Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM LOT-841 Exam -

Free LOT-841 Sample Questions:

1. Which of the following can NOT be configured with the security policy settings document?
A. Password synchronization
B. Password recovery options
C. Execution control lists (ECLs)
D. Notes and Internet password settings
Answer: B

2. You are in the middle of the deployment of a Notes client upgrade at a customer site and find that users do not have the required rights on the workstations to utilize the Smart Upgrade feature of Lotus Notes. Which of the following is the best presented option to assist in the deployment?
A. Utilize the SURUNAS.ZIP program to deploy the Smart Upgrade
B. Create a package from the SUSETRUNASWIZARD.EXE program to deploy the Smart Upgrade
C. Manually log into each client machine with proper install rights and start the Smart Upgrade
D. Open the Lotus Notes installation file, ADMININSTALL.dll, and enter the proper credentials to allow users to install via Smart Upgrade
Answer: B

3. A server id file was placed on a Smart Card by Kendra. The following steps were performed.
- The server id file was enabled for id recovery
- The server id file was enabled for the Smart Card
- The reader and the Smart Card were placed on the server
- The server id file embedded with the Smart Card information was placed in the appropriate place on the server
However, after following the steps, she continually received an error stating "Login aborted by user" on the Domino server.
Which of the following is the cause of this error when attempting to enable a Smart Card for Domino servers?
A. Smart Cards are not supported for server id files, only Notes clients
B. The Smart Card cannot contain a server id file created with anything lower than a Domino 6 client
C. The server notes.ini was not properly configured to point to the appropriate Smart Card library file
D. The server id file does not contain a complex password to meet the Smart Card password strength requirements
Answer: C

4. Martin, the Domino administrator, has established a Security Policy document that allows users to change their Internet passwords via HTTP. However, users are still unable to make this change while in Domino Web Access.
Martin has verified the following:
- All users have the security policy correctly applied
- Users have proper rights to the Domino Directory
- Adminp is running correctly on the Domino server
Which of the following best describes the user's inability to change their Internet password?
A. The Domino server requires the DSAPI security filter of nInetPassword to be put in place
B. Domino HTTP does not allow an authenticated user to change their Internet password, only a Notes id password
C. The security tab of the Domino Web Access server document does not have the users in the field to allow modifications of person documents
D. The server configuration document for that server has the option for modification of Internet passwords while in Domino Web Access tab set to disabled
Answer: D

5. Michelle lost her Smartcard while at a customer site. This card contained certain Notes private keys she has shifted to the Smartcard to provide tighter security. Which of the following is the best option for issuing a new Smartcard for her?
A. Have Michelle access all previous applications with a newly created id file to rebuild the private keys
B. Obtain the last Notes id for Michelle from the recovery database for the certifier and create a new Smartcard
C. Perform a name change on another existing user with the same access to Michelle's name, copy all the private keys and rename the user back
D. Enable SmartRecovery on the Domino server and have Michelle reauthenticate. Then push her issued private keys down from the Domino Directory
Answer: B

6. -A Domino\Data \Domino\HTML\Sales directory has been established
-The desire is to limit access to people only listed in the SalesOrg group found in the Domino Directory to these webpages
-A page titled widgets.htm is located in the Domino\Data\Domino\HTML\Sales\Products subdirectory
-A cgi script titled pricing is located in the Domino\Data\Domino\HTML\CGI that is pulled from the widgets.htm page
-The CGI directory allows everyone to utilize the scripts contained there
-The pricing.cgi script accesses images from the Domino\Data\Domino\HTML\Images
-The Domino\Data\Domino\HTML\Images is limited to LocalDomainAdmins and LocalDomainServers only
Jim, a web user in the SalesOrg group, logs in successfully to view the widgets.htm page. When the page comes up, what result will Jim get from the following options?
A. He will be able to view the entire widgets.htm page correctly
B. He will not be able to view any of the widgets.htm page since the image portions are restricted
C. He will be able to see the images only after clicking on the red box placeholders for them on the widgets.htm page
D. He will only be able to see the text on the widgets.htm page and the images will not show due to security restrictions
Answer: A

7. Domino Web Access allows users to receive encrypted mail from other Notes users in the organization. Which of the following is required for the user to read encrypted mail sent to them?
A. They must read the message over SSL and not HTTP
B. They must accept the request to decrypt the mail mesage
C. They must have the sender in their Personal Address Book
D. They must have their Notes id file on the local workstation opening the mail message
Answer: A

8. The Umbrella corporation implemented ID recovery procedures. ID recovery must be performed by more than one person, and they have included the Domino adminsitration team as well as the Chief Security Officer for the company. They wish for Chief Security Officer to be present for all ID recoveries. Where are the names of the people who are allowed to recover IDs stored?
A. The certifier id file
B. The server notes.ini file
C. The user's local notes.ini file
D. The certifier document in the Domino Directory
Answer: A

