www.biztek.pl
  • 32. 32 Question 9 • Given the following scenario, what will occur if the sender attempts to recall a message after 10 days have elapsed since it was originally sent to the recipient: - The sender and recipient are on the same mail server - The server is configured to allow message recall - The recipient is a member of a group policy that allows message recall - The sender is a member of a group policy that does not allow message recall - The sender has an explicit policy that allows message recall - Message recall is allowed for 14 days for the sender - Message recall is allowed for 8 days for the recipient A. The sender will be allowed to recall the sent message B. The sender will not be allowed to recall the sent message C. The sender will receive a non-delivery report back stating the message recall failed D. The sender will be prompted that they have exceeded the maximum time allowed for message recall • Answer: A www.biztek.pl
  • 33. 33 Answer 9 (1) The sender and recipient are on the same OK mail server The server is configured to allow message Reguirement recall The recipient is a member of a group policy that allows message recall The sender is a member of a group policy Sender can not recall the that does not allow message recall message, but … The sender has an explicit policy that allows Based on explicit polisy can message recall recall the message Message recall is allowed for 14 days for the Sender recalling after 10 sender days Message recall is allowed for 8 days for the recipient www.biztek.pl
  • 34. 34 Answer 9 (2) • What is the priority with respect to each other of the different types of policies? • Organizational • Explicit • Dynamic www.biztek.pl
  • 35. 35 Question 10 Chaz, the Domino administrator, has noticed performance issues when LDAP searches are being performed against the Domino Directory. Which of the following is the best offered solution to improve performance? A. Extend the LDAP schema to add new attributes B. Create a full text index of the Domino Directory C. Configure Directory Assistance to load all users into memory in advance D. Delete the ($LDAP) view in the Domino Directory and let it rebuild automatically Answer: B www.biztek.pl
  • 36. 36 Answer 10 (1) • Full-Text Indexing for LDAP Performance • LDAP servers receive many search requests, and you want to optimize these search requests to have the best performance. • By default, full-text indexing of the Domino directory isn’t enabled. This means each search of the LDAP directory is a linear search. • The more people in the directory, the longer the search can take. Enabling full- text indexing is especially important if nested groups are used within the Domino directory. • Full-text indexing is enabled in the LDAP settings for the Domino server: • Set the field “Automatically Full-text Index Domino Directory?” to “Yes.” • After making this change, reload the LDAP schema to initiate the change by issuing the console command: tell ldap reloadschema. • If a Domino server is being used to provide LDAP services, be sure to full-text index the Domino directory to avoid slow performance with linear searches. www.biztek.pl
  • 37. 37 Question 11 Each time Melissa creates a certifier ID, Domino creates a certifier ID file and which of the following? A. Password database B. Certifier document C. Password hash file D. Certifier database Answer: B www.biztek.pl
  • 38. 38 Answer 11 (1) • The Certification Log template is a special template used to create a database that keeps a record of the certified users of a Notes system. • If a system certifier chooses to create the log, each time he or she certifies a new user, certifier an appropriate record is added to the database. www.biztek.pl
  • 39. 39 Question 12 Tom set up a Domino domain and organization. Which one of the following describes the difference between a Domino domain and a Domino organization? A. There is no difference. Domains and organizations function in the same manner. B. Domains refer to a company's hierarchical structure. Organizations refer to users who share a common organizational certifier. C. Domains are comprised of users and servers that share a common Domino Directory. Organizations define security and naming conventions. D. Domains define security and naming conventions. Organizations are comprised of users and servers that share a common Domino Directory. Answer: C www.biztek.pl
  • 40. 40 Answer 12 (1) • Domino domain is a collection of Domino servers and users that share a common Domino Directory. The primary function is mail routing. Users' domains are determined by the location of their server-based mail files. • For a Domino server to communicate with a server in a different domain, you create a Domain document in the Domino Directory to define the name, location, and access to adjacent and non- adjacent Domino domains and non-Domino domains. • Other domains are: • Foreign domain: A Domino domain and an external mail system such as SMP or cc:Mail. It specifies which outbound addresses are Internet addresses and where the Notes Mail Route sends those messages. • Global domain: A group of Domino domains, such as Sales1, Sales2, and Marketing, under a single Internet domain, such as acme.com. All outbound SMTP mail, whether it originates from the Sales1 or Marketing domains, has the return address acme.com. • Domino directory A directory created automatically from the PUBNAMES.NTF template during first server setup that describes the users, servers, connections, and access control information for a Domino domain, or a directory created manually from PUBNAMES.NTF. www.biztek.pl
