Page 1

LOT-755

IBM Lotus Notes Domino 7 Implementing and Administering Security Exam: LOT-755 Demo Edition

CERT MAGIC 1

http://www.certmagic.com


LOT-755

QUESTION: 1 Erika is configuring the initial Domino server for her organization. Her goal is to restrict users from modifying any attributes of the Workstation ECL, but she is yet to create the Administration ECL for the domain. What settings will the client receive until an Administration ECL is created? A. The Workstation ECL cannot be created and a warning is issued upon client setup to that effect. The client configuration will not continue until a default Administration ECL is defined B. The Workstation ECL remains blank until an Administration ECL for the domain is created and saved C. The Workstation ECL is created with default settings that define the Administration ECL until one is manually created and saved D. The Workstation ECL is created with default settings that are built into the Notes client

Answer: D

QUESTION: 2 If active content on a Lotus Notes client attempts an action that is not enabled for the signer, or if the signer is not listed in the ECL, Notes generates which of the following? A. NSR B. DAA C. ESA D. NCA

Answer: C

QUESTION: 3 Elliott has proceeded to enable extended access to the Domino Directory in his domain. However, after enabling extended access he found that anonymous searches via LDAP has stopped functioning. Which of the following describes the cause of this issue?

A. You may not enable extended access for a Domino Directory on any server running LDAP or HTTP B. Anonymous access via LDAP is not supported while extended access is enabled and Anonymous must be set to 'No Access' C. Enabling extended access disables access to Domino over the LDAP protocol

2

http://www.certmagic.com


LOT-755

D. Anonymous must be provided Reader of higher rights in the Domino Directory ACL manually

Answer: B

QUESTION: 4 Gayle was responsible for creating security policy settings documents for her organization. After Gayle moved to a different company, her former organization was having trouble with policies being applied in unexpected areas and not working properly in other areas of the organization. You are now responsible for sorting out the structure of the security policy settings. Which of the following represents the order in which a policy setting would be applied to a user in order, from the lowest to highest priority?

A. Exception policy,Explicit policy with setting from parent, Explicit policy with setting from parent Organization B. Explicit policy with enforced settings from parent, Organizational policy with enforced settings and Exception policy C. Organizational policy with settings from child, Organization policy with setting from parent andExplicit policy with setting from child D. Organizational Policy with settings from parent,Explicit policy with settings from parent and Explicit policy with enforced settings from parent

Answer: D

QUESTION: 5 Ben, the Domino administrator, has configured SSL on his Domino server. Both HTTP and SMTP function correctly. However, IMAP users with Outlook clients cannot utilize the SSL certificate. Which of the following describes the reason?

A. SSL requires an additional certificate for IMAP B. SSL for IMAP is not enabled on the ports tab of the server document C. SSL does not apply to the IMAP protocol D. SSL does not work Outlook over the IMAP protocol, only for Domino Access for Microsoft Outlook

Answer: B

3

http://www.certmagic.com


LOT-755

QUESTION: 6 Scott has decided that the Domino sever he administrates should require client certificates across SSL for web access. What effect does enabling this option provide?

A. It will identify Internet users B. It will track the DNS name a client uses when accessing the Domino server C. It will require users to enter their full hierarchical name for authentication D. It will force users to enter a more secure Internet password

Answer: A

QUESTION: 7 A major manufacturer of automobiles announced that it was going to lay off 2000 employees. The Domino administrator configured a time-stamped list identifying rescinded Internet certificates. What is the name for this list?

A. Certificate Revocation List B. Issued Certificate List C. Certificate Retract List D. Terminated Certificate List

Answer: A

QUESTION: 8 A new corporate security policy has been mandated for all users on Lotus Notes, that passwords must be changed every 45 days. You are responsible for enforcing the new security policy. After creating the necessary security policy document that applies to the entire Organization, some users are getting locked out of their Notes id files after the first 45 day cycle occurs. Which of the following best explains the reason for users getting locked out of their id files? A. The users' Internet password does not match their Notes id password and security policies that enforce password change must also have the Internet and Notes password synchronized B. The grace period is set to the default for the security policy document and users have passed the default C. The users affected have their user id filed placed on Smartcards and a PIN number assigned

4

http://www.certmagic.com


LOT-755

D. The users' new password did not meet the password length criteria assigned by the security policy

Answer: C

QUESTION: 9 The password key width of a Notes id file is used to control which of the following? A. The minimum number of characters that a user must provide for a new password B. The minimum quality that a user must match for a new password C. The length of time an id is valid before recertification is required D. The encryption key that protects the Notes keysthat are stored in the user ID

Answer: D

QUESTION: 10 The size of a SSL session key is determined by which of the following?

