Sie sind auf Seite 1von 45

190-510

Domino R5 Designer Fundamentals


Version 1.0

QUESTION NO: 1
Lilly has created a form that contains a field of Authors data type. The Role
[Manager] is listed in the Authors field. Arthur is a reader in the ACL of the
database that contains this form and is assigned the [Manager] Role.
What can Arthur do with documents created from this form?
A. Read documents only since his ACL is Reader.
B. Edit all documents created from any form within this database.
C. Edit documents created from this form by other users and only read all other
documents within the database.
D. Edit and delete documents created from this form and only read other documents
within this database.
Answer: A
QUESTION NO: 2
Kristy created a database with several views. Her default view has a read access list
limiting use of the view to only some of the database users.
What will happen when users restricted from using the view open the database for
the first time?
A. Users will be prompted to choose an alternative view.
B. Users will see a view other than the default view.
C. Users will not be able to open the database.
D. Users will see the view even though they aren't included in the read access list.
Answer: C
QUESTION NO: 3
There are both Web browser users and Notes client users at Adam's company. He

wants to allow Web browser users to access an application, but not allow access by
Notes client users.
Which one of the following would he assign in the ACL?
A. No Access to Anonymous, and no entry for -Default.
B. Reader access -Default-, and No Access to Anonymous.
C. Reader access to -Default-, and no entry for Anonymous.
D. No Access to -Default-, and Reader access to Anonymous.
Answer: D

QUESTION NO: 4
Henry wanted to use the Groups and Roles dialog box to find out why Lisa, a
content creator, is unable to author documents in an application. However, the
dialog box was NOT available.
Doing which of the following allows the dialog box to appear?
A. Enforcing local encryption.
B. Enforcing a consistent ACL.
C. Placing Lisa's name in a role.
D. Increasing Henry's ACL access level to Manager.
Answer: D
QUESTION NO: 5
Ronny has submitted some technical support QUESTION NO:s to the STS company on their
Web site. After 24 hours he goes to the STS folder on the site and reviews feedback.
When he selects the folder, he receives a message that he is not authorized to access.
However, he authenticated using and SSL Client Certificate and has Author access

in the database.
Why can't Ronny open the folder?
A. He needs Editor access or higher.
B. He needs to be added to the folder Read Access list.
C. He needs to be added to the Directly Link Access list.
D. He needs to be added to the View Read Access list.
Answer: C
QUESTION NO: 6
Which one of the following access levels does Erhard need to create Roles in the
ACL?
A. Author
B. Manager
C. Designer
D. RoleCreator
Answer: B
QUESTION NO: 7
APP1. NSF needs to replicate between two servers. ServerA should only be able to
add and modify information in ServerB's replica copy of APP1. NSF. ServerB
should be able to pull new and modified information from ServerA's replica copy of
APP1. NSF, but should not be able to write new or modified information to
ServerA's copy. This is not happening.
Which one of the following levels of access should each server have?
A. ServerA should have Author access to APP1.NSF on ServerB.
ServerB should have Reader access to APP1. NSF on ServerA.
B. ServerA should have Editor access to APP1.NSF on ServerB.

ServerB should have reader access to APP1. NSF on ServerA.


C. ServerA should have Manager access to APP1. NSF on ServerB.
ServerB should have Reader access to APP1. NSF on ServerA.
D. ServerA should have Editor access to APP1.NSF on ServerB.
ServerB should have Depositor access to APP1. NSF on Server A.
Answer: B
QUESTION NO: 8
Which one of the following does this formula do when it is in a form action?
@MailSend("User1";"";"";" Urgent meeting";" Please
attend";"")
A. Sends a memo containing a subject and a copy to User1.
B. Sends a memo containing two body field entries to Use1.
C. Sends a memo containing a subject and a remark to User1.
D. Sends a memo with the document attached as a document link.
Answer: C
QUESTION NO: 9
What is the minimum level in the Access Control List that Larry can assign users
who must run a shared agent in the Certpaper Sales database?
A. Designer
B. Reader
C. Author
D. Depositor
Answer: B
QUESTION NO: 10
Ivy, the database manager, has not selected the Create personal folders/views option

for Olga, an Author in the database ACL.


