What can Mike use to determine the effect of the new policies on his users?
Mike needs to determine how a set of new policies will affect his users. What can Mike use to
determine the effect of the new policies on his users?
Which of the following statements is correct?
Which of the following statements is correct?
Which of the following are required to utilize the names list of a database found in Domino 8?
A user in your domain requires a change to their surname and you have generated the proper
name change request in admin4.nsf. Which of the following are required to utilize the names list of
a database found in Domino 8?
What is the cause for this discrepancy?
Gavin has created an Organization Unit policy for */Marketing/ABC. In this policy he placed a
security settings document that specified that the password quality should be 10. However, people
in this Organizational Unit are only being required to have a password quality of 7. What is the
cause for this discrepancy?
which of the following database objects?
The SELECT privilege is NOT available for which of the following database objects?
Which of the following would allow this action?
Vanessa wishes to control id file downloads from the ID vault by requiring authorization. Which of
the following would allow this action?
How is this policy applied to iNotes users?
Donald has configured a mail setting policy to prohibit iNotes users from changing the mail file
owner field. How is this policy applied to iNotes users?
Which of the following commands can be used to undo operations executed inside a unit of work?
Which of the following commands can be used to undo operations executed inside a unit of work?
which you periodically force the update of new public and private keys stored in server id files?
Which of the following is the name of the process in which you periodically force the update of new
public and private keys stored in server id files?
Which of the following is the best choice for restricting macros from being run by users?
Your corporation has a security requirement that Microsoft Office documents may not contain
macros. Lotus Symphony is the company standard for opening these documents. Which of the
following is the best choice for restricting macros from being run by users?