发信人: reynolds()
整理人: reynolds(2001-12-06 10:10:19), 站内信件
|
原始发表者:3d.now
To set up mail notification for disk.c.free, which tasks must be loade
d?
A. event only
B. report only
C. report and event
D. report and event and collect
The correct answer is: C See Chapter 6: Administration Tools
From where does Database Analysis gather its information?
A. The log file (LOG.NSF), the Statistics Reporting database (STATREP.
NSF), and the database header notes
B. The Administration Requests database (ADMIN4.NSF) and the log file
(LOG.NSF)
C. The Replication History dialog box, the User Activity dialog box, a
nd the log file (LOG.NSF)
The correct answer is: C See Chapter 9: Server and System Monitoring
To detect a situation where replication fails three times between Serv
er1 and Server2, which Notes tool should an administrator use?
A. Communications Event Monitor for replication failures equal to or g
reather than three
B. Event Monitor for Replication events for replication failures great
er than two
C. Log Analysis which detects "replication" and "error" greater than "
two"
D. Statistic Monitor with a threshold of replication failures greater
than or equal to three
The correct answer is: D See Chapter 9: Server and System Monitoring
What facilities aid the administrator in monitoring mail routing betwe
en domains?
A. The Administration Process, the log file (LOG.NSF), and Statistics
Reporting (STATREP.NSF)
B. The Address Book, the Master Address Book, the log file (LOG.NSF),
and the Administration Process C. The Database Tools, the Administrati
on Panel, and the log file (LOG.NSF)
D. The log file (LOG.NSF), Event Monitors, Statistic Reports, and Alar
ms
The correct answer is: D See Chapter 9: Server and System Monitoring
What types of documents control mail routing among Notes domains?
A. Foreign domain
B. Adjacent domain
C. Non-Adjacent domain
D. Global domain
The correct answer is: BC See Chapters 5: Security
An administrator notices that two servers in this domain fail to commu
nicate. A check of the certification reveals that they are indeed both
certified by "/Acme". The error message states something about a publ
ic key being invalid. Other servers communicate with the first server
in question. What should the administrator do?
A. Generate a new Organization certifier and recertify all servers and
users to ensure a consistent use of the certifier's public key.
B. Rename the second server, as changing the name will change the publ
ic key and solve the problem.
C. Recertify the second server, as it was likely certified with a diff
erent certifier that had the same name.
D. Use Log Analysis to determine who damaged the second server's ID fi
le.
The correct answer is: C See Chapter 10: Troubleshooting System Admini
stration Problems
When creating an Event Monitor, one can specify:
A. a single server name.
B. all servers.
C. many server names.
D. All of the above.
E. None of the above .
The correct answer is: D See Chapter 9: Server and System Monitoring
Which of the following are not valid templates for a Results database?
A. dba4.ntf
B. logres4.ntf
C. loga4.ntf
D. dbres4.ntf
The correct answer is: BD See Chapter 9: Server and System Monitoring
An administrator can use the information in the Analysis documents of
a Results database to monitor changes to a database. Which of the foll
owing is not available on such a document?
A. Name of the database containing documents that were read
B. Name of the server that stores the database containing documents th
at were read
C. Name of the user that made the changes to the database
D. Name of the database on which documents were updated
E. Details about changes to the Access Control List
The correct answer is: C See Chapter 9: Server and System Monitoring
In the two fields Allow Mail only from Domains and Deny Mail from Doma
ins, what are acceptable entries?
A. Server names, User names, or wildcard entries
B. Domain names only
C. Group names, Domain names, Server names, and User names
D. Wildcard entries (*/DChem) and Domain names
The correct answer is: B See Chapters 5: Security
Monitoring is configured in which database?
A. admin4.nsf
B. names.nsf
C. statrep.nsf
D. events4.nsf
The correct answer is: D See Chapter 6: Administration Tools
An administrator performs a cross-certification with a modem call to t
he other organization. Upon seeing a dialog box that asks if a new cro
ss-certificate should be generated, the administrator clicks "Yes". Ho
w much of the other organization has been trusted?
