Richard2011's picture
From Richard2011 rss RSS  subscribe Subscribe

Exampdf 190-775 Exam Questions Released 

Actual Exampdf 190-775 exam questions are available for the examinees to prepare the exam well and get the certification with no time.

 

 
 
Tags:  190-775  exam  questions 
Views:  23
Published:  March 23, 2012
 
0
download

Share plick with friends Share
save to favorite
Report Abuse Report Abuse
 
Related Plicks
testkiller, test killer, testkiller.me, MCSE, CCNA, A+, Oracle, brain dumps, online certification te

testkiller, test killer, testkiller.me, MCSE, CCNA, A+, Oracle, brain dumps, online certification te

From: shahid_anw
Views: 806 Comments: 0
Hi,

My name shahid, Im network administer passed mcse exams by Microsoft, CCNA and CCNP by Cisco. Now I'm prepairing Exams DBA by Oracle.I found testkiller website for passing certification exams wi (more)

 
PTCB Exam | PTCB Syllabus | PTCB exam questions | PTCB questions | PTCB practice test

PTCB Exam | PTCB Syllabus | PTCB exam questions | PTCB questions | PTCB practice test

From: jonymark112233
Views: 29 Comments: 0
This site was created for pharmacy technicians wishing to pass the PTCB Exam. Included are 40 free sample PTCB Exam questions and PTCB test preparation tips.

 
640 802 exam-a-demo-q&a

640 802 exam-a-demo-q&a

From: cishaw
Views: 1186 Comments: 0
640 802 exam-a-demo-q&a
 
See all 
 
More from this user
Exampdf CompTIA Security+ SY0-201 Exam Questions

Exampdf CompTIA Security+ SY0-201 Exam Questions

From: Richard2011
Views: 635
Comments: 0

Exampdf BCP-223 Exam Questions Share

Exampdf BCP-223 Exam Questions Share

From: Richard2011
Views: 575
Comments: 0

Exampdf IBM 000-034 Study Guides

Exampdf IBM 000-034 Study Guides

From: Richard2011
Views: 588
Comments: 0

Exampdf 1Z0-007 Training Materials Share

Exampdf 1Z0-007 Training Materials Share

From: Richard2011
Views: 405
Comments: 0

See all 
 
 
 URL:          AddThis Social Bookmark Button
Embed Thin Player: (fits in most blogs)
Embed Full Player :
 
 

Name

Email (will NOT be shown to other users)

 

 
 
Comments: (watch)
 
 
Notes:
 
