Limited Time Discount Offer
30% Off - Ends in 02:00:00

X

IBM C2040-412 Dumps

verified by experts

  • Verified by experts

C2040-412 Premium File

  • 118 Questions & Answers

$21.41

$14.99
IBM
IBM Notes Traveler Administration
IBM
IBM Notes Traveler Administration

Files

File Name
Views
Size
Downloads

166

82.4 KB

121

Files

Views

166

Size

82.4 KB

Downloads

121

Questions & Answers for IBM C2040-412

Showing 1-15 of 118 Questions

Question #1 - Topic 1

What reason might an administrator choose to implement the IBM Notes Traveler default
settings over the Notes Traveler Policy Settings document?

A. The default settings document allows for different device settings per group.

B. The default settings document applies updates almost immediately to Notes Traveler users

C. The default settings document takes precedence over the Notes Traveler Policy Settings document

D. The default settings document contains more options above and beyond the Notes Traveler Policy Settings document.

Question #2 - Topic 1

Clark has deployed a 64-bit IBM Notes Traveler server. After adding 1500 devices, Clark
would like to be sure the Java heap size is correctly set for his workload. What might Clark
review to understand Notes Traveler Java memory usage?

A. HTTPJVMHEAPSIZE notes.ini value's current setting

B. Tell Traveler mem show to report current Java memory usage

C. Tell Traveler JVM mem show to report current Java memory usage

D. The 64-bit Java heap size is fixed at 8 GB,so there is no need to review usage.

Question #3 - Topic 1

Where is the configuration setting which denies user access to IBM Notes Traveler?

A. notes.ini

B. ntsconfig.xml file

C. IBM Traveler tab of the Server document

D. via the LotusTraveler.xml configuration file under <Security>

Question #4 - Topic 1

What is updated in the IBM Notes Traveler server to direct the server to use high
availability functionality?

A. replication settings of the users' mail files

B. replication settings of the lotusTraveler.nsf

C. notes.ini parameter NTS_DBCONNECTIONURL

D. external server URL to be the value of the IP Sprayer

Question #5 - Topic 1

Which operating system is supported by the IBM Notes Traveler 9.0 server?

A. Ubuntu 13

B. IBM AIX 5.3

C. Microsoft Windows 7

D. IBM i 6.1 POWER System

Question #6 - Topic 1

Tim is deploying IBM Notes Traveler for Windows using an enterprise database. Where
should the database server be located?

A. anywhere

B. on the same Windows Server as Notes Traveler

C. on a dedicated server in a remote data center for disaster recovery

D. on a dedicated server in the same data center as the Notes Traveler server

Question #7 - Topic 1

Once IBM Notes Traveler servers are put into production, what average percentage should
the CPU be below?

A. 65

B. 75

C. 85

D. 95

Question #8 - Topic 1

IBM Notes Traveler server uses LDAP remote directory for user look up. How can an
administrator map a non-standard field in LDAP to a field in the IBM Domino directory?

A. VCARD XSLT

B. Active Sync XSLT

C. Directory Assistance Search Filter

D. NTS_NAME_LOOKUP_ITEMS_EXT property

Question #9 - Topic 1

What is the command that is used to determine the current memory usage for IBM Notes
Traveler?

A. Show Memory

B. Tell Mem Show

C. Tell Traveler Mem Used

D. Tell Traveler Mem Show

Question #10 - Topic 1

An IBM Notes Traveler administrator wants to allow users to manage their own security,
such as 'Wipe Device', and 'Deny Access'. What must the administrator do to allow this?

A. Grant users the [Administrator] role to the Notes Traveler administration database.

B. Set "User Managed Security" to "Enabled" on the Notes Traveler administration database.

C. Grant users Editor access to the Notes Traveler administration database so they may edit their own documents.

D. Grant users Depositor access to the Notes Traveler administration database so they may create a 'Wipe Device' or 'Deny Access' document.

Question #11 - Topic 1

Which statement describes IBM Traveler constraint processing?

A. Data packets are compressed to improve throughput.

B. Logs are automatically enabled during high utilization.

C. Constraints are placed on user functions according to policy.

D. A monitor checks the system to see if it has entered a resource constraint state.

Question #12 - Topic 1

Which statement is true of sending encrypted mail messages from Apple iOS devices?

A. There is no way to send an encrypted mail message from Apple iOS devices.

B. Encrypted messages can only be sent to recipients who are also using an Apple iOS device.

C. When the user composes a mail message in the native iOS client, the option to encrypt the message must be enabled.

D. The only way to send an encrypted mail message from iOS is by sending it from a properly configured IBM Notes Traveler Companionapplication.

Question #13 - Topic 1

Before upgrading to a more current version of IBM Notes Traveler, what must be done
first?

A. Upgrade the mail template.

B. Upgrade the mobile clients.

C. Upgrade the IBM Domino mail servers.

D. Upgrade the Domino server that hosts the Notes Traveler server.

Question #14 - Topic 1

An IBM Notes Traveler user reports they are unable to connect to the Notes Traveler
server from their device. How can the user check status of the server?

A. Run the Check Traveler tool available on the device.

B. From a desktop web browser, access the Notes Traveler homepage.

C. From a desktop web browser, access the IBM Domino server homepage.nsf.

D. Contact the cellular provider to assist with troubleshooting general connectivity issues.

Question #15 - Topic 1

What is an advantage of using IBM Domino policies over default device preferences when
assigning preferences and security settings to devices?

A. Domino policies are more flexible.

B. Domino policies are automatically set up for maximum security.

C. Domino policies can be defined using the IBM Notes Traveler install and setup.

D. Domino policies can be updated via the Notes Traveler web administration interface.

×