A. The last OU of the other server
B. The first OU of the other server
C. The other Organization in its entirety
D. Just the other server itself
The correct answer is: C See Chapters 5: Security
What option is available when starting Log Analysis?
A. A text box for specifying the number of days to analyze
B. A text box for entering search phrases
C. A text box to specify the design template for the output database
D. A text box to specify the title of the Log file to analyze
The correct answer is: A See Chapter 6: Administration Tools
What documents would need to be changed when two domains merge into on
e?
A. Server
B. Program
C. Group
D. Mail-in Database
E. Person
The correct answer is: ADE See Chapter 9: Server and System Monitoring
What is the difference between the Database Analysis options "Analyze
User Writes" and "Analyze Document Changes"?
A. "Analyze User Writes" counts the number of times documents were cre
ated, modified, or deleted, while "Analyze Document Changes" reports d
etails of additions, deletions, and modifications.
B. "Analyze User Writes" reports the names of users who made additions
, modifications, and deletions, whereas "Analyze Document Changes" doe
s not.
C. "Analyze User Writes" is used to detect only the number of addition
s to the database, whereas "Analyze Document Changes" detects all chan
ges to all documents.
The correct answer is: A See Chapter 9: Server and System Monitoring
How would an administrator look at the the most current statistics on
a server?
A. By opening statrep.nsf and then the topmost Statistic Report
B. By issuing show stat at the console
C. By generating a Log Analysis report
D. By opening statrep.nsf and then the most recent Analysis Report
The correct answer is: B See Chapter 9: Server and System Monitoring
A TCP/IP connection between a Notes client and a Domino server fails w
hile an SPX connection works. An administrator should
A. change the HOSTS file and ping the server from the Notes client.
B. perform a Network Trace first (from the Notes Client) to determine
how Notes is resolving the name of the server.
C. disable the SPX port, as it is likely conflicting with the TCP/IP p
ort.
D. check the DNS first to see if the Notes client is listed in this IP
domain. E. check the Location Document to see what ports are enabled.
The correct answer is: BE See Chapter 10: Troubleshooting System Admin
istration Problems
Two administrators from different organizations decide to connect thei
r Notes networks over the Internet. After pinging each others' servers
successfully, Administrator X attempts to establish a Notes connectio
n to the other server, but finds that the connection fails. This serve
r uses TCP/IP to connect successfully to other servers in the same org
anization. What is the most likely cause of the problem?
A. The server has the wrong TCP/IP subnet mask; modify the IP configur
ation.
B. The firewall is not permitting IP packets on port 1352; modify the
firewall configuration to allow this port.
C. The local DNS doesn't include the remote server; add the remote ser
ver to the DNS.
The correct answer is: B See Chapter 10: Troubleshooting System Admini
stration Problems
A user reports that when he opens his mail file, he is only allowed to
access his calendar. The administrator can resolve the problem by:
A. creating a new mail file because he must be opening someone else's
mail file.
B. modifying a Location document because he must be using an old repli
ca of his mail file.
C. re-registering the user so that he gets a new mail file because he
must have a corrupted ID.
D. changing the Access Control List to give the user Manager access be
cause he now has only "Read Public Documents" access.
The correct answer is: D See Chapter 10: Troubleshooting System Admini
stration Problems
An administrator configured a server to replicate with a server in ano
ther domain. What took place?
A. A Connection document was created in the Master Address Book, speci
fying the remote server and its organization name along with the commu
nications port.
B. A Connection document was created in the Public Address Book, speci
fying the remote server and its domain name along with the communicati
ons port.
C. A Cross Certificate was created, specifying the remote server and i
ts domain name.
D. A Foreign Domain was created, specifying the remote server's domain
name and the communications port.
The correct answer is: B See Chapter 6: Administration Tools
Which Database Analysis options do not exist on the Analyze a Database
dialog box?
A. Analyze design changes.
B. Analyze ACL changes.
C. Scan activity view in the log.
D. Scan replicas on other servers.
E. Analyze user changes.
The correct answer is: BE See Chapter 6: Administration Tools
What types of monitors are helpful in monitoring replication?