Which one of the following statements describes how Olga is affected?
A. She cannot create any personal folders or views.
B. She can create personal folders, but not personal views.
C. She can create personal folders and views which are stored locally.
D. He can create personal folders and views which are stored on the server.
Answer: C
QUESTION NO: 11
Hannibal wants to protect the HTML and graphics files used in his Web site
application.
Which one of the following will work?
A. Enforcing ECLs.
B. Enforcing consistent ACLs.
C. Creating File Protection documents.
D. This cannot be done using Notes and Domino.
Answer: C
QUESTION NO: 12
Rene created a form read access list for a form in his web-enabled database.
Which is true about his form read access list when users access the database via the
web?
A. Web users not listed in the form read access list will not be able to open
documents created with that form.
B. Form read access lists are not supported when databases are accessed via the web.
C. Web users will see links to documents that they cannot access.
D. Anonymous users will see the documents regardless of the form read access list.

Answer: A
QUESTION NO: 13
Jean Philip has set up SSL for the "Appointment" database and SSL is set up on the
Domino Server. He has also selected "Maximum Internet name & password access"
in the ACL Advanced settings as Reader. The group "Road Sales" is Editor in the
ACL. Default is Author. Some of the members of "Road Sales" connect to the
database through a Web client. The Web users authenticate using SSL Client
certificates.
What level of access will they have in the database?
A. No access
B. Reader
C. Editor
D. Author
Answer: C
QUESTION NO: 14
Ed has created an access controlled section and has placed a sign-enabled field
within this section.
Which applies to the signature?
A. The signature applies to the entire document and is generated when the document
is mailed.
B. The signature applies only to the section and is generated when the document is
mailed.
C. The signature applies to the section and the document.
D. The signature applies only to the section and is generated when the document is
saved.

Answer: D
QUESTION NO: 15
Which is a true statement regarding acceptable names that can be placed in the
ACL?
A. Wildcard characters (*) can be used in the ACL, except in the organizational unit
components of a name.
B. You can add to an ACL the names of any individuals with certified Notes user
IDs.
C. Hierarchical naming cannot be used in the ACL.
D. User, server, and group names can be added to the ACL but database replica IDs
are not an acceptable entry in the ACL.
Answer: B
QUESTION NO: 16
Harry would like approval of vacation requests to bear his signature when the
document is mailed back to the person requesting vacation.
What does the form need to contain in order to have an electronic signature
attached to the document when mailed?
A. The reserved field "MailOption".
B. One sign-enabled field only.
C. Access controlled section.
D. A minimum of one sign-enabled field and a SendTo field.
Answer: D
QUESTION NO: 17
Lars has a workflow application and would like to set up distribution of the
information through a form that employs automatic e-mailing. His users are

primarily remote.
Which is a reason why he would have chosen this method over a central shared
database?
A. Replication is faster.
B. Remote users only need access to mail instead of accessing a remote database.
C. Requires less disk space.
D. Workflow always takes less time.
Answer: B
QUESTION NO: 18
Elvis does not see the salary documents in the Employee Personnel view.
What list does Elvis need to be a member of to see these documents?
A. View Access List
B. Form Read Access List
C. Form Create Access List
D. Database Access Control List
Answer: B
QUESTION NO: 19
Sven created a form read access list for a form in his web-enabled database.
Which is true about his form read access list when users access the database via the
web?
A. Web users not listed in the form read access list will not be able to open
documents created with that form.
B. Form read access lists are not supported when databases are accessed via the web.
C. Web users will see links to documents that they cannot access.
D. Anonymous users will see documents regardless of the form read access list.

Answer: A

QUESTION NO: 20
Boris has chosen to use individual mail databases in his workflow application
because his users are remote and this will allow remote users to access mail instead
of a remote database.
Which is true regarding this workflow application method?
A. Workflow process will be quicker.
B. Forms must be stored with the documents that are sent and replication times may
be longer due to increased document size.
C. Requires less disk space than a central database.
D. Forms do not have to be stored with documents that are sent.
Answer: B
QUESTION NO: 21
Christine has documents created from the Sales form that have read restricted
access.
Which could be the reason for these documents not replicating?
A. A readers field exists on the form that does not list the server name that these
documents should replicate to.
B. An authors field exist on the form that does not list the server name that these
documents should replicate to.
C. The server name is listed in the Readers field of the Sales form.
D. The server name appears in the forms Read Access List
Answer: A
QUESTION NO: 22

Sansa has been given Depositor access in the ACL of the Products database and she
has Editor access as a member of a Group.
Which will Sansa be able to do within Products database?
A. Create documents.
B. Create and edit all documents.
C. Create documents and edit her own documents.
D. Read only
Answer: A

QUESTION NO: 23
Alexander has chosen to use individual mail database in his workflow application
because his users are remote and this will allow remote users to access mail instead
of a remote database.
Which is true regarding this workflow application method?
A. Workflow process will be quicker.
B. Forms must be stored with the documents that are sent and replication times may
be longer due to increased document size.
C. Requires less disk space than a central database.
D. Forms do not have to be stored with documents that are sent.
Answer: B
QUESTION NO: 24
Merlin has Author access in the database ACL but he has been unable to create
documents from the Expense form in the database.
Which would cause this problem?
A. Merlin is not listed in the View Access list of the database.