  • 41. 41 Question 13 Directory assistance in Lotus Domino 8 enables you to specify when a secondary directory must only be used for authentication. This provides which of the following features? A. This blocks email from being forwarded to adjacent domains B. This avoids NAMELookups to reduce the number of mbiguous Name dialog boxes C. This help you validate your choice of host name for receiving authentication requests D. This scans group member lists to ensure that each member exists in an available directory that is configured in directory assistance Answer: B www.biztek.pl
  • 42. 42 Answer 13 (1) • To configure directory assistance, you create a • Each server process that provides directory directory assistance database from the services and detects a local directory template DA50.NTF, and replicate it to the assistance database configuration loads servers that will use it. directory information configured in the • A server must have a local replica of a directory assistance database into an internal directory assistance database to use directory memory table. assistance. Then you add the database file • During server startup and thereafter at five- name to the "Directory Assistance database minute intervals each server process checks name" field in the IBM® Lotus® Domino™ for changes to the directory assistance Directory Server documents of these servers. database configuration and if found, each • You create a Directory Assistance document in process reloads its internal memory table to the directory assistance database to describe reflect the changes. a particular directory and how it will be used, • To look up names in a Domino Directory or and to define how to connect to the directory an Extended Directory Catalog, a server and to find alternate replicas for failover. uses NAMELookup calls. • To set up directory assistance for a Domino • To look up names in a remote LDAP Directory or an Extended Directory Catalog , directory, a server uses a gateway feature you select "Notes" in the "Domain type" field in that translates NAMELookup calls to LDAP the Directory Assistance document. To set up operations, and then translates LDAP directory assistance for a remote LDAP operations back to NAMELookup calls - a directory, you select "LDAP" in the "Domain Domino server doesn't have to run the type" field. You use one Directory Assistance LDAP service to use a remote LDAP document to configure all the services for a directory for directory services. directory and its replicas. www.biztek.pl
  • 43. 43
  • 44. 44 Answer 13 (2) • Authentication/authorization-only secondary directories • The directory assistance feature of Lotus Domino is a way for your Lotus Notes applications to achieve Internet authentication, group authorization, and mail addressing using secondary directories, both Lotus Domino and Lightweight Directory Access Protocol (LDAP). Some clients use separate directories for authentication/authorization and for mail addressing. • Directory assistance in Lotus Domino 8 enables you to specify when a secondary directory must only be used for authentication/authorization (Figure 3-34). This avoids unnecessary NAMELookups to authentication/authorization directories, potentially reducing the number of “Ambiguous Name” dialog boxes and making mail lookup tasks more efficient, as well as reducing the load on authentication/authorization directory servers. www.biztek.pl
  • 45. 45 Question 14 John registered a new server. In which one of the following was the Server document placed? A. NAMES.NSF B. CERTLOG.NSF C. CATALOG.NSF D. DIRECTORY.NSF Answer: A www.biztek.pl
  • 46. 46 Question 15 Edison, the Domino Administrator, wants to enforce file security on HTML and Image files. Which one of the following should he do? A. Enforce ECLs B. Create File Protection documents C. Use Protect Directories in the HTTPD.CNF files D. Domino does not allow security enforcement on HTML and Image files Answer: B www.biztek.pl
  • 47. 47 Answer 15 (1) • You can use the following security features to control Internet/intranet access to files on the servers: • File protection documents (file protection document for a specific Web Site). • Web realms (Web Site authentication realm document). • File protection documents control access to non-database files that users can access via Web browsers. Like database file (.NSF) access control lists (ACLs), which specify the names of the users who can access them and the level of access they have, you can enforce file protection for files that browser users can access - for example, HTML, JPEG, and GIF. • Also by specifying the level of access for these types of files and the names of the users who can access them. • To create file protection for a Web Site document • From the Domino Administrator, choose Configuration - Web - Internet Sites. • Open the Web Site document for which you want to create file protection. • Click Web Site and choose "Create File Protection. • Click Administration and complete the Owners and Administrators fields. • Save the document. www.biztek.pl