A. Replication Statistic Monitors
B. Replication Event Monitors
C. Replication Statistic Reports
D. Replication Event Log Reports
The correct answer is: B See Chapter 9: Server and System Monitoring
A programmer reported that the Mail-in Database set up by the administ
rator wasn't working because messages weren't arriving there. Upon exa
mination, he discovered the error and fixed it. What would be a possib
le explanation?
A. The Mail-in name was the same as the database name; it was changed
to something different.
B. The programmer was using the database name instead of the Mail-in n
ame; the formula containing the address was changed to use the Mail-in
name.
C. The administrator had created a Person document instead of a Mail-i
n Database document; it was deleted and the correct document was creat
ed.
The correct answer is: B See Chapter 10: Troubleshooting System Admini
stration Problems
A Replication Monitor helps an administrator:
A. become notified when a database replicates with a designated server
.
B. determine the databases that are replicating too often as an aid in
optimizing server load.
C. learn about databases that have failed to replicate within a certai
n time.
D. locate databases that have more than a specified number of replicat
ion errors.
The correct answer is: C See Chapter 6: Administration Tools
How would an administrator monitor changes to database ACLs?
A. By mailing Security events to a mail-in database
B. By using an ACL Monitor document
C. By monitoring the statistic acl.updates
The correct answer is: B See Chapter 6: Administration Tools
How can an administrator control the flow of messages coming from one
domain and destined to another domain for which there are connection d
ocuments?
A. By using a Non-adjacent Domain document
B. By using an Adjacent Domain document
C. By using a Foreign Domain document
D. By using a Global Domain document
The correct answer is: B See Chapters 5: Security
Domains SWJ and PDQ both have Named Networks called "Internal TCP/IP".
What documents, if any, are necessary to configure mail routing betwe
en them?
A. Foreign Domain documents are required in both domains.
B. No extra documents are necessary. Mail routing is automatic within
the same Named Network.
C. Connection documents are required in both domains.
D. Adjacent domain documents are required in both domains.
The correct answer is: C See Chapters 5: Security
What view in the which database would an administrator use to learn th
e results of replication between ServerA and ServerB?
A. RESULTS.NSF, Replication Results
B. LOG.NSF, Replication Events
C. STATREP.NSF, Statistics Reports\Communications
D. EVENTS4.NSF, Event Monitors
E. STATREP.NSF, Events
The correct answer is: B See Chapter 9: Server and System Monitoring
Choose the statement that best summarizes cross certificates.
A. A Cross Certificate is a collection of Public Keys that permit two
organizations to trust each other.
B. A Cross Certificate is a statement of trust: This much of Company A
trusts that much of Company B.
C. A Cross Certificate is a shared key system that enables authenticat
ion to succeed between two servers.
D. A Cross Certificate is a guarantee of authenticity granted by RSA t
hat permits two organizations to trust each other.
The correct answer is: B See Chapters 5: Security
If an Event Monitor uses the notification method of "Log to database",
that database must be
A. statrep.nsf.
B. a database with the same design as statrep.nsf.
C. a mail-in database.
D. a mail database.
E. a database with the same design as a mail database.
The correct answer is: C See Chapter 9: Server and System Monitoring
Domain PDQ wants to simplify communication to domain XYZ via domain SW
J yet prevent mail coming from domain ABC from travelling to domain XY
Z. Choose the item that makes the best use of a Non-adjacent Domain do
cument in domain PDQ:
A. Mail sent to domain XYZ; Route through domain SWJ; allow mail only
from ABC
B. Mail sent to domain SWJ; Route through domain XYZ; deny mail from A
BC
C. Mail sent to domain XYZ; Route through domain SWJ; deny mail from A
BC
D. Mail sent to domain SWJ; Route through domain XYZ; allow mail only
from TUV
The correct answer is: C See Chapters 5: Security
How many Connection documents would be needed to route mail and replic
ate databases between domains XYZ and ABC?
A. 1
B. 2
C. 3
D. 4
The correct answer is: B See Chapter 6: Administration Tools
Why would an administrator configure a Statistic Event Monitor?
