How does Alan configure Domino to listen to a specific address?
Alan has specified multiple Notes network ports available to TCP/IP on the Domino server. By default, all TCP/IP-based services on a Domino server listen for network connections on all NICs and on all configured IP addresses on the server. How does Alan configure Domino to listen to a specific address?
Which of the following prompts will the user receive?
The ADC prompting is disabled but the Send to IBM option is enabled. Which of the following prompts will the user receive?
Which of the following server commands will obtain this information?
Marion is having issues with a particular Lotus Traveler user and needs to obtain all information about the user to a file. Which of the following server commands will obtain this information?
What two canonical name components are required when registering new users?
What two canonical name components are required when registering new users?
What is the lowest level of rights in the Domino Directory ACL to allow the creation of groups?
What is the lowest level of rights in the Domino Directory ACL to allow the creation of groups?
Before deleting a vault configuration, which of the following steps must be performed?
As a vault administrator, you have the rights to delete the ID vault. Before deleting a vault configuration, which of the following steps must be performed?
What is the issued Certificate list (ICL)?
What is the issued Certificate list (ICL)?
When that database is replicated locally, information about the group membership of the person doing the repli
Paul has configured a database to Enforce a Consistent Access Control List. When that database is replicated locally, information about the group membership of the person doing the replication is stored in what location?
When is the vault replica created?
The ID vault may be replicated to other Domino servers. You initiate the request to create a new vault replica utilizing the ID Vaults – Manage tool. When is the vault replica created?
Which of the following is the most secure way to allow this user Notes acccess?
Jack wishes to give a user from another organization access to applications on his primary application server. Which of the following is the most secure way to allow this user Notes acccess?