Which of the followingfields only exists when configuring a roaming user with a roaming policy setting document?
A. Roaming server
B. Roaming directory
C. Keep ID in address book
D. Customize text for the first user dialog box
Xavier has recently created a security policy that forces users to change their Notes password the first time they use the client. However, existing users are not being forced to do so. What is the cause of this?
A. The policywas not assigned during registration.
B. The user has already changed their Notes password.
C. The policy does not have a forced password length.
D. The user has logged in from the Web using HTTP first.
Donald has configured a mail setting policy to prohibit iNotes users from changing the mail file owner field. How is this policy applied to iNotes users?
A. The policy is applied through the ADMINP task.
B. The policy is applied by the Dynamic Client Configuration process.
C. The policy is applied the first time the users authenticate using HTTP.
D. Donald must restart the HTTP task and restart the router on the user's mail server.
Your corporation has a security requirement that Microsoft Office documents may not contain macros. Lotus Symphony is the company standard for opening these documents. Which of the following is the best choice for restricting macros from being run by users?
A. Disable macros in a security settings document
B. Apply a default Lotus Symphony settings document
C. Enable the macros filter in the desktop settings document
D. Select to disable the use of macros in a Lotus Symphony settings document
Mike needs to determine how a set of new policies will affect his users. What can Mike use to determine the effect of the new policies on his users?
A. Log in as a user and see whatpolicies have changed.
B. Open the user view in the Domino Administrator client, select a user, and choose Actions - Show User Policies.
C. From the Basics tab of the Access Control List, click Effective Access.
D. Use the Policy Synopsis tool from thePeople view in the Domino Administrator client.
Gavin has created an Organization Unit policy for */Marketing/ABC. In this policy he placed a security settings document that specified that the password quality should be 10. However, people in this
Organizational Unit are only being required to have a password quality of 7. What is the cause for this discrepancy?
A. The password quality cannot go above 9 and will reset to the default of 7 for users.
B. The parent Organization policy specifies the password quality of 7 and has it set to enforce.
C. The parent Organization policy specifies the password quality of 8 and has it set to inherit.
D. Users are manually changing their password quality in their user.id files and restricting updates from the policy.
When deploying Lotus Traveler to your users without a policy in place, which of the following occurs to the end user mobile device?
A. The built-in defaults are utilized
B. The user functions with no policy settings in place
C. The device will not launch until a policy is assigned
D. The user will not be able to download and install Lotus Traveler until policies are created
Airis, the Domino administrator, has assigned an explicit policy to a user. This policy has alternate values for the same settings documents as the organizational policy. What is the result of this action?
A. The settings from the fields will cancel each other out and no value will be applied.
B. The organizational policy always overrides conflicting values with explicit policies.
C. The explicit policy always overrides conflicting values with organizational policies.
D. The administrator will receive an error when she tries to apply both polices to the user warning her of the conflict between the policies.
The network team has asked Diana to change the SSL port on a Domino server providing SSL web access. Where would Diana change the port configuration? Note: Diana is using Internet Sites.
A. Inthe notes.ini
B. Rerun the Domino setup wizard
C. In the server configuration document
D. On the server document under Port ->Internet Ports
Wallace is attempting to alter the roles assigned in a database. However, when he opens the Access Control List for that database, he does not see any reference to roles. Which of the following is the cause?
A. Heis not listed as Manager of the database
B. He does not have the appropriate form rights
C. He is not listed as Designer of the database
D. He does not have the appropriate folder rights
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only IBM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your C2040-925 exam preparations and IBM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.