A. To generate a Statistic Event in the case of a Statistic Alarm
B. To use the Event Monitor handling options for a Statistic Monitor o
ccurrence
C. To enter a Trouble Ticket into statrep.nsf automatically
D. To collect statistics from remote servers
The correct answer is: B See Chapter 6: Administration Tools
Why would an administrator set up the collect task among multiple serv
ers?
A. To collect Statistic Reports on one server only
B. To collect File Statistic Reports and Statistic Reports
C. To collect Analysis Reports and Statistic Reports
D. To avoid running the report task on multiple servers
The correct answer is: AD See Chapter 6: Administration Tools
A programmer reports that messages sent from a database to a Mail-in D
atabase are returning undeliverable because of the error "No route fou
nd to domain X". The administrator examined the problem and fixed it.
What was changed?
A. The Mail-in Database document had the wrong domain specified; it wa
s corrected.
B. Because the Mail-in Database document doesn't have a Domain field,
the Connection document was examined and found to have an invalid doma
in name; it was corrected.
C. The Adjacent Domain document had a misspelling in the Domain field
which was corrected.
The correct answer is: A See Chapter 10: Troubleshooting System Admini
stration Problems
An administrator set up cascaded Address Books, but found that when a
user addressed a memo, she would get an error when selecting the secon
d Address Book. What was the problem and how did the administrator fix
it?
A. The path to the Address book was invalid because it used the wrong
syntax of "servername:filename"; it was changed to: "server name!!file
name".
B. The second Address book had duplicate entries that had to be remove
d.
C. The first Address Book lacked an Adjacent Domain document to map to
the second Address Book; the administrator added the Adjacent Domain
document.
The correct answer is: A See Chapter 10: Troubleshooting System Admini
stration Problems
When is a Foreign Domain document necessary?
A. When communicating with Notes domains who use International encrypt
ion
B. When sending mail to a Notes domain that uses extended character se
ts
C. To control mail passing through a domain but intended for another N
otes domain
D. When sending messages to a different type of mail system
The correct answer is: D See Chapters 5: Security
How does an administrator set up mail notification for a low memory si
tuation?
A. By creating an Event Monitor for statistic events
B. By loading the collect task on all servers
C. By creating a Statistic Monitor for the statistic mem.free
D. By creating an Event Monitor for memory events
The correct answer is: AC See Chapter 6: Administration Tools
Log Analysis should be performed and the Results database monitored
A. on a daily basis to prevent mail routing problems from occurring.
B. periodically to automatically fix errors that have occurred on the
server.
C. to pinpoint specific conditions to determine their frequency.
D. rarely because of the dramatic impact it has on server performance.
The correct answer is: C See Chapter 9: Server and System Monitoring
How would an administrator successfully set up the databases needed fo
r Statistics Monitoring?
A. The databases are created automatically during the configuration of
the first server.
B. Load the report server task at the console.
C. Use the File, Database, New menu to create the databases based on t
he templates provided.
D. Submit an administration request to adminp via the admin4.nsf datab
ase.
The correct answer is: B See Chapter 6: Administration Tools
To know when to begin troubleshooting a mail routing problem, an admin
istrator should:
A. watch the server console periodically using "show port".
B. use Log Analysis to notify administrators when mail routing errors
are occurring.
C. create a Statistic Monitor that generates an Alarm when more than 5
messages are in MAIL.BOX
The correct answer is: C See Chapter 9: Server and System Monitoring
Domain A wishes to communicate with Domain B and Domain C, but wants t
o prevent users in Domain B from sending mail to Domain C. What should
the administrator for Domain A implement?
A. Non-adjacent domain document for Domain C: Deny mail from Domain B
B. Adjacent domain document for Domain C: Deny mail from Domain B
C. Non-adjacent domain document for Domain B: Deny mail from Domain C
D. Adjacent domain document for Domain B: Deny mail from Domain C
The correct answer is: B See Chapters 5: Security
Where and why should an administrator create the results database for
a Database Analysis?
