How does the Protected Groups feature work?
A. The defined group(s) will be protected from receiving mail with attachments.
B. The defined group(s) cannot be accidentally deleted from the user's local directory.
C. The defined group(s) cannot be accidentally deleted from the IBM Domino Directory.
D. The defined group(s) will be protected from mass mailings originating from their home server.
An administrator would like to secure internet passwords in his IBM Domino environment. Which feature can the administrator implement to secure access to internet passwords stored in the Domino Directory?
A. Use the ACL.
B. Configure an internet site.
C. Enforce internet password expiration.
D. Use the more secure internet password format.
What security feature protects user workstations against active content from unknown or suspect sources?
A. policies
B. Access Control List
C. notes.ini parameters
D. Execution Control List
Which Programmability Restriction grants the highest level of access?
A. Run simple and formula agents
B. Sign agents to run on behalf of someone else
C. Sign or run unrestricted methods and operations
D. Sign or run unrestricted methods and operations with full administration rights
What task has to be running in order to be able to register users using the CA process?
A. Monitoring
B. Registration
C. Certificate Authority
D. Administration Process
Where is the display name portion of a sender's SMTP e-mail address set?
A. This is assigned in the mail settings policy.
B. This is assigned in email preferences in the IBM Notes client.
C. This is assigned by the "RFC822 phrase handling" setting in the user's Location document.
D. This is assigned by the "RFC822 phrase handling" setting on the Configuration Settings document of the server.
Craig has noticed a lot of incoming unsolicited e-mail is being generated from IP addresses beginning with the numbers 214.132.55. What should the entry in the "Deny connections from the following SMTP internet hostnames/IP addresses" field in the server's Configuration document be to prevent all of these IP addresses from connecting?
A. [214.132.55.*]
B. 214.132.55.0/24
C. 214.132.55.0...214.132.55.255
D. [214.132.55.0-214.132.55.255]
Greg is enabling Message tracking for server1/Renovations in the Configuration settings document. Which entry should Greg include in the "Don't track messages for" field?
A. ISpy on server1
B. SMTP on server1
C. NRPC on server1
D. MTSTORE on server1
Alex would like to configure a new Mail Policy. How would a Mail policy settings document help him?
A. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Mail only.
B. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Calendaring and Scheduling only.
C. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Mail, Calendaring and Scheduling.
D. A Mail policy settings document will provide a mechanism for setting and enforcing IBM Notes and Web Mail policies and configuring POP3 and SMTP Mail services.
The managed mail replica is intended to be used as an abstraction of the user's server-based mail file. When the user performs mail commands, the Local replica is used. How would the user specifically open the server replica?
A. Click on the Mail shortcut button.
B. Right-Click the Mail icon and select "Open Server Replica".
C. Double-click the desktop icon that reflects the server replica.
D. Selecting File > Open > Notes Application, then browsing to the desired server and replica.