Beruflich Dokumente
Kultur Dokumente
QUESTION NO: 1
Lilly has created a form that contains a field of Authors data type. The Role
[Manager] is listed in the Authors field. Arthur is a reader in the ACL of the
database that contains this form and is assigned the [Manager] Role.
What can Arthur do with documents created from this form?
A. Read documents only since his ACL is Reader.
B. Edit all documents created from any form within this database.
C. Edit documents created from this form by other users and only read all other
documents within the database.
D. Edit and delete documents created from this form and only read other documents
within this database.
Answer: A
QUESTION NO: 2
Kristy created a database with several views. Her default view has a read access list
limiting use of the view to only some of the database users.
What will happen when users restricted from using the view open the database for
the first time?
A. Users will be prompted to choose an alternative view.
B. Users will see a view other than the default view.
C. Users will not be able to open the database.
D. Users will see the view even though they aren't included in the read access list.
Answer: C
QUESTION NO: 3
There are both Web browser users and Notes client users at Adam's company. He
wants to allow Web browser users to access an application, but not allow access by
Notes client users.
Which one of the following would he assign in the ACL?
A. No Access to Anonymous, and no entry for -Default.
B. Reader access -Default-, and No Access to Anonymous.
C. Reader access to -Default-, and no entry for Anonymous.
D. No Access to -Default-, and Reader access to Anonymous.
Answer: D
QUESTION NO: 4
Henry wanted to use the Groups and Roles dialog box to find out why Lisa, a
content creator, is unable to author documents in an application. However, the
dialog box was NOT available.
Doing which of the following allows the dialog box to appear?
A. Enforcing local encryption.
B. Enforcing a consistent ACL.
C. Placing Lisa's name in a role.
D. Increasing Henry's ACL access level to Manager.
Answer: D
QUESTION NO: 5
Ronny has submitted some technical support QUESTION NO:s to the STS company on their
Web site. After 24 hours he goes to the STS folder on the site and reviews feedback.
When he selects the folder, he receives a message that he is not authorized to access.
However, he authenticated using and SSL Client Certificate and has Author access
in the database.
Why can't Ronny open the folder?
A. He needs Editor access or higher.
B. He needs to be added to the folder Read Access list.
C. He needs to be added to the Directly Link Access list.
D. He needs to be added to the View Read Access list.
Answer: C
QUESTION NO: 6
Which one of the following access levels does Erhard need to create Roles in the
ACL?
A. Author
B. Manager
C. Designer
D. RoleCreator
Answer: B
QUESTION NO: 7
APP1. NSF needs to replicate between two servers. ServerA should only be able to
add and modify information in ServerB's replica copy of APP1. NSF. ServerB
should be able to pull new and modified information from ServerA's replica copy of
APP1. NSF, but should not be able to write new or modified information to
ServerA's copy. This is not happening.
Which one of the following levels of access should each server have?
A. ServerA should have Author access to APP1.NSF on ServerB.
ServerB should have Reader access to APP1. NSF on ServerA.
B. ServerA should have Editor access to APP1.NSF on ServerB.
Answer: A
QUESTION NO: 13
Jean Philip has set up SSL for the "Appointment" database and SSL is set up on the
Domino Server. He has also selected "Maximum Internet name & password access"
in the ACL Advanced settings as Reader. The group "Road Sales" is Editor in the
ACL. Default is Author. Some of the members of "Road Sales" connect to the
database through a Web client. The Web users authenticate using SSL Client
certificates.
What level of access will they have in the database?
A. No access
B. Reader
C. Editor
D. Author
Answer: C
QUESTION NO: 14
Ed has created an access controlled section and has placed a sign-enabled field
within this section.
Which applies to the signature?
A. The signature applies to the entire document and is generated when the document
is mailed.
B. The signature applies only to the section and is generated when the document is
mailed.
C. The signature applies to the section and the document.
D. The signature applies only to the section and is generated when the document is
saved.
Answer: D
QUESTION NO: 15
Which is a true statement regarding acceptable names that can be placed in the
ACL?
A. Wildcard characters (*) can be used in the ACL, except in the organizational unit
components of a name.
B. You can add to an ACL the names of any individuals with certified Notes user
IDs.
C. Hierarchical naming cannot be used in the ACL.
D. User, server, and group names can be added to the ACL but database replica IDs
are not an acceptable entry in the ACL.
