Our pass rate is high to 98.9% and the similarity percentage between our C2040-407 study guide and real exam is 90% based on our seven-year educating experience. Do you want achievements in the IBM C2040-407 exam in just one try? I am currently studying for the IBM C2040-407 exam. Latest IBM C2040-407 Test exam practice questions and answers, Try IBM C2040-407 Brain Dumps First.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for IBM C2040-407 Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW C2040-407 Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/C2040-407-exam-dumps.html
Q61. What security feature protects user workstations against active content from unknown or suspect sources?
A. policies
B. Access Control List
C. notes.ini parameters
D. Execution Control List
Answer: D
Q62. How can a user prevent deleted documents from replicating back into the database after the deletion stubs have been purged?
A. by creating a policy
B. by utilizing an access control list
C. by upgrading the On Disk Structure of the database
D. by setting the Purge Interval Replication Control option
Answer: D
Q63. Adam has a report from an end user concerning his private folders. Adam has determined that the server has become unavailable and the end user was accessing the failover server. Which statement is true regarding private folders?
A. Private folders must be flagged in the cluster configuration.
B. Private folders do replicate to other replicas within the cluster.
C. Private folders do not replicate to other replicas within the cluster.
D. The cluster server should be included in the ACL in order to replicate private folders.
Answer: B
Q64. Alex would like to configure a new Mail Policy. How would a Mail policy settings document help him?
A. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Mail only.
B. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Calendaring and Scheduling only.
C. A Mail policy settings document will provide a mechanism for setting and enforcing client settings and preferences for Mail, Calendaring and Scheduling.
D. A Mail policy settings document will provide a mechanism for setting and enforcing IBM Notes and Web Mail policies and configuring POP3 and SMTP Mail services.
Answer: C
Q65. Josh has been asked to add a server to a cluster. What rights must he have to perform that task?
A. Editor access to the IBM Domino Directory, as well as Manager access to the Administration Requests database.
B. Manager access to the Domino Directory, as well as Manager access to the Administration Requests database.
C. Author access, Delete Documents rights, ServerModifier and ServerCreator roles in the Domino Directory, as well as Author access with Create documents rights in the Administration Requests database.
D. Contributor access, Create Documents rights, ServerModifier and ServerCreator roles in the Domino Directory, as well as Author access with Create documents rights in the Administration Requests database.
Answer: C
Q66. Ken enabled Message Tracking for the IBM Domino server, but wishes to extend the default period of time that mail tracking data is kept before it is automatically purged by the MTC task. How can Ken configure this?
A. Issue the tell mtc purge <value> command at the server console.
B. Issue the tell mtc interval <value> command at the server console.
C. Set the "Message tracking collection interval" field in the server's Configuration document.
D. Adjust the purge interval through the Replication Settings for the Mail Tracking Store database.
Answer: D
Q67. Where is an X.509 certificate, which is used to sign and encrypt SMTP mail, stored?
A. in the notes.ini
B. in the IBM Notes ID file
C. in the Personal Names and Address Book of a user
D. in the Person document in the IBM Domino Directory
Answer: B
Q68. What should happen when Troy, the IBM Domino administrator, renames an IBM Notes user?
A. When Troy renames a Notes user, all occurrences of that user or name should be updated in the Domino Directory and other databases by the Domino Administration Process on the Domino server.
B. When Troy renames a Notes user, some occurrences of that user or name should be updated in the Domino Directory and other databases by the Domino Administration Process on the Domino server.
C. When Troy renames a Notes user, all occurrences of that user or name should not be updated in the Domino Directory and other databases by the Domino Administration Process on the Domino server.
D. When Troy renames a Notes user, all occurrences of that user or name should be updated in the Domino Directory but not in other databases by the Domino Administration Process on the Domino server.
Answer: A
Q69. Janie is a user whose ID is stored in an ID vault. She requested a name change, and the administrator has completed the rename process. What does Janie need to do in order to use the new name?
A. She will be prompted to reject or accept the name change.
B. She will need to enter her password when prompted to finalize the name change.
C. She will accept the change and resend the ID to the ID vault in order to use the new name.
D. Name changes occur without user interaction for users whose IDs are stored in an ID vault.
Answer: D
Q70. Craig has noticed a lot of incoming unsolicited e-mail is being generated from IP addresses beginning with the numbers 214.132.55. What should the entry in the "Deny connections from the following SMTP internet hostnames/IP addresses" field in the server's Configuration document be to prevent all of these IP addresses from connecting?
A. [214.132.55.*]
B. 214.132.55.0/24
C. 214.132.55.0...214.132.55.255
D. [214.132.55.0-214.132.55.255]
Answer: A