  • 48. 48 Answer 15 (2) www.biztek.pl
  • 49. 49 Answer 15 (3) • Using a IBM® Lotus® Domino® Web Site authentication realm, you can specify the text string that appears when a user tries to access a certain directory, or file on a Domino Web server. • When the browser prompts the user for a name and password, the browser's authentication dialog displays the text string. The browser uses the realm to determine which credentials -- that is, user name and password -- to send with the URL for subsequent requests. The Domino Web server caches the user's credentials to use for different realms, in order to avoid prompting the user repeatedly for the same credentials. • The realm string also applies to requests mapped to paths that have the specified path as their root, provided that the child paths of the root do not already have a specified realm. For example, the realm string specified for D:NOTESDATA also applies to a request mapped to D:NOTESDATAFINANCE, if the latter does not have a realm specification. • From the Domino Administrator, choose Configuration - Web - Internet Sites. • Choose the Web Site document for which you want to create an authentication realm, and click Edit Document. • Click "Web Site" and choose "Create Authentication Realm." • Click the Basics tab and complete the fields. • Save the document. www.biztek.pl
  • 50. 50 Question 16 In what order is blacklist and whitelist filtering processed on a received SMTP message? A. DNS blacklists, DNS whitelists, private blacklists, private whitelists B. DNS whitelists, DNS blacklists, private whitelists, private blacklists C. Private blacklists, DNS blacklists, private whitelists, DNS whitelists D. Private whitelists, private blacklists, DNS whitelists, DNS blacklists Answer: D www.biztek.pl
  • 51. 51 Answer 16 (1) • Private whitelists – to specify the hosts and/or domains to exclude from blacklist processing. Hosts that are specified in private whitelists are exempt from blacklist checks. Whitelisted hosts bypass blacklist filter checks but there are other controls which may prevent the message from being accepted. Members of the private whitelist are still subjected to connection, relay, sender, and recipient controls. Being whitelisted does not guarantee that the message will be delivered to the recipient. Whitelists can be used independently of blacklists. • When private whitelists are enabled, the SMTP listener task compares hosts that may be subject to relay enforcement against the defined private whitelist. If there is a match, the private blacklist, DNS whitelists, and DNS blacklists are skipped. Otherwise, processing continues beginning with the private blacklist. • Private blacklists - Use private blacklists to specify hosts and/or domains responsible for sending unnecessary, unwanted mail to your Internet domain. For consistency, IBM ® Lotus® Domino's™ private blacklists follow the model currently used by existing anit-spam functionality. Private blacklists are stored in the Domino Directory to simplify the process of maintaining and distributing blacklist information between servers. • When private blacklists are enabled, the SMTP listener task compares the names of hosts that may be subject to relay enforcement against the private blacklist prior to performing DNS blacklist queries. This prevents unnecessary DNS lookups. If the host is found in the private blacklist, the action specified in the field "Desired action when a connecting host is found in a private blacklist" in the Private Blacklist Filters section of the Configuration Settings document applies. If the host is not found in the private blacklists, processing continues with DNS whitelist filters and then DNS blacklist filters. www.biztek.pl
  • 52. 52 Answer 16 (2) • DNS whitelists – when are enabled, the SMTP listener task determines whether a connecting host is a member of a DNS whitelist by relying on the results of a DNS query of a DNS blacklist-style host name. If the query returns an IP address, the host is added to the whitelist and the remaining DNS whitelists are not searched. If the host is not found in the DNS whitelist , processing continues with DNS blacklist filters. If the query returns an error indicating that the host name is not valid, the host is not added to the whitelist and may be subject to blacklist filtering if that is enabled. • Note DNS whitelists can be used independently of blacklists but private blacklists override DNS whitelists. • DNS blacklists - you can specify the site or sites the SMTP task uses to determine if a connecting host is a "known" open relay or spam source. Specify sites that support IP- based DNS blacklist queries. www.biztek.pl