A. The cipher being used B. The user password strength C. The expiration of the public key presented by the connecting host D. The creation date of the SSL certificate

Answer: A

QUESTION: 11 Kathleen has generated an ECL refresh for user's workstations. Which of the following entries must be entered into the Administration ECL to allow users to export data and allow access to network resources under their own name?

A. <ECLOwner> B. <WorkstationManager> C. <OSAdmin> D. <LocalAdministrator>

Answer: A

5

http://www.certmagic.com


LOT-755

QUESTION: 12 You, as the Domino administrator, have defined a password quality restriction of 1 for a user id file. Which of the following best describes what is required from the user when changing his or her password?

A. Special characters are required B. An alphanumeric string is required C. No password is required D. Any password is required

Answer: D

QUESTION: 13 The server console is currently secured with a password. Which of the following commands will change the current console password to a new password? A. Change Secure new current B. Secure -change current new C. Set Secure current new D. Set Secure -change new current

Answer: C

QUESTION: 14 As a user, you receive HTML mail regularly that prompts you to retrieve certificates when certain portions require it. However, you would like to trust numerous customer sites in advance of receiving their emails. Which of the following provides the best way to accomplish this?

A. Manually enter the name of each site into your personal address book B. In User Security, retrieve Internet security certificates from each server over whatever port is required C. Open you Domino Directory for your domain and import all the cross-certificates into your personal address book D. Send out a certificate request email to each site and use Actions-Accept Certificate from your in-box for each email returned containing a certificate attached

Answer: B

6

http://www.certmagic.com


LOT-755

QUESTION: 15 To tighten security on Web access, your company has investigated implementing browser cache management for your Domino Web Access users and you have enabled all options. As part of the policy, users who have not, or refuse to install the browser cache management onto the machine they are using for Domino Web Access cannot perform which of the following?

A. Delete mail or place mail in folders B. Add or access e-mail attachments C. Access any mail over Domino Web Access D. Create new e-mail messages, only read

Answer: B

QUESTION: 16 Your Domino server providing inbound SMTP services advertises itself with a STARTTLS command when connections from remote servers are made. The TCP/IP port for SMTP is set to Negotiated and Name-and-password authentication for the port is set to the installation default. A connecting server issues a STARTTLS command in response to your server advertising acceptance of TLS. What port is the SMTP traffic directed to?

A. 989 B. 25 C. 465 D. 636

Answer: B

QUESTION: 17 A password strength requirement of 15 has been established by Kathleen. What would she have gained in password strength by making the minimum 16 instead?

A. Sixteen-character length passwords cannot be stored in the user's id file and are stored encrypted in the Domino Directory B. Sixteen-character length passwords may not contain any part of a user's name C. Sixteen-character length passwords are generated using hexadecimals only

7

http://www.certmagic.com


LOT-755

D. Sixteen-character length passwords force the users to enter a new password at an interval the administrator configures

Answer: C

QUESTION: 18 You have been assigned the ability of Full Access Administrator to a server. However, one database contains information that cannot be seen by you. You have checked the database and it is not encrypted. Which of the following would be the most likely cause why you do not have access to the database information?

A. The database has 'Enforce a Consistent ACL' enabled B. The server is in another Organizational certifier than your id C. The data has reader and author fields assigned you are not listed in D. It has been encrypted with a secret key you have not imported into your id file

Answer: D

QUESTION: 19 Marcy has a habit of misplacing and forgetting the password for her user.id file. You have provided password recovery services to her numerous times. However, she has called back stating the recovery passwords she had written down from your previous recovery successes no longer works. Which of the following provides the best explanation?

A. You set her person document's recovery attempt field to Disabled B. She recently accepted a new position and was moved to a new organizational unit in the company C. She has exceeded the maximum times a recovery password may be utilized on an id file D. You enabled password synchronization between Notes and Internet passwords via policies

Answer: B

QUESTION: 20 Which of the following identifies the two types of ECLs ?

8

http://www.certmagic.com


LOT-755

A. Public ECL and Personal ECL B. Administrator ECL and User ECL C. Workspace ECL and Limited ECL D. Administration ECL and Workstation ECL

Answer: D

9

http://www.certmagic.com


LOT-755Exam  

CertMagic.com is a place where you can find various types of LOT-755exam certifications preparation material. CertMagic’s full range of stud...

Advertisement
Read more
Read more
Similar to
Popular now
Just for you