Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Lotus 190-755 Exam - Cheat-Test.com

Free 190-755 Sample Questions:

Q: 1 A security policy push has been done to all users of a large toy company. This new security policy controls many aspects of the user's password, including limiting the number of repeating characters and restricting the user from providing any of their name in the password. If a user chooses not to modify their password or use any of the restrictions at the time of being prompted, what is the next step that occurs?
A. Notes will continue to prompt the user on a scheduled basis until the password is changed
B. The Notes client shuts down after warning the user they are not complying with the password policy
C. The designated administrator, as defined in the security policy settings document, receives a notification email about that user
D. The user generates a forced Adminp request to change their password to the default that was specified in the security policy settings document
Answer: B

Q: 2 You have been asked to make a comprehensive administration structure that contains restricted rights for certain groups of administrators. While maintaining the rights to remotely
administer Unix servers, which of the following Domino administrator access levels is not automatically granted Manager access to databases on the server, nor does it provide any access to the Web Administrator database?
A. Administrators
B. Console administrator
C. Database administrators
D. Full access administrator
Answer: C

Q: 3 Sam has been configuring key rollover in his customers Domino domain. Key Rollover will occur after 365 days as the maximum allowable age for any key. Where is key rollover configured for users?
A. Person document - Administration tab
B. Desktop Settings policy document - Security tab
C. Server Configuration document - Change Control tab
D. Security Settings policy document - Keys and Certificates tab
Answer: D

Q: 4 A Smartcard for Holly was destroyed. This card contained certain Notes private keys she had shifted to the Smartcard to provide tighter security. Which of the following is the best option for establishing a new Smartcard for her?
A. Have Holly access all previous applications with a newly created id file to rebuild the private keys
B. Reregister Holly and create a new Notes id file that will be Smartcard enabled, all previous keys are lost
C. Obtain the last Notes id for Holly from the recovery database for the certifier and create a new Smartcard
D. Perform a name change on another existing user with the same access to Holly's name. Copy all the private keys and rename the user back
Answer: C

Q: 5 You are attempting to establish SSO in your domain across multiple servers.
The time-out for SSO was configured to expire after 45 minutes. The time during which any of your users are logged in via a Web client, defined by a cookie, is which of the following?
A. Thread
B. Session
C. Instance
D. Variable
Answer: B

Q: 6 John, the Domino administrator, wishes to deny access to a server named Mail14 for a user named Randy. John also wants to verify that Randy cannot view a list of names that have been denied server access to Mail14. Which of the following provides that functionality?
A. ID lockout for Randy's id
B. Forced password change for Randy's id
C. Notes ID password recovery for Randy's id
D. "Not access server" field in the Mail14 server document
Answer: A

Q: 7 Notes users are able to generate key rollover requests without the use of a security settings policy document. While generating the request, what are the two options the user has in generating key rollover?
A. ID recertification and ID recovery
B. Key enhancement and new key generation
C. Public key change and private key change
D. Authentication protocol and mail protocol
Answer: D

Q: 8 Erika is configuring the initial Domino server for her organization. Her goal is to restrict users from modifying any attributes of the Workstation ECL, but she is yet to create the Administration ECL for the domain. What settings will the client receive until an Administration ECL is created?
A. The Workstation ECL is created with default settings that are built into the Notes client
B. The Workstation ECL remains blank until an Administration ECL for the domain is created and saved
C. The Workstation ECL is created with default settings that define the Administration ECL until one is manually created and saved
D. The Workstation ECL cannot be created and a warning is issued upon client setup to that effect. The client configuration will not continue until a default Administration ECL is defined
Answer: A

Q: 9 Data is not being successfully sent to a cgi program on the Domino web server by Jenny, a user. Another user in the Bakery department can start a program successfully on the web server after logging in. One of the members of LocalDomainAdmins, Brian, tests the same cgi script
and has sent data successfully. Which of the following would be the correct settings to allow Jenny to send data to the cgi program?
A. Set Anonymous to Read, -Default- to Author and LocalDomainAdmins to Manager
B. Set LocalDomainAdmins to Editor, -Default- to Get and Anonymous to No Access
C. Set -Default- to Post, Anonymous to Get and LocalDomainAdmins remain the same
D. Set -Default- to Reader, Anonymous to Depositor and LocalDomainAdmins to Upload
Answer: C

Q: 10 Users have had recovery information embedded into their id file since version 5.0.8 of Notes and Domino. They currently run version 7.0.1 of Notes and Domino. However, Joshua is moving from the Notes administration team and into another group. Matthew will take his place. Which of the following describes the steps necessary to remove Joshua and add Matthew in his
place as a proper id recovery authority for the certifier utilized for user creation and recertification?
A. Matthew and Joshua will have no steps to perform. Adding the new administrator to the administrators group in the Domino Directory automatically recertifies the users
B. Joshua must issue an Adminp request to "remove admin from certifier" from the Domino Administrator client and then Matthew must enter an Adminp request to "add admin to certifier". Both must be approved by another administrator before recertifying users
C. Recovery information in the certifier id utilized to certify and register users must be modified to add Matthew and remove Joshua. A recertification of the users under that certifier must occur. Notes 7.0.1 will NOT prompt the user to accept the change in recovery information
D. The certifier in question must have all recovery authorities removed. A recertification of existing users must occur to accept the removal of Joshua. Then the certifier must be modified again to add Matthew as a recovery authority and the users recertified a final time. They will then
accept Matthew as a recovery authority when prompted.
Answer: C