  • 53. 53 Answer 16 (3) • Whitelists allow messages from specified domains to be received. • IBM supports both private blacklist and whitelist filters. With these configuration settings, it is important to understand how you can reduce spam and to know the order that Domino will check when blacklist and whitelist filters are enabled. • If you enable private whitelist filters, when Domino receives an SMTP connection, it compares the IP address/host name against this list. The field "Whitelist the following hosts" should be used to enter the IP addresses or host names of systems that you want to whitelist. You can also use an asterisk (*) as a wild card. Members of the private whitelist are still subjected to connection, relay, sender, and recipient controls. Being whitelisted does not guarantee that the message will be delivered to the recipient. www.biztek.pl
  • 54. 54 Question 17 The server out-of-office service is configured in which of the following locations? A. Server document B. Server configuration document C. Mail.box on the Domino 8 mail server D. In each user's mailfile the service is to be enabled Answer: B www.biztek.pl
  • 55. 55 Answer 17 (1) • Out of Office service type Agent • From the Domino Administrator, click the • The Out of Office agent processing occurs Configuration tab. after the server mail rules and user mail • Click Server - Configurations. rules are applied but after the "before mail • Select the Server Configuration document you delivery" agent processing completes. By want to modify, and then click Edit Document. default, the agent executes four times • Click Router/SMTP - Advanced - Control. each day on a schedule. The user can preprocess mail using rules or using the • In the Miscellaneous section, locate the field, Out "before delivery mail agent" in order to of Office service type. control spam. • Choose one of these: • The Out of Office agent becomes active when • Service -- Choose the Out of Office service the user enables it. The agent must be for users whose mail files reside in an all- manually disabled when the Out of Office time Domino 8 mail cluster supporting the IBM® period expires. The Out of Office agent Lotus® Notes® 8 mail template (MAIL8.NTF). supports delegation of Out of Office The Out of Office service supports Out of functionality but it is not integrated with Office time periods of less than one day, but Calendar management. The delegate must greater than one hour. The Out of Office have a minimum of Editor access in the ACL service is automatically disabled when the Out and rights to sign agents that run on behalf of of Office time period expires. others in the Server document. The minimum • Agent -- Choose the Out of Office agent for setting for Out of office agent is one day. users whose mail files reside on a cluster that • Use the server command Tell router O to has at least one pre-Domino 8 server. The display a list of all databases that have an minimum setting for Out of office agent is one active out of office service. day. The agent must be manually disabled • when the Out of Office time period expires. • Click Save and Close. www.biztek.pl
  • 56. 56 Answer 17 (2) www.biztek.pl
  • 57. 57 Question 18 The default port for SSL over SMTP is which one of the following? A. 389 B. 465 C. 636 D. 995 Answer: B www.biztek.pl
  • 58. 58 Answer 18 (1) • For networks, a port means an endpoint to a logical connection. The port number identifies what type of port it is. Here are the default email ports for: • POP3 - port 110 • IMAP - port 143 • SMTP - port 25 • HTTP - port 80 • Secure SMTP (SSMTP) - port 465 • Secure IMAP (IMAP4-SSL) - port 585 • IMAP4 over SSL (IMAPS) - port 993 • Secure POP3 (SSL-POP) - port 995 www.biztek.pl
  • 59. 59 Question 19 Which protocol must be enabled on the Domino server to support RSS feeds for mail files? A. RSS B. HTTP C. IMAP D. LDAP Answer: B www.biztek.pl
  • 60. 60 Answer 19 (1) • You can enable RSS feeds for IBM® Lotus® Domino® Web Access mail. When feeds are enabled, a feeds icon displays in the Inbox. • Then, feed readers that are built into browsers or that have browser extensions, automatically detect that a feed link is present from a user's Domino Web Access Inbox. • If enabled, users can subscribe to the feed so that the feed reader application detects new mail. • Since Domino Web Access mail files are generally not accessible by anonymous users, the feed reader application must support storing authentication information to the mail server to retrieve the latest feed. • You should be aware that HTTP traffic to your IBM® Lotus® Domino® mail server may increase if many users subscribe to these feeds within external feed readers. www.biztek.pl
  • 61. 61 Question 20 Which task reads the mail.box for new or changed messages that require processing? A. SMTP B. Amgr C. Adminp D. Router Answer: D www.biztek.pl
  • 62. 62 Question 21 Without manually restarting the SMTP server task, how often will it automatically check for changes to Configuration Settings documents? A. Never B. Two minutes C. Hourly D. Daily at midnight Answer: B www.biztek.pl
  • 63. 63 Answer 21 (1) • The SMTP service controls the SMTP listener on the Lotus Domino server. • By default, whenever you restart the SMTP service, and at two-minute intervals, the SMTP service automatically checks the NOTES.INI file, Configuration Settings document, and Server document to see if any settings have changed. • If the service detects that settings have changed, it rebuilds its internal configuration to incorporate the changes. • To update the SMTP service configuration • Modify settings in the NOTES.INI file, Configuration Settings document, or Server document. • At the server console, enter: Tell smtp update config • If the server's logging level is set to Informational or Verbose, the server console displays messages to indicate when the update begins and completes. www.biztek.pl
  • 64. 64 Question 22 Pedro, a Domino administrator, has enabled the Inbox maintenance feature from a mail policy document. How is the Inbox maintenance feature trigged and where does it run? A. The Inbox maintenance agent is enabled by default to run at 2 AM on all mail servers in the domain. B. The Administration Process periodically runs the Inbox Maintenance agent on each user's home server. C. Every time a user opens their mail file the Inbox maintenance agent runs locally on the user's workstation. D. The Inbox maintenance agent runs on a user's home server and is manually triggered by selecting Tools - Inbox maintenance from within their mail file. Answer: B www.biztek.pl
  • 65. 65 Answer 22 (1) • Inbox maintenance feature improves server performance by reducing the size of users' Inboxes in mail files. • When you enable the Inbox maintenance feature, the Administration Process periodically runs the Inbox Maintenance agent on the IBM® Lotus® Notes® client users' home server, that is, the server that stores the mail files containing the users' Inboxes. • The Inbox Maintenance agent resides in the mail template, MAIL8.NTF. The agent removes documents from the Inbox based on settings you define in the Server document or the mail policy settings document. • The settings that are specified in the Server document override the Inbox Maintenance settings in the mail policy settings document. www.biztek.pl
  • 66. 66 Answer 22 (2) • Enable Inbox maintenance in the Server document by specifying a value in the field "Start executing Inbox Maintenance agent on," in the Server Tasks - Administration Process tab. In that field, specify one or more days of the week on which to run the Inbox Maintenance agent. • In the field "Start executing Inbox Maintenance at," specify the time to begin running the agent. If a day is not specified in the field "Start executing Inbox Maintenance agent on," the feature is not enabled and the agent does not run regardless of whether the "Start executing Inbox Maintenance at" field contains a time at which to run the agent. If Inbox maintenance is enabled but the field "Start executing Inbox Maintenance at" is blank, the Inbox Maintenance agent runs at the default time of 1:00 AM. This feature is disabled by default. www.biztek.pl
  • 67. 67 Answer 22 (3) • You also use the settings in the Server document to specify whether to maintain inboxes for selected users on the home server, or to maintain inboxes based on policy settings. • If the Server document setting "Maintain inboxes based on policies" is chosen, inboxes are maintained according to the settings specified in the mail policy settings document, unless the Inbox Maintenance settings are not specified in the mail policy settings document. • If the settings are not defined in the mail policy setting document, Inbox maintenance is not performed. The Server document also contains the settings that control which documents are removed from a user's Inbox by the agent and when they are removed. The settings are "Remove documents older than [X] days from Inbox" and "Do not remove unread documents from Inbox." www.biztek.pl
  • 68. 68 Question 23 iNotes requires which of the following server tasks to be running? A. IMAP B. SMTP C. DOLS D. HTTP Answer: D www.biztek.pl
  • 69. 69 Question 24 The ACME corporation is receiving a large amount of mail that is addressed to users that are not listed in the Domino Directory. The administrator wants to configure the server to check that recipients are listed in the directory and to refuse any mail addressed to a group name. In which of the following areas is this configured? A. Inbound Sender Controls B. Inbound Relay Enforcement C. Inbound Connection Controls D. Inbound Intended Recipient Controls Answer: D www.biztek.pl
  • 71. 71 Answer 24 (1) • Inbound intended recipients controls • This section allows you to restrict the name of recipients for inbound SMTP messages. A very useful feature is the "Verify that local domain recipient exist in the Domino Directory" field. This specifies whether or not the SMTP listener checks recipient names specified in RCPT TO commands against entries in the Domino Directory. If enabled, the domain part of an address specified in an SMTP RCPT TO command matches one of the configured local Internet domains; the SMTP listener checks all configured directories to determine whether or not the specified recipient is a valid user. If all lookups complete successfully and no matching user name is found, the SMTP server returns a 550 permanent failure response indicating that the user is unknown: • 550 bad_user@yourdomain.com ... No such user • Choosing this setting can help prevent messages sent to nonexistent users (for example, spam messages and messages intended for users who have left the organization) from accumulating in Mail.box as dead mail. To avoid messages from being rejected as a result of directory unavailability, Domino accepts messages when an attempted directory lookup does not complete successfully. Please refer to Figure 6 for more information. www.biztek.pl