9. A new corporate security policy has been mandated for all users on Lotus Notes that passwords must be changed every 45 days. You are responsible for forcing the new security policy. After creating the necessary security policy document that applies to the entire Organization, some users are getting locked out of their Notes id files after the first 45 day cycle occurs. Which of the following best explains the reason for users getting locked out of their id files?
A. The grace period is set to the default for the security policy document and users have passed the default
B. The users affected have their user id filed placed on Smartcards and a PIN number assigned
C. The users' new password did not meet the password length criteria assigned by the security policy
D. The users' Internet password does not match their Notes id password and security policies that enforce password change must also have the Internet and Notes password synchronized
Answer: B

10. Barbara wishes to migrate her company's Notes certifier to the new Certificate Authority process. She has chosen to encrypt the certifier id with the server id instead of creating a specific trusted id. What Domino server console command must be issued to secure the certifier?
A. load activate ca <idfile>
B. load ca <password> unlock
C. tell ca activate <password>
D. tell ca unlock <idfile><password>
Answer: C

11. Jeff and Connie are Domino developers sharing the same test server called Dev1/Trans.
-Connie has signed an agent to run on the invoker of the agents behalf. She then attempts to run this agent from her Notes client. The agent fails to run.
-Jeff, shortly after, has signed an identically coded agent to run on behalf of the invoker also. He successfully runs this agent from a test in Internet Explorer.
-The field granting the ability to run agents on behalf of the invoker is blank in the server document
Which of the following explains the reason the agent successfully ran for Jeff and not Connie?
A. Agents set to run on behalf of the invoker cannot run from a Notes client
B. Agents may only be signed to be invoked on behalf of the server itself. Connie did not sign hers in that manner
C. Agents set to run on behalf of the invoker may only be run scheduled. Jeff had established a schedule for his agent
D. Only one agent may be run on any server that is configured to run on behalf of the invoker. By Jeff signing his agent later, it overrides Connie's as the single agent to run of that type
Answer: A

12. Notes users can enable the checking of headlines across databases on a server for items of interest. Which of the following must the administrator perform to restrict the checking of headlines to Administrators only?
A. Place a blank in the allowed to monitor databases field
B. Place an asterisk in the allowed to monitor databases field
C. Place the administrators group in the allowed to use monitors field
D. Place the administrators group in the allowed to use headlines field
Answer: C

13. You have assigned Alicia to be the certificate authority administrator for your Domino domain. As your organization grew, she spends more time than desired in managing the CA process. To assist her, you enable Kendra as a Registration Authority. Of the below rights, which will Kendra be able to perform with her role as Registration Authority by default?
A. Modify certifiers
B. Create certifiers
C. Enforce certificate access
D. Revoke Internet certificates
Answer: D

14. You are attempting to establish SSO in your domain across multiple servers. The time-out for SSO was configured to expire after 45 minutes. The time during which any of your users are logged in via a Web client, defined by a cookie is which of the following?
A. Thread
B. Session
C. Instance
D. Variable
Answer: B

15. Jim, the Domino administrator, wishes to deny access to a server named Mail14 for a user named Randy. Jim also wants to verify that Randy cannot view a list of names that have been denied server access to Mail14.
Which of the following provides that functionality?
A. ID lockout for Randy's id
B. Forced password change for Randy's id
C. Notes ID password recovery for Randy's id
D. "Not access server" field in the Mail14 server document
Answer: A

16. The Domino administrator, Paul, has decided that the Domino servers in his environment should perform a key rollover with a preferred key strength set to default levels. However, he keeps getting errors that the keys cannot be rolled over to 1024 bits at this time. Which of the following is the cause of this error?
A. Server keys may not be rolled over to a key strength greater than 968
B. There is no defined security settings policy document that applies to that server
C. Key rollover must be done in increments and his server keys are still below 630 bits
D. He has also configured that the maximum allowable key strength is 630 bits for servers
Answer: D

17. Security access to a Domino server is configured for Internet protocols outside of HTTP in which of the following locations?
A. The Ports tab of the server document.
B. The Advanced tab of the server document
C. The security tab of the Server document
D. The Internet Protocols tab of the server document
Answer: A

18. Erika is configuring the initial Domino server for her organization. Her goal is to restrict users from modifying any attributes of the Workstation ECL, but she is yet to create the Administration ECL for the domain. What settings will the client receive until an Administration ECL is created?
A. The Workstation ECL is created with default settings that are built into the Notes client
B. The Workstation ECL remains blank until an Administration ECL for the domain is created and saved
C. The Workstation ECL is created with default settings that define the Administration ECL until one is manually created and saved
D. The Workstation ECL cannot be created and a warning is issued upon client setup to that effect. The client configuration will not continue until a default Administration ECL is defined
Answer: A

19. Which of the following lists the proper privilege hierarchy for administrators?
A. Full Access Administrator, Server Administrator, Console Administrator, Administrator
B. Server Administrator, Remote Administrator, Console Administrator, Local Administrator
C. Full Access administrator, Administrator, Full Console Administrator, System Administrator
D. System Administrator, Console Administrator, Local Administrator, Read-only Administrator
Answer: C

20. Key rollover is configured for servers via which of the following?
A. Server document
B. Serverconfig.xml file
C. Server configuration document
D. Security settings policy document
Answer: A

© 2014, All Rights Reserved