B. Merlin needs a minimum access level of Editor to create documents from any
form.
C. Merlin is not listed in the access list for the form in the database.
D. Merlin's name is listed in the Readers field of the form thus he is only able to read
the document.
Answer: C
QUESTION NO: 25
Which is a true statement regarding the user of Roles?
A. It's easier to add or delete names to a Role than to give access to individual
names.
B. A Role is specific to multiple databases.
C. A database can contain up to 70 Roles.
D. Roles are created in the Domino Directory.
Answer: A
QUESTION NO: 26
Christine is a member of the Sales group with Reader access and she is a member of
the Payroll group with Editor access.

Which can she do?


A. Modify all database design elements.
B. Modify the database ACL.
C. Modify replication settings.
D. Create documents and edit all documents.
Answer: D
QUESTION NO: 27

A workflow application was created to distribute information to both Notes users


and Web users. When using a Web browser, Ann cannot see a Send Mail action that
Notes users can see.
Which one of the following explains why she cannot see this?
A. Ann's browser does not support Java.
B. Web users cannot see system actions in menus.
C. Ann has Reader access to the application.
D. Web users cannot participate in Domino workflow applications.
Answer: B
QUESTION NO: 28
Joe would like to protect Notes data that is being accessed via the Web. He would
like to enforce encryption of Web transactions.
Which should he do to accomplish this?
A. TCP/IP
B. SSL
C. Set "Maximum Internet name-and-password" rights in the ACL.
D. IIOP
Answer: B
QUESTION NO: 29
Documents mailed from APP2. NSF are routing too soon.
Which one of the following is a possible reason?
A. Serial distribution is taking place.
B. A SendTo field has been placed at the top of the form.
C. A MailOptions field has been placed at the top of the form.
D. Both a SendTo field and a MailOptions field have been placed on the form.

Answer: C
QUESTION NO: 30
What reserved field name should Miriam use when designing a field on a form
containing encryption keys with which users will encrypt documents they create
from this form?
A. DefaultEncryptionKeys
B. SecretEncryptionKeys
C. EncryptionKeys
D. SecretKeys
Answer: B
QUESTION NO: 31
Mona has built an action containing "Command[ MailForward]. This action is used
to forward the current document.
Which condition(s) must exist for this action to work?
A. The document can only be in edit mode or selected in a view.
B. A document must be open in Read or Edit mode, or selected in a view or folder.
C. The action will only work for a document opened in Read mode.
D. The action will only work for a document opened in Edit mode or selected in a
view.
Answer: B
QUESTION NO: 32
Curt would like to create a field in his new form that will display the date and time a
document was last edited or read. The form does not contain an Authors field.
Which can be used in a field formula for this purpose?

A. @Modified
B. @Accessed
C. @Created
D. $UpdatedBy
Answer: B
QUESTION NO: 33
If an Author field is added to a document, but is left blank, who can edit the
document?
A. Reader
B. Author'
C. Editor
D. Depositor
Answer: C
QUESTION NO: 34
Sherry would like to require users to access a database using a secure SSL
connection.
How is this accomplished?
A. Database ACL
B. Database ECL
C. Database properties
D. TCP/IP
Answer: C
QUESTION NO: 35
In a database's ACL, Bertha is allowed to create LotusScript agents and Java
agents. However, the agent she wrote did NOT run.

Which of the following determines whether or not she can run the agent on the
server?
A. Agent Manager
B. NOTES. INI file
C. Server document
D. Her ACL access to the server.
Answer: C
QUESTION NO: 36
Humphrey has chosen to use individual mail databases in his workflow application
because his users are remote and this will allow remote uses to access mail instead of
a remote database.
Which is true regarding this workflow application method?
A. Workflow process will be quicker.
B. Forms must be stored with the documents that are sent and replication times may be longer due to
increased document size.
C. Requires less disk space than a central database.
D. Forms do not have to be stored with documents that are sent.
Answer: B
QUESTION NO: 37
David wants to automatically mail his document only if it has never been saved.
Which of the following @ Functions can be used with @If and @Mailsend to
produce a Boolean to conditionally send the document?
A. @IsDocBeingSaved
B. @IsNewDoc
C. @IsNewDoc
D. @Matches