Q: 11 A phone call prompts you to immediately revoke an Internet certificate due to a compromised key. After verifying the caller as a trusted source, what database will you access to
revoke the Internet certificate that was compromised?
A. The CA database for the certifier that issued the certificate
B. The ICL database for the certifier that issued the certificate
C. The CRL database for the certifier that issued the certificate
D. The CERT database for the certifier that issued the certificate
Answer: B

Q: 12 The server access fields define access to the Notes server via which of the following protocols?
A. NRPC and HTTP
B. NRPC and LDAP
C. NRPC and SMTP
D. NRPC and DIIOP
Answer: A

Q: 13 Select the notes.ini parameter that denies any user from accessing a server in full access administrator mode.
A. SET_RESTRICT_FULLACCESS=1
B. RESTRICT_FULLADMIN_ACCESS=1
C. SECURE_DISABLE_FULLADMIN = 1
D. FULLACCESS_ADMIN_RESTRICTED=1
Answer: C

Q: 14 The decision was made by ACME management to not encrypt databases on the Domino server that runs on Windows 2003. Numerous people have access to the room where the server is located, as well as local server access. A security policy was established that states the Domino
server console must be password protected. Which of the following steps should be taken to enable this feature?
A. Lock the Domino server service in Windows 2003 with a password only known to the Domino
administrators
B. Issue a Set Secure command on the Domino server console with a password only known to the Domino administrators
C. Create a console.lck file on the Domino server that contains a password only known to the Domino administrators
D. Open the server console from an administrator client with full access administration and issue a Lock Server command with a password only known to the Domino administrators
Answer: B

Q: 15 Andy issued an unscheduled CRL for the certificate for James Addington/Operations/TotalTelevision, believing that there was a security compromise. Which server command did he issue for the immediate revocation to process?
A. tell ca CRL push certifier number
B. tell ca CRL issue certifier number
C. tell ca deactivate certifier number
D. tell ca delete key certifier number
Answer: B

Q: 16 Upon logging in, the Domino server continues to send the username and password of Ted with the URL for continuous requests. The Domino web server has cached the username and password in response to which of the following configurations established by the Domino administrator?
A. Area
B. Realm
C. Domain
D. Response
Answer: B

Q: 17 Jeff and Connie are Domino developers sharing the same test server called Dev1/Trans.
-Connie has signed an agent to run on the invoker of the agent's behalf. She then attempts to run this agent from her Notes client. The agent fails to run.
-Jeff, shortly after, has signed an identically coded agent to run on behalf of the invoker also. He
successfully runs this agent from a test in Internet Explorer.
-The field granting the ability to run agents on behalf of the invoker is blank in the server document
Which of the following explains the reason the agent successfully ran for Jeff and not Connie?
A. Agents set to run on behalf of the invoker cannot run from a Notes client
B. Agents may only be signed to be invoked on behalf of the server itself. Connie did not sign hers in that manner
C. Agents set to run on behalf of the invoker may only be run scheduled. Jeff had established a schedule for his agent
D. Only one agent may be run on any server that is configured to run on behalf of the invoker. By Jeff signing his agent later, it overrides Connie's as the single agent to run of that type
Answer: A

Q: 18 The names of administrators who are allowed to recover IDs is stored in what location?
A. The certifier id file
B. The server notes.ini file
C. The administrator client notes.ini file
D. The certifier document in the Domino Directory
Answer: A

Q: 19 You have assigned Alicia to be the certificate authority administrator for your Domino domain. As your organization grew, she spends more time than desired in managing the CA process. To assist her, you enable Kendra as a Registration Authority. Of the below rights, which will Kendra be able to perform with her role as Registration Authority by default?
A. Modify certifiers
B. Create certifiers
C. Enforce certificate access
D. Revoke Internet certificates
Answer: D

Q: 20 From the following, select the listing which provides agent manager rights ranked in order from the highest to the lowest.
A. Run unrestricted methods and operations
Sign agents to run on behalf of someone else
Sign agents to run on behalf of the invoker of the agent
Run restricted LotusScript/Java agents
Run simple and formula agents
Sign script libraries to run on behalf of someone else
B. Run simple and formula agents
Sign agents to run on behalf of someone else
Run restricted LotusScript/Java agents
Run unrestricted methods and operations
Sign script libraries to run on behalf of someone else
Sign agents to run on behalf of the invoker of the agent
C. Sign script libraries to run on behalf of someone else
Sign agents to run on behalf of the invoker of the agent
Sign agents to run on behalf of someone else
Run unrestricted methods and operations
Run restricted LotusScript/Java agents
Run simple and formula agents
D. Sign agents to run on behalf of the invoker of the agent
Run restricted LotusScript/Java agents
Sign agents to run on behalf of someone else
Run unrestricted methods and operations
Run simple and formula agents
Sign script libraries to run on behalf of someone else
Answer: A