Answer: B
QUESTION NO: 16
Harry would like approval of vacation requests to bear his signature when the
document is mailed back to the person requesting vacation.
What does the form need to contain in order to have an electronic signature
attached to the document when mailed?
A. The reserved field "MailOption".
B. One sign-enabled field only.
C. Access controlled section.
D. A minimum of one sign-enabled field and a SendTo field.
Answer: D
QUESTION NO: 17
Lars has a workflow application and would like to set up distribution of the
information through a form that employs automatic e-mailing. His users are
primarily remote.
Which is a reason why he would have chosen this method over a central shared
database?
A. Replication is faster.
B. Remote users only need access to mail instead of accessing a remote database.
C. Requires less disk space.
D. Workflow always takes less time.
Answer: B
QUESTION NO: 18
Elvis does not see the salary documents in the Employee Personnel view.
What list does Elvis need to be a member of to see these documents?
A. View Access List
B. Form Read Access List
C. Form Create Access List
D. Database Access Control List
Answer: B
QUESTION NO: 19
Sven created a form read access list for a form in his web-enabled database.
Which is true about his form read access list when users access the database via the
web?
A. Web users not listed in the form read access list will not be able to open
documents created with that form.
B. Form read access lists are not supported when databases are accessed via the web.
C. Web users will see links to documents that they cannot access.
D. Anonymous users will see documents regardless of the form read access list.
Answer: A
QUESTION NO: 20
Boris has chosen to use individual mail databases in his workflow application
because his users are remote and this will allow remote users to access mail instead
of a remote database.
Which is true regarding this workflow application method?
A. Workflow process will be quicker.
B. Forms must be stored with the documents that are sent and replication times may
be longer due to increased document size.
C. Requires less disk space than a central database.
D. Forms do not have to be stored with documents that are sent.
Answer: B
QUESTION NO: 21
Christine has documents created from the Sales form that have read restricted
access.
Which could be the reason for these documents not replicating?
A. A readers field exists on the form that does not list the server name that these
documents should replicate to.
B. An authors field exist on the form that does not list the server name that these
documents should replicate to.
C. The server name is listed in the Readers field of the Sales form.
D. The server name appears in the forms Read Access List
Answer: A
QUESTION NO: 22
Sansa has been given Depositor access in the ACL of the Products database and she
has Editor access as a member of a Group.
Which will Sansa be able to do within Products database?
A. Create documents.
B. Create and edit all documents.
C. Create documents and edit her own documents.
D. Read only
Answer: A
QUESTION NO: 23
Alexander has chosen to use individual mail database in his workflow application
because his users are remote and this will allow remote users to access mail instead
of a remote database.
Which is true regarding this workflow application method?
A. Workflow process will be quicker.
B. Forms must be stored with the documents that are sent and replication times may
be longer due to increased document size.
C. Requires less disk space than a central database.
D. Forms do not have to be stored with documents that are sent.
Answer: B
QUESTION NO: 24
Merlin has Author access in the database ACL but he has been unable to create
documents from the Expense form in the database.
Which would cause this problem?
A. Merlin is not listed in the View Access list of the database.
B. Merlin needs a minimum access level of Editor to create documents from any
form.
C. Merlin is not listed in the access list for the form in the database.
D. Merlin's name is listed in the Readers field of the form thus he is only able to read
the document.
Answer: C
QUESTION NO: 25
Which is a true statement regarding the user of Roles?
A. It's easier to add or delete names to a Role than to give access to individual
names.
B. A Role is specific to multiple databases.
C. A database can contain up to 70 Roles.
D. Roles are created in the Domino Directory.
Answer: A
QUESTION NO: 26
Christine is a member of the Sales group with Reader access and she is a member of
the Payroll group with Editor access.
Answer: C
QUESTION NO: 30
What reserved field name should Miriam use when designing a field on a form
containing encryption keys with which users will encrypt documents they create
from this form?
A. DefaultEncryptionKeys
B. SecretEncryptionKeys
C. EncryptionKeys
D. SecretKeys
Answer: B
QUESTION NO: 31
Mona has built an action containing "Command[ MailForward]. This action is used
to forward the current document.
Which condition(s) must exist for this action to work?
A. The document can only be in edit mode or selected in a view.
B. A document must be open in Read or Edit mode, or selected in a view or folder.
C. The action will only work for a document opened in Read mode.
D. The action will only work for a document opened in Edit mode or selected in a
view.
Answer: B
QUESTION NO: 32
Curt would like to create a field in his new form that will display the date and time a
document was last edited or read. The form does not contain an Authors field.
Which can be used in a field formula for this purpose?
A. @Modified
B. @Accessed
C. @Created
D. $UpdatedBy
Answer: B
QUESTION NO: 33
If an Author field is added to a document, but is left blank, who can edit the
document?
A. Reader
B. Author'
C. Editor
D. Depositor
Answer: C
QUESTION NO: 34
Sherry would like to require users to access a database using a secure SSL
connection.
How is this accomplished?
A. Database ACL
B. Database ECL
C. Database properties
D. TCP/IP
Answer: C
QUESTION NO: 35
In a database's ACL, Bertha is allowed to create LotusScript agents and Java
agents. However, the agent she wrote did NOT run.
Which of the following determines whether or not she can run the agent on the
server?
A. Agent Manager
B. NOTES. INI file
C. Server document
D. Her ACL access to the server.
Answer: C
QUESTION NO: 36
Humphrey has chosen to use individual mail databases in his workflow application
because his users are remote and this will allow remote uses to access mail instead of
a remote database.
Which is true regarding this workflow application method?
A. Workflow process will be quicker.
B. Forms must be stored with the documents that are sent and replication times may be longer due to
increased document size.
C. Requires less disk space than a central database.
D. Forms do not have to be stored with documents that are sent.
Answer: B
QUESTION NO: 37
David wants to automatically mail his document only if it has never been saved.
Which of the following @ Functions can be used with @If and @Mailsend to
produce a Boolean to conditionally send the document?
A. @IsDocBeingSaved
B. @IsNewDoc
C. @IsNewDoc
D. @Matches
Answer: B
QUESTION NO: 38
Which one of the following correctly identifies the difference between document
encryption and mail encryption?
A. Document encryption uses an encryption key.
Mail encryption uses the recipient's public and private keys.
B. Document encryption uses the public key and private key of the Editor.
Mail encryption uses an encryption key.
C. Document encryption uses the private key of a designated user.
Mail encryption does not work over the Internet.
D. Document encryption uses the developer's public key.
Mail encryption uses the sender's public key and the recipient's private key.
Answer: A
QUESTION NO: 39
Rodney set up encryption for the CurrentSalary field of the Salary History form in
the HR database. Rodney has web enabled his database.
Which is true regarding how this will work for Web users?
A. Field encryption is not supported over the Web.
B. Users do not have encryption keys when using basic authentication and therefore
no Web users can see encrypted information.
C. Web authentication allows users who were mailed the keys see the information
and prevents users who were not mauled the keys from seeing encrypted fields.
D. No users can access documents with encrypted fields via the web.
Answer: A
QUESTION NO: 40
What can Bob do to keep the "Purchase" form from being available to certain users
when they select the Create menu?
A. Create a View access list
B. Database ACL
C. Form access list
D. Read access list
Answer: C
QUESTION NO: 41
If an Author field is added to a document, but it is left blank, who can edit the
document?
A. Reader
B. Author
C. Editor
D. Depositor
Answer: C
QUESTION NO: 42
Bojan created a form read access list for a form in his web-enabled databases.
Which is true about his form read access list when users access the database via the
web?
A. Web users not listed in the form read access list will not be able to open
documents created with that form.
B. Form read access lists are not supported when databases are accessed via the web.
C. Web users will see links to documents that they cannot access.
D. Anonymous users will see the documents regardless of the form read access list.
Answer: A
QUESTION NO: 43
Jean Pierre us using mail encryption on documents that are being routed to other
members of his team.
Which one of the following keys is used to decrypt the documents?
A. Jean Pierre's private key
B. Server's private key
C. Recipient's public key
D. Recipient's private key
Answer: D
QUESTION NO: 44
At which one of the following times is the password quality-checking level enforced?
A. Immediately
B. When users are assigned new passwords.
C. When users use their IDs for the first time.
D. When users change their passwords on existing Ids.
Answer: D
QUESTION NO: 45
Due to the privacy of employees, John wants the documents created with the Salary
form to only display in the Salary view. To make the view available to s select group
John created a View Access List.
Which best describes what access users will have?
A. Only users in the View Access List can read the documents.
B. Users cannot see the Salary View unless they are in the View Access List and
have Editor Access.
C. Users in the View Access list can see the documents but other users can create a
private view with SELECT @ALL and see the salary documents.
D. All users will have the Salary view but only see the documents they created.
Answer: C
QUESTION NO: 46
Which one of the following access levels does Rene need to create Roles in the ACL?
A. Author
B. Manager
C. Designer
D. RoleCreator
Answer: B
QUESTION NO: 47
Once a user has authenticated with the Domino Server and passed through the
server's access list, what is then ext line of security?
A. Workstation ECL
B. Group Security
C. Authentication
D. Database ACL
Answer: D
QUESTION NO: 48
To keep salary information in a Human Resources application confidential, Mark,
the developer, created a single view for the application. Only those people who had
the [Managers] role were allowed access to the view. Still, salary information
become public.
Which one of the following may have happened?
A. Editor
B. Reader
C. Designer
D. Author
Answer: A
QUESTION NO: 51
C. The Certpaper East server doesn't have proper access in the ACL of the replica on
the Certpaper West server to accept the ACL changes.
D. ACL changes must be made manually on each Replica because they do not
replicate
Answer: B
QUESTION NO: 58
Which can be used to secure information for Notes clients at the field level?
A. ECL
B. ACL
C. Encryption
D. Roles
Answer: C
QUESTION NO: 59
Sauron is creating a workflow application and he would like to set up his mailenabled
forms so that when a document is saved it is automatically mailed.
Which is the reserved field name that will accomplish this?
A. Sign
B. MailFormat
C. MailOptions
D. SaveOptions
Answer: C
QUESTION NO: 60
If an Author field is added to a document, but it is left blank, who can edit the
document?
E. Reader
F. Author
G. Editor
H. Depositor
Answer: C
QUESTION NO: 61
Marie would like to limit access that Notes developers have to the file systems of
Certpaper 's users.
What can Marie modify that will accomplish this?
A. Workstation ECL
B. Workstation Desktop. dsk
C. Database ACL
D. Notes. ini
Answer: A
QUESTION NO: 62
Jennie would like to create a shared agent that uses a formula to modify documents
in Certpaper 's Accounting database.
What access level must she have?
A. Editor
B. Author
C. Reader
D. Designer
Answer: D
QUESTION NO: 63
Billie wants to force mailing of a document using the reserved MailOptions field.
B. Form read access lists are not supported when databases are accessed via the web.
C. Web users will see links to documents that they cannot access.
D. Anonymous users will see the documents regardless of the form read access list.
Answer: A
QUESTION NO: 66
Percy is designing a Web application.
Which one of the following will NOT work in that application?
A. ACL
B. Authors field
C. Readers field
D. Encrypted fields
Answer: D
QUESTION NO: 67
Frey is designing a Web application.
Which one of the following will NOT work in that application?
A. ACL
B. Authors field
C. Readers field
D. Encrypted fields
Answer: D
QUESTION NO: 68
The STS database designer has created a form, which will be used by employees to
request vacation. The manager have requested that the form have a signature for
approval and disallow anyone else the ability to sign or modify the approval area on
the form.
Which is needed?
A. Access-controlled section
B. Edit access control list
C. Access control list
D. Roles
Answer: A
QUESTION NO: 69
Bunny wants to prevent users with Author access from editing documents they
create with the "Individual" form in the HR database.
How would she set this up?
A. Create and Authors Field on the form and include the user's name.
B. Create a Readers field on the form and include the user's name.
C. Create an Authors field on the form and do not include the user's name.
D. Put the users in the [Non Editor] Role in the database ACL.
Answer: C
QUESTION NO: 70
What minimum access level is needed in the database ACL in order to encrypt a database?
A. Editor
B. Author
C. Manager
D. Designer
Answer: C
QUESTION NO: 71
Attila has a document which lists the names and numbers of the Sales contacts of
various businesses that the company corresponds with. He would like for the Sales
staff to be able to view these names and numbers but he wants to keep the list from
being printed out.
Which can Attila use to accomplish this?
A. Database ACL
B. Read access list
C. Form access list
D. Execution Control List
Answer: C
QUESTION NO: 72
Gnter has hidden the design of a database.
Which one of the following describes how to re-sign a database with a different ID?
A. This cannot be done.
B. Sign the template and replace the design.
C. Make a copy and replace the design.
This will unhide the design.
D. Create a replica and sign each design element individually.
Answer: B
QUESTION NO: 73
Arnold would like to protect Notes data that is being accessed via the Web. He
would like to enforce encryption of Web transactions.
Which should he do to accomplish this?
A. TCP/IP
B. SSL
C. Set "Maximum Internet name-and-password" rights in the ACL.
D. IIOP
Answer: B
QUESTION NO: 74
Kristy has set up SSL for the "Appointment" database and SSL is set up on the
Domino Server. She has also selected "Maximum Internet name & password access"
in the ACL Advanced settings as Reader.
The group "Road Sales" is Editor in the ACL. Default is Author. Some of the
members of "Read Sales" connect to the database through a Web client. The Web
users authenticate using SSL Client certificates.
What level of access will they have in the database?
A. No access
B. Reader
C. Editor
D. Author
Answer: C
QUESTION NO: 75
Which would be a workflow method that would be time efficient for the users and
make the best use of server disk space?
A. Central shared database; e-mail notices that contain copies of documents that need
to be responded to.
B. Individual mail databases with automated email forms that are stored in
documents.
C. Central shared database; e-mail notices that link to documents.
D. Central shared database; e-mail notices that inform the user of documents that
need a response.
Answer: C
QUESTION NO: 76
Jerry has designed an Expense Reimbursement application.
1. It requires a line manager's electronic signature on the Reimbursement form.
2. He has enabled signing for the Reimbursement field.
3. The field is in an access-controlled section
Which of the following correctly states when the signature will be generated?
A. When the document is saved.
B. When the document is mailed.
C. When the document is edited.
D. When the document is received.
Answer: A
QUESTION NO: 77
John is creating a form that will contain a field that lists all 50 states for users to
make a selection from.
John will be placing the field in a layout region and he does NOT want all 50 states
to display at once, but rather display a box which contains scroll arrows allowing
one to scroll to a specific state.
Which type field is needed?
A. Listbox
B. Dialog list
C. Checkbox
D. Combobox
Answer: A
QUESTION NO: 78
When Dante clicks a button in a Mail memo, a message appears showing options
regarding the execution of the code.
Which one of the following causes the message to appear?
A. ECL
B. ACL
C. SSL
D. Java applet
Answer: B
QUESTION NO: 79
At which one of the following times is the password quality-checking level enforces?
A. Immediately
B. When users are assigned new passwords.
C. When users use their IDs for the first time.
D. When users change their passwords on existing Ids.
Answer: D
QUESTION NO: 80
Jeffrey has created a database that accesses environment variables when several of
the forms in it are opened. Users have complained about getting security warnings
when the open these forms.
What Notes feature is producing these warnings?
A. The Access Control List for the database.
B. The Workstation Execution Control List.
C. The Signature feature of signed sections.
D. The Read Access List for the form.
Answer: B
QUESTION NO: 81
Lisa created a computed readers field on the Marketing Report form, which lists all
replicating servers in her organization. She would also like for users to add names to
her readers list by choosing additional readers through the document properties
box.
What field will be automatically created when users define readers through
document properties?
A. DocReaders
B. $DocReaders
C. Readers
D. $Readers
Answer: D
QUESTION NO: 82
Hans created a form read access list for a form in his web-enabled database.
Which is true about his form read access list when users access the database via the
web?
A. Web users not listed in the form read access list will not be able to open
documents created with that form.
B. Form read access lists are not supported when databases are accessed via the web.
C. Web users will see links to documents that they cannot access.
D. Anonymous users will see the documents regardless of the form read access list.
Answer: A
QUESTION NO: 83
C. Encryption
D. Roles
Answer: C
QUESTION NO: 86
At which one of the following times is the password quality-checking level enforced?
A. Immediately
B. When users are assigned new passwords.
C. When users use their IDs for the first time.
D. When users change their passwords on existing Ids.
Answer: D
QUESTION NO: 87
Hans and Greta, two mobile users, are editing different fields in the same document
during a parallel review. The designer set a form property to merge replication
conflicts.
Which one of the following will happen?
A. Edits to each field will be saved in a single document.
B. Edits to both fields will be saved in two identical documents.
C. Edits to both fields will be saved in a single document marked as a replication
conflict.
D. Edits to each field will be saved in two documents one a main document and the
other a response document marked as a replication conflict.
Answer: A
QUESTION NO: 88
Which one of the following describes the difference between a parallel and a serial
review?
A. With serial reviews, the document is routed to each reviewer at the same time.
With parallel reviews, reviewers do not receive e-mail notification.
B. With parallel reviews, the document is routed to each reviewer at the same time.
With serial reviews, every reviewer receives e-mail notification at the same time.
C. With parallel reviews, every reviewer receives e-mail notification at the same
time.
With serial reviews, reviewers receive e-mail notification at different times.
D. With serial reviews, every reviewer receives e-mail notification at the same time.
With parallel reviews, reviewers receive e-mail notification at different times.
Answer: C
QUESTION NO: 89
Ann is creating an application that will have different language version.
Which is the first step to enabling a database for multiple languages?
A. Select the database property "Multilingual Database".
B. Change the language preference setting on the browser.
C. Change the default region located in the database properties.
D. Select the database property "Multilingual Database" and "Index" in multi database indexing.
Answer: A
QUESTION NO: 90
Siw has created a new document using the "Training" form while in the Training
view. After creating her document she is unable to see it but she can see all other
documents in the view.
What is causing this problem?
A. The document is encrypted.
B. Siw is not listed in the View Access List.
Answer: B
QUESTION NO: 93
Helga is creating a form with mail options.
Which is a predefined mail field that can be used to let a sunder know that mail has
been delivered?
A. DeliveryReport
B. ReturnReceipt
C. DeliveryPriority
D. MailOptions
Answer: A
QUESTION NO: 94
Annie is using mail encryption on documents that are being routed to other users on
her team.
Which one of the following keys is used to encrypt the documents?
A. Annie's public key.
B. Annie's private key.
C. Recipient's public key.
D. Recipient's private key.
Answer: C
QUESTION NO: 95
What is the minimum ACL to a database needed in order to create a Role?
A. Manager
B. Editor
C. Author
D. Designer
Answer: A
QUESTION NO: 96
Otto has created a form that contains a field for the street address, city, state, and
zip. He only wants these fields to appear when a document is being created and he
doesn't want them to appear any other time, including when printed.
Which hide - when field properties are needed to accomplish this?
A. "Previewed for editing"
B. "Previewed for editing" and "Opened for editing"
C. "Previewed for reading" and "Opened for reading"
D. "Previewed for reading" and "Printing"
Answer: C
QUESTION NO: 97
Which is the correct full syntax for @MailSend?
A. @MailSend( sendTo; copyTo; blindcopyTo; subject;
remark; bodyFields;[Flags])
B. @MailSend( sendTo; copyTo; blindCopyTo; subject;
remark;[flags])
C. @MailSend( sendTo; copyTo; blindcopyTo; subject;
remark; bodyFields;(flaggs)))
D. @MailSend( sendTo; copyTo; subject; remark;
bodyFields;[flags])
Answer: A
QUESTION NO: 98
Ida wants to mail-enable a form in the STS Purchase Request database using
@MailSend without arguments.
Answer: D
QUESTION NO: 101
Sarah is running a shared agent, which updates several fields on new documents in
the Sales database located on the STSServer. Assuming Sarah has appropriate
access in the server document, what access level does Sarah need within the Sales
database to run the agent successfully?
A. Designer
B. Editor
C. Author
D. Reader
Answer: B
QUESTION NO: 102
For which of the following reasons would Richard, a database designer distribute an
encryption key?
A. To allow users to access a locally encrypted database.
B. To allow users to read an encrypted field in his Domino application.
C. To allow mail recipients who have access to his private key to read e-mails he
sends.
D. To allow mail recipients who have access to his public key to read the e-mails he
sends.
Answer: B
[Manager] is listed in the Authors field. Merlin is a Reader in the ACL of the
database that contains this form and is assigned the [Manager] Role.
What can Merlin do with documents created from this form?
A. Read documents only since his ACL is Reader.
B. Edit all documents created from any form within this database.
C. Edit documents created from this form by other users and only read all other
documents within the database.
D. Edit and delete documents created from this form and only read other documents
within this database.
Answer: A
QUESTION NO: 104
Ulf has created a role called MIS. How will the Role display in the database ACL?
A. [MIS]
B. MIS
C. (MIS)
D. {MIS}
Answer: A
QUESTION NO: 105
Ivan has moved the mail-in database that employees send their confidential
complains to.
Which must be done so that mail to this database isn't returned to the user?
A. Inform the users where the database has been moved to.
B. Inform the users where the database has been moved to.
C. Modify the Server documents to specify the new location.
D. Use Domino Designer to relocate the database.
Answer: B