Answer: B
QUESTION NO: 38
Which one of the following correctly identifies the difference between document
encryption and mail encryption?
A. Document encryption uses an encryption key.
Mail encryption uses the recipient's public and private keys.
B. Document encryption uses the public key and private key of the Editor.
Mail encryption uses an encryption key.
C. Document encryption uses the private key of a designated user.
Mail encryption does not work over the Internet.
D. Document encryption uses the developer's public key.
Mail encryption uses the sender's public key and the recipient's private key.
Answer: A
QUESTION NO: 39
Rodney set up encryption for the CurrentSalary field of the Salary History form in
the HR database. Rodney has web enabled his database.
Which is true regarding how this will work for Web users?
A. Field encryption is not supported over the Web.
B. Users do not have encryption keys when using basic authentication and therefore
no Web users can see encrypted information.
C. Web authentication allows users who were mailed the keys see the information
and prevents users who were not mauled the keys from seeing encrypted fields.
D. No users can access documents with encrypted fields via the web.
Answer: A
QUESTION NO: 40

What can Bob do to keep the "Purchase" form from being available to certain users
when they select the Create menu?
A. Create a View access list
B. Database ACL
C. Form access list
D. Read access list
Answer: C
QUESTION NO: 41
If an Author field is added to a document, but it is left blank, who can edit the
document?
A. Reader
B. Author
C. Editor
D. Depositor
Answer: C
QUESTION NO: 42
Bojan created a form read access list for a form in his web-enabled databases.
Which is true about his form read access list when users access the database via the
web?
A. Web users not listed in the form read access list will not be able to open
documents created with that form.
B. Form read access lists are not supported when databases are accessed via the web.
C. Web users will see links to documents that they cannot access.
D. Anonymous users will see the documents regardless of the form read access list.
Answer: A

QUESTION NO: 43
Jean Pierre us using mail encryption on documents that are being routed to other
members of his team.
Which one of the following keys is used to decrypt the documents?
A. Jean Pierre's private key
B. Server's private key
C. Recipient's public key
D. Recipient's private key
Answer: D
QUESTION NO: 44
At which one of the following times is the password quality-checking level enforced?
A. Immediately
B. When users are assigned new passwords.
C. When users use their IDs for the first time.
D. When users change their passwords on existing Ids.
Answer: D
QUESTION NO: 45
Due to the privacy of employees, John wants the documents created with the Salary
form to only display in the Salary view. To make the view available to s select group
John created a View Access List.
Which best describes what access users will have?
A. Only users in the View Access List can read the documents.
B. Users cannot see the Salary View unless they are in the View Access List and
have Editor Access.
C. Users in the View Access list can see the documents but other users can create a

private view with SELECT @ALL and see the salary documents.
D. All users will have the Salary view but only see the documents they created.
Answer: C
QUESTION NO: 46
Which one of the following access levels does Rene need to create Roles in the ACL?
A. Author
B. Manager
C. Designer
D. RoleCreator
Answer: B

QUESTION NO: 47
Once a user has authenticated with the Domino Server and passed through the
server's access list, what is then ext line of security?
A. Workstation ECL
B. Group Security
C. Authentication
D. Database ACL
Answer: D
QUESTION NO: 48
To keep salary information in a Human Resources application confidential, Mark,
the developer, created a single view for the application. Only those people who had
the [Managers] role were allowed access to the view. Still, salary information
become public.
Which one of the following may have happened?

A. Users created personal views.


B. Users created personal agents.
C. The view index become corrupted.
D. Private encryption keys were mailed to users.
Answer: A
QUESTION NO: 49
Vera opened the employee profile document for Ronald and the salary field is blank.
Which describes the field security in use?
A. Secure Sockets Layer
B. Readers Field
C. Password Fields
D. Encryption
Answer: D
QUESTION NO: 50
Users need to modify and add documents to the Projects. nsf database on the
STSAtlanta server. The STSAtlanta server needs to be able to push these additions
and modifications of documents to the STSBirmingham server.
What access level is needed by STSAtlanta to push these changes?

A. Editor
B. Reader
C. Designer
D. Author
Answer: A
QUESTION NO: 51

When should the form property "store form in document" be used?


A. When the database a document is being mailed to does not contain the form the
document was created from.
B. To minimize additional work if the form design should need to be changed in the
future.
C. Conserver memory.
D. Documents created with this form aren't stored as encapsulated databases and
mailed to cc Mail users.
Answer: A
QUESTION NO: 52
Nicole created a computed readers field on the Marketing Report form, which lists
all replicating servers in her organization. She would also like for users to add
names to her readers list by choosing additional readers through the document
properties box.
What field will be automatically created when users define readers through
document properties?
A. DocReaders
B. $DocReaders
C. Readers
D. $Readers
Answer: D
QUESTION NO: 53
Jean Luc has a workflow application where he wants to mail notices of work that
needs to be done on new documents. He would like to send links to these documents
to save time and space.

Which is a simple action that could be used to accomplish this?


A. Send Newsletter summary
B. Mailsend
C. MailOptions field with a value of 1.
D. MailForward
Answer: A
QUESTION NO: 54
Ante has created a workflow application and several of his form shave actions built
within. When creating these actions Ante has selected only the option "Include
action in Action menu".
Which is true regarding this option for Web Users?
A. This option has no relevance to Web users since Web users have no Actions
menu.
B. In order for Web users to have this option in the Action menu their Web browser
must support Java.
C. Web browsers must have Cookies enabled in order to make use of the Action
menu.
D. Web users can never take advantage of Actions created in forms.
Answer: A
QUESTION NO: 55
Lenny is manager of the Employee Photo database on hub server
"Domino 1". If Lenny is responsible for making ACL changes for all replicas of the
database, what must be done in the ACL to ensure proper distribution of the
changes?
A. Lenny must be included in the [ACL Modifier] Role on all replicas of the

database, and be included in the database ACL as Manager.


B. Domino 1 must be given Manager access in the ACL in all replicas of the
database.
C. Lenny must work locally and then replicate his changes with the server copy on
Domino 1.
D. All other servers that accept design changes must be listed as Manager in the ACL
of all replicas.
Answer: B
QUESTION NO: 56
Johnny is adding an Internet user's name to the ACL of APP1. NSF.
Which one of the following should he enter?
A. Anonymous
B. The user's name as it appears in the e-mail address.
C. The first name that appears in the User name field of the Person document.
D. All names that appear in the User name field of the Person document.
Answer: C
QUESTION NO: 57
Kelly has manager access to the Distribution database on the Certpaper West server.
She is responsible for updating the design of framesets, pages, views, forms and the
ACL. While design changes are replicating properly, ACL changes that Kelly makes
are not replicating to the Certpaper East server.
Which is a possible cause of this problem?
A. Kelly doesn't have proper access to change the Database ACL on her replica.
B. The Certpaper West server doesn't have proper access in the ACL of the replica
on the Certpaper East server to propagate ACL changes.

C. The Certpaper East server doesn't have proper access in the ACL of the replica on
the Certpaper West server to accept the ACL changes.
D. ACL changes must be made manually on each Replica because they do not
replicate
Answer: B
QUESTION NO: 58
Which can be used to secure information for Notes clients at the field level?
A. ECL
B. ACL
C. Encryption
D. Roles
Answer: C
QUESTION NO: 59
Sauron is creating a workflow application and he would like to set up his mailenabled
forms so that when a document is saved it is automatically mailed.
Which is the reserved field name that will accomplish this?
A. Sign
B. MailFormat
C. MailOptions
D. SaveOptions

Answer: C
QUESTION NO: 60
If an Author field is added to a document, but it is left blank, who can edit the
document?

E. Reader
F. Author
G. Editor
H. Depositor
Answer: C
QUESTION NO: 61
Marie would like to limit access that Notes developers have to the file systems of
Certpaper 's users.
What can Marie modify that will accomplish this?
A. Workstation ECL
B. Workstation Desktop. dsk
C. Database ACL
D. Notes. ini
Answer: A
QUESTION NO: 62
Jennie would like to create a shared agent that uses a formula to modify documents
in Certpaper 's Accounting database.
What access level must she have?
A. Editor
B. Author
C. Reader
D. Designer
Answer: D
QUESTION NO: 63
Billie wants to force mailing of a document using the reserved MailOptions field.

What value should the formula Billie creates result in?


A. A list of recipients for the document.
B. A Boolean value of 1, causing mail to be sent, or 0, preventing mail from being
sent.
C. An @MailSend formula with options designated recipient, title, subject and any
flags.
D. An @MailSend without parameters.
Answer: B
QUESTION NO: 64
To keep salary information in a Human Resources application confidential, Urban,
the developer, created a single view for the application. Only those people who had
the [Managers] role were allowed access to the view. Still, salary information
become public.
Which one of the following may have happened?
A. Users created personal views.
B. Users created personal agents.
C. The view index become corrupted.
D. Private encryption keys were mailed to users.
Answer: A
QUESTION NO: 65
Vlad created a form read access list for a form in his web-enabled database.
Which is true about this form read access list when users access the database via the
web?
A. Web users not listed in the form read access list will not be able to open
documents created with that form.

B. Form read access lists are not supported when databases are accessed via the web.
C. Web users will see links to documents that they cannot access.
D. Anonymous users will see the documents regardless of the form read access list.
Answer: A
QUESTION NO: 66
Percy is designing a Web application.
Which one of the following will NOT work in that application?
A. ACL
B. Authors field
C. Readers field
D. Encrypted fields

Answer: D
QUESTION NO: 67
Frey is designing a Web application.
Which one of the following will NOT work in that application?
A. ACL
B. Authors field
C. Readers field
D. Encrypted fields
Answer: D
QUESTION NO: 68
The STS database designer has created a form, which will be used by employees to
request vacation. The manager have requested that the form have a signature for
approval and disallow anyone else the ability to sign or modify the approval area on

the form.
Which is needed?
A. Access-controlled section
B. Edit access control list
C. Access control list
D. Roles
Answer: A
QUESTION NO: 69
Bunny wants to prevent users with Author access from editing documents they
create with the "Individual" form in the HR database.
How would she set this up?
A. Create and Authors Field on the form and include the user's name.
B. Create a Readers field on the form and include the user's name.
C. Create an Authors field on the form and do not include the user's name.
D. Put the users in the [Non Editor] Role in the database ACL.
Answer: C
QUESTION NO: 70
What minimum access level is needed in the database ACL in order to encrypt a database?
A. Editor
B. Author
C. Manager
D. Designer
Answer: C
QUESTION NO: 71
Attila has a document which lists the names and numbers of the Sales contacts of

various businesses that the company corresponds with. He would like for the Sales
staff to be able to view these names and numbers but he wants to keep the list from
being printed out.
Which can Attila use to accomplish this?
A. Database ACL
B. Read access list
C. Form access list
D. Execution Control List
Answer: C
QUESTION NO: 72
Gnter has hidden the design of a database.
Which one of the following describes how to re-sign a database with a different ID?
A. This cannot be done.
B. Sign the template and replace the design.
C. Make a copy and replace the design.
This will unhide the design.
D. Create a replica and sign each design element individually.
Answer: B
QUESTION NO: 73
Arnold would like to protect Notes data that is being accessed via the Web. He
would like to enforce encryption of Web transactions.
Which should he do to accomplish this?
A. TCP/IP
B. SSL
C. Set "Maximum Internet name-and-password" rights in the ACL.

D. IIOP
Answer: B
QUESTION NO: 74
Kristy has set up SSL for the "Appointment" database and SSL is set up on the
Domino Server. She has also selected "Maximum Internet name & password access"
in the ACL Advanced settings as Reader.
The group "Road Sales" is Editor in the ACL. Default is Author. Some of the
members of "Read Sales" connect to the database through a Web client. The Web
users authenticate using SSL Client certificates.
What level of access will they have in the database?
A. No access
B. Reader
C. Editor
D. Author
Answer: C
QUESTION NO: 75
Which would be a workflow method that would be time efficient for the users and
make the best use of server disk space?
A. Central shared database; e-mail notices that contain copies of documents that need
to be responded to.
B. Individual mail databases with automated email forms that are stored in
documents.
C. Central shared database; e-mail notices that link to documents.
D. Central shared database; e-mail notices that inform the user of documents that
need a response.

Answer: C
QUESTION NO: 76
Jerry has designed an Expense Reimbursement application.
1. It requires a line manager's electronic signature on the Reimbursement form.
2. He has enabled signing for the Reimbursement field.
3. The field is in an access-controlled section
Which of the following correctly states when the signature will be generated?
A. When the document is saved.
B. When the document is mailed.
C. When the document is edited.
D. When the document is received.
Answer: A
QUESTION NO: 77
John is creating a form that will contain a field that lists all 50 states for users to
make a selection from.
John will be placing the field in a layout region and he does NOT want all 50 states
to display at once, but rather display a box which contains scroll arrows allowing
one to scroll to a specific state.
Which type field is needed?
A. Listbox
B. Dialog list
C. Checkbox
D. Combobox
Answer: A
QUESTION NO: 78

When Dante clicks a button in a Mail memo, a message appears showing options
regarding the execution of the code.
Which one of the following causes the message to appear?
A. ECL
B. ACL
C. SSL
D. Java applet
Answer: B
QUESTION NO: 79
At which one of the following times is the password quality-checking level enforces?
A. Immediately
B. When users are assigned new passwords.
C. When users use their IDs for the first time.
D. When users change their passwords on existing Ids.
Answer: D

QUESTION NO: 80
Jeffrey has created a database that accesses environment variables when several of
the forms in it are opened. Users have complained about getting security warnings
when the open these forms.
What Notes feature is producing these warnings?
A. The Access Control List for the database.
B. The Workstation Execution Control List.
C. The Signature feature of signed sections.
D. The Read Access List for the form.