Q: 21 Martin, the Domino administrator, has established a Security Policy document that allows users to change their Internet passwords via HTTP. However, users are still unable to make this change while in Domino Web Access. Martin has verified the following:
- All users have the security policy correctly applied
- Users have proper rights to the Domino Directory
- Adminp is running correctly on the Domino server
Which of the following best describes the user's inability to change their Internet password?
A. The Domino server requires the DSAPI security filter of nInetPassword to be put in place
B. Domino HTTP does not allow an authenticated user to change their Internet password, only a Notes id password
C. The security tab of the Domino Web Access server document does not have the users in the field to allow modifications of person documents
D. The server configuration document for that server has the option for modification of Internet passwords while in Domino Web Access tab set to disabled
Answer: D

Q: 22 Kathleen has generated an ECL refresh for user's workstations. Which of the following entries must be entered into the Administration ECL to allow users to export data and allow access to network resources under their own name?
A. <OSAdmin>
B. <ECLOwner>
C. <WorkstationManager>
D. <LocalAdministrator>
Answer: B

Q: 23 Password verification may NOT be utilized on which of the following?
A. ID files that have been cross-certified
B. ID files that contain multiple passwords
C. ID files with a password quality of zero
D. ID files that have password recovery enabled
Answer: B

Q: 24 A server id file was placed on a Smart Card by Kendra. The following steps were performed:
- The server id file was enabled for id recovery
-The server id file was enabled for the Smart Card
- The reader and the Smart Card were placed on the server
- The server id file embedded with the Smart Card information was placed in the appropriate place on the server
However, after following the steps, she continually received an error stating "Login aborted by user" on the Domino server. Which of the following is the cause of this error when attempting to enable a Smart Card for Domino servers?
A. Smart Cards are not supported for server id files, only Notes clients
B. The Smart Card cannot contain a server id file created with anything lower than a Domino 6 client
C. The server notes.ini was not properly configured to point to the appropriate Smart Card library file
D. The server id file does not contain a complex password to meet the Smart Card password strength requirements
Answer: C

Q: 25 A new corporate security policy has been mandated for all users on Lotus Notes, that passwords must be changed every 45 days. You are responsible for enforcing the new security
policy. After creating the necessary security policy document that applies to the entire Organization, some users are getting locked out of their Notes id files after the first 45 day cycle occurs. Which of the following best explains the reason for users getting locked out of their id files?
A. The grace period is set to the default for the security policy document and users have passed the default
B. The users affected have their user id filed placed on Smartcards and a PIN number assigned
C. The users' new password did not meet the password length criteria assigned by the security policy
D. The users' Internet password does not match their Notes id password and security policies that enforce password change must also have the Internet and Notes password synchronized
Answer: B

Q: 26 Josh discovered that his Domino Web server was allowing less secure authentication against his Domino Directory for all of his users. He is moving the authentication from lower security to higher security. Which of the following login ids will NOT be allowed when he makes the change and restarts his Domino Web server?
A. AJones
B. Alan Jones
C. CN=Alan Jones
D. Alan_Jones@company.com
Answer: A

Q: 27 Sara wishes to migrate her company's Notes certifier to the new Certificate Authority process. She has chosen to encrypt the certifier id with the server id instead of creating a
specific trusted id. What Domino server console command must be issued to secure the certifier?
A. load activate ca <idfile>
B. load ca <password> unlock
C. tell ca activate <password>
D. tell ca unlock <idfile><password>
Answer: C

Q: 28 Andy has let the server upgrade the key strength for numerous users through key rollover. Which of the following is true in regards to encrypted documents the user's previously had access to with the old keys?
A. The old key is stored in the user id file for access as an archived key
B. The user must decrypt all documents before performing the key rollover to stronger key strength
C. The user automatically has all documents updated with the new encryption key once the key rollover has been accepted
D. The server performs the decryption and re-encryption of all documents encrypted by the user once Adminp processes the creation of the new keys
Answer: A

Q: 29 The Domino administrator, Paul, has decided that the Domino servers in his environment should perform a key rollover with a preferred key strength set to default levels. However, he keeps getting errors that the keys cannot be rolled over to 1024 bits at this time. Which of the
following is the cause of this error?
A. Server keys may not be rolled over to a key strength greater than 968
B. There is no defined security settings policy document that applies to that server
C. Key rollover must be done in increments and his server keys are still below 630 bits
D. He has also configured that the maximum allowable key strength is 630 bits for servers
Answer: D

Q: 30 Debbie wishes to use Certificate Revocation Lists (CRL) for Internet certificate authentication. She has loaded the HTTP task on her Domino server and correctly configured
a SSL keyring from a public Internet certificate authority. What is the next missing component required to make this function correctly?
A. The server must be running the CRL task
B. The server must be running the CRL WebSphere plugin
C. The server must be using a Domino ICL database for certificates
D. The server must be using a Domino server-based certification authority for issuing Internet certificates instead of a public authority
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved