Certbus > IBM > IBM Certified Advanced Application Developer > C2040-407 > C2040-407 Online Practice Questions and Answers

C2040-407 Online Practice Questions and Answers

Questions 4

What is the highest level of bit encryption that IBM Domino can generate SSL certificate requests in?

A. 512

B. 1,024

C. 2,048

D. 4,096

Browse 123 Q&As
Questions 5

Which task is responsible for updating the CA registration authorities in the Certificate document in the IBM Domino Directory?

A. Monitoring process

B. Registration process

C. Administration process

D. Certificate Authority process

Browse 123 Q&As
Questions 6

What needs to be done to an IBM Domino certifier to allow it to be managed by the CA process?

A. Nothing, all certifiers are managed by the CA process by default.

B. The certifier needs to be generated within the CA application itself.

C. Following creation, the certifier needs to be migrated to the CA process.

D. A safe copy of the certifier ID needs to be imported into the CA application.

Browse 123 Q&As
Questions 7

What file or files need to be copied to the IBM Domino data folder to allow SSL to function?

A. keyring file

B. keyring and stash file

C. certificate file supplied by the certificate issuer

D. No files are required to be copied, as SSL is configured through the SSL configuration database and within the Domino Directory.

Browse 123 Q&As
Questions 8

A user has Author access in a database. What is he able to do?

A. He is able to create documents.

B. He is able to edit documents he created.

C. He is able to delete documents he created.

D. Create documents only if he also has the "Create documents" access level privilege.

Browse 123 Q&As
Questions 9

What task has to be running in order to be able to register users using the CA process?

A. Monitoring

B. Registration

C. Certificate Authority

D. Administration Process

Browse 123 Q&As
Questions 10

In an IBM Domino environment with password checking turned on, a user is unable to access the server once his/her password is reset via the IBM Notes ID vault because of the following error: "You have a different password on another copy of your ID file and you must change the password on this copy to match". What can an administrator do to solve the problem?

A. Replicate the ID vault database.

B. Instruct the user to change the password on his/her local user ID.

C. Clear the password digest field located in the user's Person document.

D. Reset the password again via the Notes ID vault and make sure the reset action is successful.

Browse 123 Q&As
Questions 11

Which is true regarding IBM Notes Traveler?

A. Traveler must be administered from a web browser and can't be administered using the IBM Domino Administration client.

B. Traveler can be administered from the Domino Administration client only for High Availability (HA) pool configurations.

C. Traveler can be administered from the Domino Administration client in both standalone server configurations as well as in HA pool configurations.

D. Traveler can be administered from a web browser. Web-based administration is available in both standalone server configurations as well as in HA pool configurations.

Browse 123 Q&As
Questions 12

An administrator can move a mail database archive when he moves a mail database to another server. Which statement defines when the archive database can be moved with the user's mail file?

A. if the archive is located in the same path as the mail file

B. if the archive is located on the same server as the mail file

C. if the archive is located on the same domain as the mail file

D. if the archive file is not larger than the defined mail quota size

Browse 123 Q&As
Questions 13

Ken is configuring a Mail settings policy document for users in his organization. Which option can Ken set using a Mail policy settings document?

A. Mail file location

B. Managed mail replicas

C. Customized mail quota warning

D. Display To Do entries in the Calendar

Browse 123 Q&As
Questions 14

The IBM Notes Install Cleanup Executable (NICE) tool can detect if certain services (e.g. Notes Diagnostics) are running. What will happen if NICE does detect these services?

A. NICE will stop them.

B. NICE will instruct the user to stop them.

C. NICE will ask the user to reboot the workstation in order to stop them.

D. NICE will remove them from the services list and ask the user to reboot the workstation.

Browse 123 Q&As
Questions 15

What two statements are true regarding IBM Notes Smart Upgrade? (Choose two.)

A. Policies are required to use Smart Upgrade.

B. Users can choose File > Tools > Notes Smart Upgrade to begin the upgrade process.

C. The Smart Upgrade Governor can be used to control the Maximum Concurrent Downloads.

D. The Smart Upgrade process requires the user to have administrator privileges to their local machine.

E. Update kits are automatically added to the Smart Upgrade application when they become available at the IBM developerWorks site.

Browse 123 Q&As
Questions 16

Alex would like to configure a new Mail Policy. How would a Mail policy settings document help him?

A. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Mail only.

B. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Calendaring and Scheduling only.

C. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Mail, Calendaring and Scheduling.

D. A Mail policy settings document will provide a mechanism for setting and enforcing IBM Notes and Web Mail policies and configuring POP3 and SMTP Mail services.

Browse 123 Q&As
Questions 17

When the administrator uses activity logging for replication, IBM Domino generates one activity logging record for each database replication request that a server initiates. Which statement is true regarding record logging?

A. Only the initial replication activity is logged.

B. All servers generate activity logging records.

C. Only the target server generates activity logging records.

D. Only the initiating server generates activity logging records.

Browse 123 Q&As
Questions 18

Sam is applying ID encryption. What is the strongest level of ID encryption he can mandate through a policy?

A. 128-bit RC2

B. 512-bit AES

C. 128-bit AES

D. 256-bit AES

Browse 123 Q&As
Exam Code: C2040-407
Exam Name: IBM Notes and Domino 9.0 Social Edition System Administration B
Last Update: Mar 14, 2025
Questions: 123 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99