A. On the server because other administrators won't be able to write t
o a local copy.
B. On the workstation because only one administrator is initially auth
orized to write to a results database.
C. On the server because other administrators need to append their res
ults to that database.
D. On the workstation so that more features are analyzed.
The correct answer is: B See Chapter 6: Administration Tools
Alarms are written to which database?
A. Names.nsf
B. log.nsf
C. statrep.nsf
D. admin4.nsf
E. events4.nsf
The correct answer is: C See Chapter 9: Server and System Monitoring
How can an administrator control which servers users can reach via Pas
sThru?
A. Allow Access field on the Server document
B. Route Through field on the Server document
C. Cause Calling field on the Server document
D. Destinations Allowed field on the Server document
E. Deny_Access= in NOTES.INI
The correct answer is: D See Chapters 5: Security
What is the difference between the Route Through field and the Cause C
alling field in the Restrictions section of a Server Document?
A. Route Through controls phone calls and network connections, whereas
Cause Calling only restricts phone calls.
B. Route Through controls Passthru connections, whereas Cause Calling
controls any phone calls the server makes.
C. Cause Calling controls Passthru phone calls, whereas Route Through
controls Passthru network connections via this. server
D. Cause Calling controls scheduled phone calls, whereas Route Through
controls Passthru connections (both LAN and phone).
The correct answer is: C See Chapters 5: Security
Which task must be loaded first: event or report?
A. The report task because it is responsible for creating the supporti
ng databases
B. The event task because it is responsible for creating the supportin
g databases
C. There is no prerequisite, either task will create the supporting da
tabases if loaded first
The correct answer is: C See Chapter 6: Administration Tools
Company ABC has cross certified with Company XYZ. The administrator fo
r domain ABC created a group (XYZ_Allowed), which was entered into the
Server document's Restrictions section. What entries to this Group do
cument will allow access to domain XYZ?
A. */XYZ
B. */Sales/XYZ
C. User and server names only
D. Server names only
E. User names only
The correct answer is: C See Chapters 5: Security
When are cross certificates necessary?
A. When two organizations using hierarchical naming want to connect th
eir Notes networks
B. When non-hierarchical certificates fail to complete the connection
C. When two organizations want to connect their networks for SMTP mail
routing
D. To allow SSL connections to a Domino web site
E. When one organization uses non-hierarchical naming and the other us
es hierarchical naming and they want to connect their Notes networks
The correct answer is: A See Chapters 5: Security
An administrator learned from Notes users that a certain database was
behaving erratically in that the updates reported to be in the databas
e were not always visible. Which tool did the administrator use to fin
d that it was a replication problem (by using the file name)?
A. Event Monitor
B. Administration Panel
C. Log Analysis
D. Database Properties
The correct answer is: C See Chapter 10: Troubleshooting System Admini
stration Problems
The icon on a particular database would change periodically. The admin
istrator would change it back each time but could not find a cause for
the problem. One day, through the use of a Notes troubleshooting tool
, the administrator found it had happened around 4:30 PM the last thre
e days. By checking the Database Usage views in the Log, it was determ
ined that a specific user had been refreshing the design from a local
template and changing the icon. What tool helped the administrator det
ermine the times that the icon was changed?
A. Event Monitor
B. Log Analysis
C. Database Analysis
D. Administration Process
The correct answer is: C See Chapter 10: Troubleshooting System Admini
stration Problems
How is the event monitoring server task loaded?
A. load events
B. load event4
C. load event
D. load events4
The correct answer is: C See Chapter 6: Administration Tools
A user reports that mail messages sent to a particular destination are
returning undeliverable. Which tool would be most useful in troublesh
ooting the problem?
A. Mail Trace from the Server's client
B. Log Analysis from the User's desktop
C. Mail Trace from the User's desktop
D. Log Analysis from the Server's client
The correct answer is: C See Chapter 10: Troubleshooting System Admini
stration Problems
An administrator notices that a server cannot connect to a server in a
nother organization. The failure message states, "The server's address
book does not contain any cross certificates capable of authenticatin
g you." The administrator should then:
A. check the Server document's Restrictions section to see if the othe
r server is allowed access.
