Exam Details

  • Exam Code
    :C2040-407
  • Exam Name
    :IBM Notes and Domino 9.0 Social Edition System Administration B
  • Certification
    :IBM Certified Advanced Application Developer
  • Vendor
    :IBM
  • Total Questions
    :123 Q&As
  • Last Updated
    :Oct 28, 2024

IBM IBM Certified Advanced Application Developer C2040-407 Questions & Answers

  • Question 1:

    Sam is applying ID encryption. What is the strongest level of ID encryption he can mandate through a policy?

    A. 128-bit RC2

    B. 512-bit AES

    C. 128-bit AES

    D. 256-bit AES

  • Question 2:

    John is a developer and would like to sign an XPage to run on an IBM Domino server. What is the lowest level of access privilege he needs in order for the XPage to run?

    A. Run restricted LotusScript/Java agents.

    B. Sign agents to run on behalf of someone else.

    C. Sign XPages to run on behalf of the builder of the XPage.

    D. Sign agents or XPages to run on behalf of the invoker of the agent.

  • Question 3:

    Which of following feature allows an administrator to enable desktop settings based on a version and type of operating system?

    A. Dynamic policies

    B. How to apply settings

    C. Machine-specific policy settings

    D. Dynamic client configuration

  • Question 4:

    What encryption standard has been introduced in IBM Domino 9.0 Social Edition?

    A. Wired Equivalent Privacy (WEP)

    B. Secure Hash Algorithm (SHA-2)

    C. Advanced Encryption Standard (AES)

    D. Federal Information Processing Standard (FIPS)

  • Question 5:

    Which of following minimum access level must a user have in order to view a database ACL?

    A. Editor

    B. Reader

    C. Author

    D. Manager

  • Question 6:

    When the administrator uses activity logging for replication, IBM Domino generates one activity logging record for each database replication request that a server initiates. Which statement is true regarding record logging?

    A. Only the initial replication activity is logged.

    B. All servers generate activity logging records.

    C. Only the target server generates activity logging records.

    D. Only the initiating server generates activity logging records.

  • Question 7:

    How can a user prevent deleted documents from replicating back into the database after the deletion stubs have been purged?

    A. by creating a policy

    B. by utilizing an access control list

    C. by upgrading the On Disk Structure of the database

    D. by setting the Purge Interval Replication Control option

  • Question 8:

    What would an administrator need to do to prevent spoke servers from replicating certain design element changes to the hub in a hub-and-spoke configuration without deselecting privileges for each user?

    A. Deselect the privilege "Replicate design" in the ACL entry for each spoke server.

    B. Select the privilege "Create shared folders/views" in the ACL entry for each spoke server.

    C. Select the privilege "Create personal folders/views" in the ACL entry for each spoke server.

    D. Deselect the privilege "Create shared folders/views" in the ACL entry for each spoke server.

  • Question 9:

    Which three statements are server requirements for setting up an IBM Domino cluster? (Choose three.)

    A. A server can be a member of only one cluster at a time.

    B. Some servers in a cluster can be on different IBM Notes Named Networks.

    C. Each server in the cluster can either have a hierarchical server ID or a flat ID.

    D. All servers in a cluster must run on the Domino Enterprise server or the Domino Utility server.

    E. All servers in a cluster must be in the same Domino domain but do not have to share a common Domino Directory.

    F. All servers in a cluster must be connected using a high-speed local area network (LAN) or a high-speed wide area network (WAN). A private LAN can also be used for cluster traffic.

  • Question 10:

    Adam has a report from an end user concerning his private folders. Adam has determined that the server has become unavailable and the end user was accessing the failover server. Which statement is true regarding private folders?

    A. Private folders must be flagged in the cluster configuration.

    B. Private folders do replicate to other replicas within the cluster.

    C. Private folders do not replicate to other replicas within the cluster.

    D. The cluster server should be included in the ACL in order to replicate private folders.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C2040-407 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.