  • 72. 72 Question 25 Trisha wants to set up Activity Trends for her Domino environment. Where should Trisha go to configure Activity Trends? A. Server document B. Program document C. Connection document D. Configuration document Answer: D www.biztek.pl
  • 73. 73 Answer 25 (1) • Activity Trends is part of the Domino Administrator. Activity Trends collects and stores activity statistics as current observations and historical trends. The activity statistics relate to the server, databases, users, and connections of users to databases. • You can explore the collected data to see how database workload is distributed across servers. • Using the data, Activity Trends recommends a resource-balancing plan. Then, working with the Domino Change Manager, which is a part of the Domino server, Activity Trends provides a workflow that facilitates implementing the recommended changes. www.biztek.pl
  • 74. 74 Answer 25 (2) www.biztek.pl
  • 75. 75 Question 26 Carla is attempting to utilize Directory Assistance to prevent group lookups from the primary Domino Directory for database authorization. However, she cannot get this to function correctly. Which if the following is the cause? A. Group lookups are not possible from the primary Domino Directory B. You can never exclude the primary Domino Directory from this type of functionality C. The primary Domino Directory must be moved to last in the search order for Directory Assistance D. She must create an exclusion rule in the Directory Assistance database that includes the primary Domino Directory Answer: B www.biztek.pl
  • 76. 76 Answer 26 (1) • When a Web client authenticates with a server, by default, the server checks the primary IBM® Lotus® Domino® Directory to see if the client certificate exists in the Person document. If your organization uses a secondary Domino Directory and/or an LDAP directory to verify client certificates, you can set up Domino to check those additional directories. To do so, you set up the secondary Domino and LDAP directories as trusted domains in the Directory Assistance database. • When you mark the domain as trusted, Domino searches the primary Domino Directory for the user and then searches the trusted secondary Domino and LDAP directories. When you set up directory assistance, you specify the order in which Domino searches the secondary directories. • The hierarchical name returned by the Domino Directory or LDAP directory is checked against the trusted rule in the Directory Assistance database to verify that the organization and organizational units match the specified rule. For example, if the user name returned is Dave Lawson/Acme, the Directory Assistance document must include the rule */Acme. www.biztek.pl
  • 77. 77 Question 27 What tool can an administrator use to see how database workload is distributed across servers and recommend a resource-balancing plan? A. Trend Analysis B. Activity Trends C. Activity Logging D. Transaction Logging Answer: B www.biztek.pl
  • 78. 78 Answer 27 (1) • IBM® Lotus® Domino® server resource utilization can be separated into two types, system activity and user activity. • Activity Logging servers account for their time precisely, recording user activity by person, database, and access protocol. When summarized and averaged, or trended over time, activity logging of trended statistics provides a way to measure and compare workloads across servers. You can use this information to identify the most active users and databases on each server. Using the Domino Change Manager, you can automate the creation and execution of workload redistribution plans to load a new server, decommission an old one, or balance workloads across unevenly burdened servers. • Activity Trends is part of the Domino Administrator. Activity Trends collects and stores activity statistics as current observations and historical trends. The activity statistics relate to the server, databases, users, and connections of users to databases. You can explore the collected data to see how database workload is distributed across servers. Using the data, Activity Trends recommends a resource- balancing plan. Then, working with the Domino Change Manager, which is a part of the Domino server, Activity Trends provides a workflow that facilitates implementing the recommended changes. www.biztek.pl
  • 79. 79 Question 28 The Domino startup has aborted due to the system time being too far in advance as compared to the Domino server time. Which of the following next steps would be the best choice to get the Domino server to start immediately? A. Edit the notes.ini to remove the line LAST_OS_UPDATE_TIME B. Delete the notes.ini file from the server and restart the server C. Edit the notes.ini and type a colon or a semicolon in front of the parameter LAST_DOMINO_TIME_ABORT D. Rename the notes.ini to <timestamp>notes.ini and restart the server where <timestamp> is the correct operating system time Answer: C www.biztek.pl