Answer: B
QUESTION NO: 81
Lisa created a computed readers field on the Marketing Report form, which lists all
replicating servers in her organization. She would also like for users to add names to
her readers list by choosing additional readers through the document properties
box.
What field will be automatically created when users define readers through
document properties?
A. DocReaders
B. $DocReaders
C. Readers
D. $Readers
Answer: D
QUESTION NO: 82
Hans created a form read access list for a form in his web-enabled database.
Which is true about his form read access list when users access the database via the
web?
A. Web users not listed in the form read access list will not be able to open
documents created with that form.
B. Form read access lists are not supported when databases are accessed via the web.
C. Web users will see links to documents that they cannot access.
D. Anonymous users will see the documents regardless of the form read access list.
Answer: A
QUESTION NO: 83

Jenny is mail-enabling a form in her Discount database.


How can she ensure that users will see the document in the correct context when
opening it in databases other than the Discount database?
A. Select the "Disable field exchange" option on the Form properties box basics tab.
B. Select the "Automatically refresh fields" option on the Form properties box basics
tab.
C. Select the "Store Form in Document" option on the Form properties box basics
tab.
D. Select the "Default Database Form" option on the Form properties box basics tab.
Answer: C
QUESTION NO: 84
Arthur has Author access in the database ACL but he has been unable to create
documents from the Expense form in the database.
Which would cause this problem?
A. Arthur is not listed in the View Access list of the database.
B. Arthur needs a minim um access level of editor to create documents from any
form.
C. Arthur is not listed in the access list for the form in the database.
D. Arthur's name is listed in the Readers field of the form thus he is only able to read
the document.
Answer: C
QUESTION NO: 85
Which can be used to secure information for Notes clients at the field level?
A. ECL
B. ACL

C. Encryption
D. Roles
Answer: C
QUESTION NO: 86
At which one of the following times is the password quality-checking level enforced?
A. Immediately
B. When users are assigned new passwords.
C. When users use their IDs for the first time.
D. When users change their passwords on existing Ids.
Answer: D
QUESTION NO: 87
Hans and Greta, two mobile users, are editing different fields in the same document
during a parallel review. The designer set a form property to merge replication
conflicts.
Which one of the following will happen?
A. Edits to each field will be saved in a single document.
B. Edits to both fields will be saved in two identical documents.
C. Edits to both fields will be saved in a single document marked as a replication
conflict.
D. Edits to each field will be saved in two documents one a main document and the
other a response document marked as a replication conflict.
Answer: A
QUESTION NO: 88
Which one of the following describes the difference between a parallel and a serial
review?

A. With serial reviews, the document is routed to each reviewer at the same time.
With parallel reviews, reviewers do not receive e-mail notification.
B. With parallel reviews, the document is routed to each reviewer at the same time.
With serial reviews, every reviewer receives e-mail notification at the same time.
C. With parallel reviews, every reviewer receives e-mail notification at the same
time.
With serial reviews, reviewers receive e-mail notification at different times.
D. With serial reviews, every reviewer receives e-mail notification at the same time.
With parallel reviews, reviewers receive e-mail notification at different times.
Answer: C
QUESTION NO: 89
Ann is creating an application that will have different language version.
Which is the first step to enabling a database for multiple languages?
A. Select the database property "Multilingual Database".
B. Change the language preference setting on the browser.
C. Change the default region located in the database properties.
D. Select the database property "Multilingual Database" and "Index" in multi database indexing.
Answer: A
QUESTION NO: 90
Siw has created a new document using the "Training" form while in the Training
view. After creating her document she is unable to see it but she can see all other
documents in the view.
What is causing this problem?
A. The document is encrypted.
B. Siw is not listed in the View Access List.

C. Siw is not listed in the Form Read Access List.


D. Siw has an ACL of Depositor.
Answer: C
QUESTION NO: 91
Tom has Editor access to the Sales database. The Sales database has a form with a
Readers field, which has been left blank.
What can Tom do with this form and documents created from this form?
A. Tom can create documents with this form and read documents created from the
form, because he has Editor access to the database.
B. Tom will not be able to read any documents created from this form.
C. Create documents using this form, but he will be unable to read any documents
created from this form.
D. Tom will be able to create, read and edit documents from this form.
Answer: D
QUESTION NO: 92
Which is a true statement regarding acceptable names that can be placed in the
ACL?
A. Wildcard characters (*) can be used in the ACL, except in the organizational unit
components of a name.
B. You can add to an ACL the names of any individuals with certified Notes user
IDs.
C. Hierarchical naming cannot be used in the ACL.
D. User, server, and group names can be added to the ACL but database replica IDs
are not an acceptable entry in the ACL.

