2016年IBM Lotus認證試題題庫(附答案)
QUESTION 1.
Chris wishes to secure the Domino server console by setting a password. Which one of the following commands could he execute on the console to accomplish this, assuming the password he wishes to use is APPLE?
A. Secure Console “APPLE”
B. Secure Password APPLE
C. Load Secure APPLE
D. Set Secure APPLE
Answer: D
Explanation
The administrator can secure the Domino server console by using the following command at the console: SET SECURE APPLE The console has now been password-protected using APPLE as the password. The servers console can no longer be used for such common tasks as issuing the following server console commands: Load, Tell, Exit, Quit, and Set Configuration. To disable console security, you must clear the current password by entering a second SET SECURE command with the same password.
QUESTION 2.
Jacob, the Domino administrator, wants to manage the setup policies assigned to each user. Which one of the following documents could he view to find this information?
A. The user's Person document in the Domino Directory
B. Desktop Setup Policy document
C. Policy Member document
D. Domino Server Setup document
Answer: A
Explanation
A list of setup profiles for each user is available on the Administration tab of a user's Person document under “Policy Management”
QUESTION 3.
Which of the following is true of a partitioned server installation?
A. Partitioned servers share the same Administration Request database []
B. Partitioned servers share the same Domino program directory
C. Partitioned servers share the same file
D. Partitioned severs share the same Domino data directory
Answer: B
Explanation
Domino server partitioning lets you run multiple Domino servers on a single computer. Using partitioned servers reduces hardware expenses and minimizes the number of computers that you have to administer. Each partitioned server has its own Domino data directory and file, but all partitioned servers share the same Domino program directory.
QUESTION 4.
Jimmy has created a Lotus Script agent that is run from inside a Domino Web application. The agent needs to update multiple documents in a database. What can the Domino administrator do to ensure the Lotus Script agent can run properly?
A. Allow the server to run as background agent in the agent manager section of the Server documents
B. Add the group “Web User” to the ACL as author, then force the user to authenticate when accessing the
server
C. Add database replica ID to the ACL as editors
D. Sign the agent using Server ID, then add server to ACL as editor
Answer: D
Explanation
The administrator can sign database elements, such as Lotus Script agents, with an ID file that has access and the necessary rights to create, update, or delete documents in multiple databases.
QUESTION 5.
Which of the following is not true about Program documents?
A. They can be used to run an OS/2 command file
B. They can be used to run an UNIX shell script or program
C. They are stored in the file
D. They can be used to run task on a server at a regularly scheduled time or at server startup
Answer: C
Explanation
Program documents are stored in the Domino Directory and can be used to: Run tasks on a server at a regularly scheduled time or at server startup Run an OS/2 command file Run an UNIX shell script or program
QUESTION 6.
What is the maximum number of Domino servers that can be members of a cluster?
A. 8
B. 2
C. 4
D. 6
Answer: D
Explanation
A Domino cluster can contain two to six servers.
QUESTION 7.
Which one of the following is not true of the certifier ID file [] for the organization?
A. The can not be moved from its original location
B. The is used to certify servers
C. The is used to certify users.
D. The is typically located in the C:LOTUSDOMINODATA directory.
Answer: A
Explanation
The is typically located in the C:LOTUSDOMINODATA directory and is used to certify servers and users. It can be moved from its original location.
QUESTION 8.
Which of the following is not stored in the Issued Certificate List [ICL]?
A. A copy of each unexpired certificate that it has issued
B. Certificate revocation lists
C. CA Configuration documents
D. History of modifications to the CA Configuration documents
Answer: D
Explanation
Issued Certificate List (ICL) Each certifier has an Issued Certificate List (ICL) that is created when the certifier is created or migrated to the CA process. The ICL is a database that stores a copy of each unexpired certificate that it has issued, certificate revocation lists, and CA configuration documents. Configuration documents are generated when you create the certifier and sign it with the certifier's public key. After you create these documents, you cannot edit them. CA
Configuration documents include: Certificate profiles, which contain information about certificates issued by the certifier. CA Configuration document, which contains information about the certifier itself. RA/CA association documents, which contain information about the RAs who are authorized to approve and deny certificate requests. There is one document for each RA. ID file storage document, which contains information about the certifier ID.
QUESTION 9.
Wendy needs to change some settings on a Security Settings Policy document. Which one of the following roles does she need to be able to modify the Security
Settings policy documents?
A. Policy Editor role
B. Policy Creator role
C. Policy Modifier role
D. Policy author role
Answer: C
Explanation
There are two ACL roles associated with policies. They are the Policy Creator role and the Policy Modifier role. The Policy Creator role is required to be able to create a policy document. The Policy Modifier role is required to modify a Policy document.
QUESTION 10.
Jerry, a Notes & Domino 6 user, has locked a document so others can't edit it. However, Jerry is on vacation and others need to edit the document. Which level of access is required to be able to unlock Jerry's documents?
A. Manager
B. Designer
C. Editor
D. Author
Answer: A
Explanation
Document locks prevent any users from editing the document, including those with Manager access to the database. However, a user with manager access to a database can unlock a locked document.
-
基於Unix的Web服務器安全
在計算機網絡日益普及的今天,計算機安全不但要求防治計算機病毒,而且要提高系統抵抗黑客非法入侵的能力,還要提高對遠程數據傳輸的保密性,避免在傳輸途中遭受非法竊取。下面yjbys小編為大家準備了基於Unix的Web服務器安全的文章,歡迎閲讀。一.安全漏洞Web服務器上的...
-
IBM認證考試流程
1、瞭解考試項目向ibm中國教育培訓中心或ibm技術培訓中心索取考試內容詳細説明或通過國際互聯網下載參閲模擬考試題,模擬試題可通過國際互聯網下載2、自學或參加培訓課程以傳真或電話方式向ibm中國教育培訓中心或ibm技術培訓中心報名參加培訓課程3、報名考試以...
-
ibm專業認證證書是什麼
在當前企業競爭日趨激烈、信息技術日異更新的形勢下,企業經理們已經意識到了新技術的採用、員工的培訓以及人才的保留是企業得以長久發展和成功的關鍵。下面是小編整理的關於ibm專業認證證書是什麼,歡迎大家參考!IBM專業認證:造就國際人才如何評價員工是否掌握和...
-
IBM認證DOM基礎知識
在開始使用DOM之前,瞭解它實際表示什麼是值得的。DOMDocument是以層次結構組織起來的節點,或信息片段,的集合。這種層次結構允許開發者瀏覽樹來查找特定信息。通常,分析結構需要在完成任何工作之前裝入整個文檔並且裝入層次結構。由於DOM是基於信息的層次結構,因此...