Slide 1: Many new exams are available at Exampdf.com, such as 1Z0-102, CAS-001, ST0-147, and so on. With Exampdf real Q&As of any IT certification exam, all the examinees can clear the exams easily. Take charge of your time now.
Slide 2: The safer , easier way to help you pass any IT exams. Exam : 190-775 Title : IBM Lotus Notes Domino 7 Implement+ Version : DEMO 1/6
Slide 3: The safer , easier way to help you pass any IT exams. 1.A security policy push has been done to all users of a large toy company. This new security policy controls many aspects of the user's password, including limiting the number of repeating characters and restricting the user from providing any of their name in the password. If a user chooses not to modify their password or use any of the restrictions at the time of being prompted, what is the next step that occurs? A.Notes will continue to prompt the user on a scheduled basis until the password is changed B.The Notes client shuts down after warning the user they are not complying with the password policy C.The designated administrator, as defined in the security policy settings document, receives a notification email about that user D.The user generates a forced Adminp request to change their password to the default that was specified in the security policy settings document Correct:B 2.You have been asked to make a comprehensive administration structure that contains restricted rights for certain groups of administrators. While maintaining the rights to remotely administer Unix servers, which of the following Domino administrator access levels is not automatically granted Manager access to databases on the server, nor does it provide any access to the Web Administrator database? A.Administrators B.Console administrator C.Database administrators D.Full access administrator Correct:C 3.Sam has been configuring key rollover in his customers Domino domain. Key Rollover will occur after 365 days as the maximum allowable age for any key. Where is key rollover configured for users? A.Person document - Administration tab B.Desktop Settings policy document - Security tab C.Server Configuration document - Change Control tab D.Security Settings policy document - Keys and Certificates tab Correct:D 4.A Smartcard for Holly was destroyed. This card contained certain Notes private keys she had shifted to the Smartcard to provide tighter security. Which of the following is the best option for establishing a new Smartcard for her? A.Have Holly access all previous applications with a newly created id file to rebuild the private keys B.Reregister Holly and create a new Notes id file that will be Smartcard enabled, all previous keys are lost C.Obtain the last Notes id for Holly from the recovery database for the certifier and create a new Smartcard D.Perform a name change on another existing user with the same access to Holly's name. Copy all the private keys and rename the user back Correct:C 5.You are attempting to establish SSO in your domain across multiple servers. The time-out for SSO was configured to expire after 45 minutes. The time during which any of your users are logged in via a Web client, defined by a cookie, is which of the following? A.Thread 2/6
Slide 4: The safer , easier way to help you pass any IT exams. B.Session C.Instance D.Variable Correct:B 6.John, the Domino administrator, wishes to deny access to a server named Mail14 for a user named Randy. John also wants to verify that Randy cannot view a list of names that have been denied server access to Mail14. Which of the following provides that functionality? A.ID lockout for Randy's id B.Forced password change for Randy's id C.Notes ID password recovery for Randy's id D."Not access server" field in the Mail14 server document Correct:A 7.Notes users are able to generate key rollover requests without the use of a security settings policy document. While generating the request, what are the two options the user has in generating key rollover? A.ID recertification and ID recovery B.Key enhancement and new key generation C.Public key change and private key change D.Authentication protocol and mail protocol Correct:D 8.Erika is configuring the initial Domino server for her organization. Her goal is to restrict users from modifying any attributes of the Workstation ECL, but she is yet to create the Administration ECL for the domain. What settings will the client receive until an Administration ECL is created? A.The Workstation ECL is created with default settings that are built into the Notes client B.The Workstation ECL remains blank until an Administration ECL for the domain is created and saved C.The Workstation ECL is created with default settings that define the Administration ECL until one is manually created and saved D.The Workstation ECL cannot be created and a warning is issued upon client setup to that effect. The client configuration will not continue until a default Administration ECL is defined Correct:A 9.Data is not being successfully sent to a cgi program on the Domino web server by Jenny, a user. Another user in the Bakery department can start a program successfully on the web server after logging in. One of the members of LocalDomainAdmins, Brian, tests the same cgi script and has sent data successfully. Which of the following would be the correct settings to allow Jenny to send data to the cgi program? A.Set Anonymous to Read, -Default- to Author and LocalDomainAdmins to Manager B.Set LocalDomainAdmins to Editor, -Default- to Get and Anonymous to No Access C.Set -Default- to Post, Anonymous to Get and LocalDomainAdmins remain the same D.Set -Default- to Reader, Anonymous to Depositor and LocalDomainAdmins to Upload Correct:C 10.Users have had recovery information embedded into their id file since version 5.0.8 of Notes and Domino. They currently run version 7.0.1 of Notes and Domino. However, Joshua is moving from the Notes administration team and into another group. Matthew will take his place. Which of the following describes the steps necessary to remove Joshua and add Matthew in his place as a 3/6
