Xavier has recently created a security policy that forces users to changetheir Notes password the first time they use the client. However, existing users are not being forced to do so. What is the cause of this?
A. The policy was not assigned during registration.
B. The user has already changed their Notes password.
C. The policy does not have a forced password length.
D. The user has logged in from the Web using HTTP first.
Donald has configured a mailsetting policy to prohibit iNotes users from changing the mail file owner field. How is this policy applied to iNotes users?
A. The policy is applied through the ADMINP task.
B. The policy is applied by the Dynamic Client Configuration process.
C. The policy is applied the first time the users authenticate using HTTP.
D. Donald must restart the HTTP task and restart the router on the user's mail server.
What are the requirements for roaming via policy or Domino?
A. Custom welcome page, password key strength, and roaming user settings
B. Default home page, password key strength, and custompassword policies
C. Default home page, custom welcome page, and enabling use of widgets and live text
D. Custom home page options, automatic diagnostic data collection, and custom password policies
Airis, the Domino administrator, has assigned an explicit policy toa user. This policy has alternate values for the same settings documents as the organizational policy. What is the result of this action?
A. The settings from the fields will cancel each other out and no value will be applied.
B. The organizational policyalways overrides conflicting values with explicit policies.
C. The explicit policy always overrides conflicting values with organizational policies.
D. The administrator will receive an error when she tries to apply both polices to the user warning her
ofthe conflict between the policies.
Whatare the requirements for a roaming policy?
A. Notes 8.5 standard client and Domino 8.5 server
B. Domino 8.x or later server
C. Notes 8.x or later client
D. Domino 8.5 server
Henry created a security settings policy documentfor his organization to lock Internet passwords after a certain number of incorrect attempts. After he verified that the policy was correctly assigned to the users, he found that the lockout was still not functioning. Which of the following next steps should he take to enable this feature?
A. Have each user log in with an incorrect password to enable the feature.
B. Restart the server that offers the HTTP service so that the policy takes effect.
C. Make sure that Internet password locking is enabled in theserver configuration document.
D. Create a test user account and enter incorrect passwords until the lockout takes effect. This then enables it for everyone.
Joe wants to know which policy settings are effective for certainusers and groups within his organization. In which one of the following would he find this information?
A. The policy synopsis
B. The policy report database
C. The policy settings document
D. The policy overview database
Mike needs to determine how a set of new policies will affect his users. What can Mike use to determine the effect of the new policies on his users?
A. Log in as a user and see what policies have changed.
B. Open the user view in the Domino Administrator client, select a user, and choose Actions - Show User Policies.
C. From the Basics tab of the Access Control List, click Effective Access.
D. Use the Policy Synopsis tool from the People view in the Domino Administrator client.
Which policy allows the administrator to configure lock-down settings per field?
A. Mail policy settings document
B. Desktop policy settings document
C. Archive policy settings document
D. Registration policy settings document
Your corporation has a security requirement that Microsoft Office documents may notcontain macros. Lotus Symphony is the company standard for opening these documents. Which of the following is the best choice for restricting macros from being run by users?
A. Disable macros in a security settings document
B. Apply a default Lotus Symphony settings document
C. Enable the macros filter in the desktop settings document
D. Select to disable the use of macros in a Lotus Symphony settings document
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C2040-925 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.