Answer: B
QUESTION NO: 93
Helga is creating a form with mail options.
Which is a predefined mail field that can be used to let a sunder know that mail has
been delivered?
A. DeliveryReport
B. ReturnReceipt
C. DeliveryPriority
D. MailOptions
Answer: A
QUESTION NO: 94
Annie is using mail encryption on documents that are being routed to other users on
her team.
Which one of the following keys is used to encrypt the documents?
A. Annie's public key.
B. Annie's private key.
C. Recipient's public key.
D. Recipient's private key.
Answer: C
QUESTION NO: 95
What is the minimum ACL to a database needed in order to create a Role?
A. Manager
B. Editor
C. Author
D. Designer

Answer: A
QUESTION NO: 96
Otto has created a form that contains a field for the street address, city, state, and
zip. He only wants these fields to appear when a document is being created and he
doesn't want them to appear any other time, including when printed.
Which hide - when field properties are needed to accomplish this?
A. "Previewed for editing"
B. "Previewed for editing" and "Opened for editing"
C. "Previewed for reading" and "Opened for reading"
D. "Previewed for reading" and "Printing"
Answer: C
QUESTION NO: 97
Which is the correct full syntax for @MailSend?
A. @MailSend( sendTo; copyTo; blindcopyTo; subject;
remark; bodyFields;[Flags])
B. @MailSend( sendTo; copyTo; blindCopyTo; subject;
remark;[flags])
C. @MailSend( sendTo; copyTo; blindcopyTo; subject;
remark; bodyFields;(flaggs)))
D. @MailSend( sendTo; copyTo; subject; remark;
bodyFields;[flags])
Answer: A
QUESTION NO: 98
Ida wants to mail-enable a form in the STS Purchase Request database using
@MailSend without arguments.

What field must exist for this method of mail-enabling to work?


A. SentTo
B. CopyTo
C. MailOptions
D. MailSend
Answer: A
QUESTION NO: 99
Linda is in a group that has Editor access to APP2. NSF. However, she cannot edit
documents.
Which one of the following is a possible reason?
A. She is listed individually as an Editor.
B. She is in a role that limits her access.
C. She is in both an Authors and Readers field.
D. She is in multiple groups, one of which has Reader access.
Answer: B
QUESTION NO: 100
Peter intends to enable a Help Desk workflow application. He plans to add
automatic mailing with multiple stops, including stops for manager approval.
What workflow control feature can Peter include to prevent non-managers from
editing approval sections without preventing them from making changes to the
entire document?
A. Encrypted fields
B. Authors fields
C. Form create access list
D. Controlled Access Sections

Answer: D
QUESTION NO: 101
Sarah is running a shared agent, which updates several fields on new documents in
the Sales database located on the STSServer. Assuming Sarah has appropriate
access in the server document, what access level does Sarah need within the Sales
database to run the agent successfully?
A. Designer
B. Editor
C. Author
D. Reader
Answer: B
QUESTION NO: 102
For which of the following reasons would Richard, a database designer distribute an
encryption key?
A. To allow users to access a locally encrypted database.
B. To allow users to read an encrypted field in his Domino application.
C. To allow mail recipients who have access to his private key to read e-mails he
sends.
D. To allow mail recipients who have access to his public key to read the e-mails he
sends.
Answer: B

QUESTION NO: 103


Lisa has created a form that contains a field of Authors data type. The Role

[Manager] is listed in the Authors field. Merlin is a Reader in the ACL of the
database that contains this form and is assigned the [Manager] Role.
What can Merlin do with documents created from this form?
A. Read documents only since his ACL is Reader.
B. Edit all documents created from any form within this database.
C. Edit documents created from this form by other users and only read all other
documents within the database.
D. Edit and delete documents created from this form and only read other documents
within this database.
Answer: A
QUESTION NO: 104
Ulf has created a role called MIS. How will the Role display in the database ACL?
A. [MIS]
B. MIS
C. (MIS)
D. {MIS}
Answer: A
QUESTION NO: 105
Ivan has moved the mail-in database that employees send their confidential
complains to.
Which must be done so that mail to this database isn't returned to the user?
A. Inform the users where the database has been moved to.
B. Inform the users where the database has been moved to.
C. Modify the Server documents to specify the new location.
D. Use Domino Designer to relocate the database.

Answer: B

Das könnte Ihnen auch gefallen