Slide 5: The safer , easier way to help you pass any IT exams. proper id recovery authority for the certifier utilized for user creation and recertification? A.Matthew and Joshua will have no steps to perform. Adding the new administrator to the administrators group in the Domino Directory automatically recertifies the users B.Joshua must issue an Adminp request to "remove admin from certifier" from the Domino Administrator client and then Matthew must enter an Adminp request to "add admin to certifier". Both must be approved by another administrator before recertifying users C.Recovery information in the certifier id utilized to certify and register users must be modified to add Matthew and remove Joshua. A recertification of the users under that certifier must occur. Notes 7.0.1 will NOT prompt the user to accept the change in recovery information D.The certifier in question must have all recovery authorities removed. A recertification of existing users must occur to accept the removal of Joshua. Then the certifier must be modified again to add Matthew as a recovery authority and the users recertified a final time. They will then accept Matthew as a recovery authority when prompted. Correct:C 11.A phone call prompts you to immediately revoke an Internet certificate due to a compromised key. After verifying the caller as a trusted source, what database will you access to revoke the Internet certificate that was compromised? A.The CA database for the certifier that issued the certificate B.The ICL database for the certifier that issued the certificate C.The CRL database for the certifier that issued the certificate D.The CERT database for the certifier that issued the certificate Correct:B 12.The server access fields define access to the Notes server via which of the following protocols? A.NRPC and HTTP B.NRPC and LDAP C.NRPC and SMTP D.NRPC and DIIOP Correct:A 13.Select the notes.ini parameter that denies any user from accessing a server in full access administrator mode. A.SET_RESTRICT_FULLACCESS=1 B.RESTRICT_FULLADMIN_ACCESS=1 C.SECURE_DISABLE_FULLADMIN = 1 D.FULLACCESS_ADMIN_RESTRICTED=1 Correct:C 14.The decision was made by ACME management to not encrypt databases on the Domino server that runs on Windows 2003. Numerous people have access to the room where the server is located, as well as local server access. A security policy was established that states the Domino server console must be password protected. Which of the following steps should be taken to enable this feature? A.Lock the Domino server service in Windows 2003 with a password only known to the Domino administrators B.Issue a Set Secure command on the Domino server console with a password only known to the Domino administrators 4/6
Slide 6: The safer , easier way to help you pass any IT exams. C.Create a console.lck file on the Domino server that contains a password only known to the Domino administrators D.Open the server console from an administrator client with full access administration and issue a Lock Server command with a password only known to the Domino administrators Correct:B 15.Andy issued an unscheduled CRL for the certificate for James Addington/Operations/TotalTelevision, believing that there was a security compromise. Which server command did he issue for the immediate revocation to process? A.tell ca CRL push certifier number B.tell ca CRL issue certifier number C.tell ca deactivate certifier number D.tell ca delete key certifier number Correct:B 16.Upon logging in, the Domino server continues to send the username and password of Ted with the URL for continuous requests. The Domino web server has cached the username and password in response to which of the following configurations established by the Domino administrator? A.Area B.Realm C.Domain D.Response Correct:B 17.Jeff and Connie are Domino developers sharing the same test server called Dev1/Trans. -Connie has signed an agent to run on the invoker of the agent's behalf. She then attempts to run this agent from her Notes client. The agent fails to run. -Jeff, shortly after, has signed an identically coded agent to run on behalf of the invoker also. He successfully runs this agent from a test in Internet Explorer. -The field granting the ability to run agents on behalf of the invoker is blank in the server document Which of the following explains the reason the agent successfully ran for Jeff and not Connie? A.Agents set to run on behalf of the invoker cannot run from a Notes client B.Agents may only be signed to be invoked on behalf of the server itself. Connie did not sign hers in that manner C.Agents set to run on behalf of the invoker may only be run scheduled. Jeff had established a schedule for his agent D.Only one agent may be run on any server that is configured to run on behalf of the invoker. By Jeff signing his agent later, it overrides Connie's as the single agent to run of that type Correct:A 18.The names of administrators who are allowed to recover IDs is stored in what location? A.The certifier id file B.The server notes.ini file C.The administrator client notes.ini file D.The certifier document in the Domino Directory Correct:A 19.You have assigned Alicia to be the certificate authority administrator for your Domino domain. 5/6
Slide 7: The safer , easier way to help you pass any IT exams. As your organization grew, she spends more time than desired in managing the CA process. To assist her, you enable Kendra as a Registration Authority. Of the below rights, which will Kendra be able to perform with her role as Registration Authority by default? A.Modify certifiers B.Create certifiers C.Enforce certificate access D.Revoke Internet certificates Correct:D 20.From the following, select the listing which provides agent manager rights ranked in order from the highest to the lowest. A.Run unrestricted methods and operations Sign agents to run on behalf of someone else Sign agents to run on behalf of the invoker of the agent Run restricted LotusScript/Java agents Run simple and formula agents Sign script libraries to run on behalf of someone else B.Run simple and formula agents Sign agents to run on behalf of someone else Run restricted LotusScript/Java agents Run unrestricted methods and operations Sign script libraries to run on behalf of someone else Sign agents to run on behalf of the invoker of the agent C.Sign script libraries to run on behalf of someone else Sign agents to run on behalf of the invoker of the agent Sign agents to run on behalf of someone else Run unrestricted methods and operations Run restricted LotusScript/Java agents Run simple and formula agents D.Sign agents to run on behalf of the invoker of the agent Run restricted LotusScript/Java agents Sign agents to run on behalf of someone else Run unrestricted methods and operations Run simple and formula agents Sign script libraries to run on behalf of someone else Correct:A 6/6

   
Time on Slide Time on Plick
Slides per Visit Slide Views Views by Location