B. generate a new cross certificate trusting either an OU or the O of
the other organization, not just the CN.
C. call an administrator in the other organization since it is known t
hat they lack a cross certificate for you.
The correct answer is: C See Chapter 10: Troubleshooting System Admini
stration Problems
How should an administrator configure the Server document(s) to allow
all users in the Address Book, in addition to all of the servers in th
e domain, to access Server PDQ?
A. Server ABC: Route through field contains Server PDQ and Allow Acces
s contains *
B. Server PDQ: Only allow server access to users listed in this Addres
s Book contains No
C. Server PDQ: Allow Access contains LocalDomainServers
D. Server PDQ: Only allow server access to users listed in this Addres
s Book contains Yes
E. Server PDQ: Allow Access contains *
The correct answer is: CD See Chapters 5: Security
A remote user configured for TCP/IP with a Connection document to Serv
er X (199.98.199.1) cannot access the Notes server via the Internet ev
en though it answers "ping". What is the most likely cause?
A. The user has a bad ISP; change ISPs.
B. The modem doesn't allow for large TCP/IP packets; change the modem.
C. The firewall in the organization is not configured to allow traffic
on Port 1352; change the firewall configuration.
D. The DNS isn't configured to recognize the server name; modify the D
NS.
The correct answer is: C See Chapter 10: Troubleshooting System Admini
stration Problems
Assuming Company ABC has configured its domain to connect to Company X
YZ by creating the following cross certificates, will its servers auth
enticate at this time?
1) In ABC's Address Book: /ABC - /Servers/XYZ
2) In XYZ's Address Book: /XYZ - /Servers/ABC
A. Yes.
B. No, the cross certificates are not correct.
C. No, the NOTES.INI files haven't yet been modified.
D. No, the Server documents haven't yet been modified.
E. No, the Adjacent Domain documents haven't yet been modified.
The correct answer is: D See Chapters 5: Security
A mail message destined for a server in another domain fails to make i
t to the server in the other domain; it remains in MAIL.BOX until the
next day, when it is returned as undeliverable. The most likely cause
of this problem is
A. the cross certificates were not established correctly.
B. the Connection document was disabled.
C. the other server was not available for at least 24 hours.
D. the message was addressed improperly.
The correct answer is: C See Chapter 10: Troubleshooting System Admini
stration Problems
An administrator learns that over the last month the number of mail ro
uting problems has increased. To further investigate the problem, the
administrator would be best advised to:
A. pay closer attention to the log file (LOG.NSF).
B. set up Event Monitor documents for the Mail event type.
C. use Log Analysis to determine the real cause of the mail problems.
D. use Database Analysis on MAIL.BOX.
The correct answer is: B See Chapter 10: Troubleshooting System Admini
stration Problems
A mail message being sent from domain ABC to domain PDQ via domain XYZ
returns as undeliverable because there is "no route found to domain X
YZ." The administrator would fix this problem by:
A. starting the router, as it must be turned off.
B. changing an Adjacent Domain document because server XYZ must be in
the deny list.
C. editing the Person document for the recipient, as they must have an
invalid mail file name.
D. editing the Connection document to domain XYZ, as the server name m
ust be wrong.
The correct answer is: B See Chapter 10: Troubleshooting System Admini
stration Problems
Know the control among domain access using trusted non-hierarchical ce
rtifiers
Know the difference between Adjacent Domains and Non-Adjacent Domains.
Know how to control betwee domain mail routing
Know when and how EVENTS4.NSF and STATREP.NSF databases are created. K
now how to cause trouble tickets to be created
Be very familiar with Statistics Reporting and Server Monitoring. Know
what cross-certifications does and how it should be implemented in re
gards to security, ie at what levels should you cross-certify at.
Know difference between Collector Task and Reporter Task.
-- ※ 修改:.reynolds 于 Jul 2 09:32:58 修改本文.[FROM: 202.96.182.74] ※ 来源:.月光软件站 http://www.moon-soft.com.[FROM: 202.38.212.112]
|
|