  • 80. 80 Answer 28 (1) • http://www.lntoolbox.com/en/notesini-reference.html • Use IBM® Lotus ® Domino's™ NOTES.INI settings to prevent the system clock on the Domino server from being reset to an incorrect time. • The system clock time can be changed to an incorrect time, often to a future time, due to system or human error. These incorrect changes to a future time are called forward time changes. When a forward time change occurs on the system clock, all date and time stamps for all documents and databases also change. • There are two time settings impacted by forward time changes to the system clock settings: • Operating system (OS) time • Internal IBM Lotus Domino time • Forward time changes to the system clock can occur while the Domino server is running or while the server is shut down. Use the following NOTES.INI settings to help prevent forward time changes. • Last_Domino_Time= Last recorded internal Domino time • Restart_Time_Interval= Value in seconds. The maximum time difference allowed between the OS time and the Last_Domino_Time. The default value is 3600 seconds. • Restart_Time_Action= Value of 1 indicates that restarting the Domino server is canceled and a message indicating this is written to the file NOTES.INI. If Restart_Time_Action= is set any value other than 1, the OS time is used. • Reset_Time_Interval= Value in seconds of the maximum time change allowed. www.biztek.pl
  • 81. 81 Question 29 Your enterprise users receive large lists of ambiguous names when performing name look-ups for addressing mail messages. Which of the following will remove the ambiguous names? A. Remove the alternate directories from the cluster directory B. Disable specific directories from mail lookups in admin4.nsf C. Enable specific directories to be utilized for credentials only in Directory Assistance D. Specify that the primary Domino Directory is the only mail addressing source within the server configuration document Answer: C www.biztek.pl
  • 82. 82 Answer 29 (1) Limiting directories to authentication-only lookups • You may need to deploy a directory for authentication purposes only if: • You have both an IBM® Lotus® Domino® and an LDAP directory that contain some identical names. • You do not use the LDAP directory's names for mailing. • Your mail clients are experiencing "Ambiguous name" dialog boxes when sending mail. • It is becoming common practice to use a corporate LDAP server to provide authentication (userid/password) services for single sign-on (SSO) purposes. Often, these LDAP servers are not configured, deployed, or intended to support mail routing (or other Domino-based) directory lookups. • Because Domino does not support a universal name mapping scheme for Domino-style identities (fullnames or distinguished names of the form cn=xxxx, ou=yyyy, o=zzzz) and the less (or differently) constrained distinguished name formats that are implemented by various LDAP directories, deploying an LDAP directory to be used for authorization can cause name ambiguity problems with some Domino services if duplicate entries exist in the native Domino directories and the LDAP directory being deployed. Since duplicate entries are usually the case if the LDAP directory is being deployed to allow SSO, or to provide LDAP-based authentication for Internet services, it is necessary to avoid sending certain lookups to the LDAP directories. Otherwise, sending email can result in an a large number of unnecessary lookups to the LDAP directory, thereby decreasing performance. www.biztek.pl
  • 83. 83 Answer 29 (2) • You indicate that a directory should be used only for authentication on the Basics tab of the Directory Assistance document as follows: • set Group Authorization to Yes or enable one of the Naming Contexts (Rules) as 'Trusted for Credentials". This reveals a new setting - "Use exclusively for Group Authorization or Credential Authentication." • The default setting for "Use exclusive for Group Authorization or Credential Authentication" is "No." Change it to "Yes" to limit searches on this directory strictly for authentication. • If neither setting is enabled, the directory will be searched. www.biztek.pl
  • 84. 84 Question 30 Domino uses which type of document to determine how to connect to another server for replication and mail routing? A. Server B. Domain C. Program D. Connection Answer: D www.biztek.pl
  • 85. 85 Answer 30 (1) • Servers must connect to each other to exchange data, for example to replicate databases and exchange mail. You can create connections between servers across a local area network (LAN) or wide area network (WAN); using a dialup modem or remote access service; using a passthru server, which is a server that acts as an intermediary server between a client and its destination; or over the Internet. • Connections between servers -- that is, your connection topology -- should enable servers to exchange information reliably and efficiently, maximizing the capacity of the physical network, while minimizing connection-related costs. www.biztek.pl
  • 86. Komponenty przesyłu poczty (6). Różne sieci DNN. A B CONNECTION SERVER 1 SERVER 2 Recipient' Router Router s Mail Mail Mail Box Box Box W przypadku różnych sieci DNN wiadomość wysłana będzie wg. ustawień w dokumencie Connection! 86