Question 1 | Public and private keys can be used to do all but what?
|
A1: | Answer C is correct. Public and private keys cannot encrypt subforms. Answers A, B, and D are incorrect because Public and private keys can be used to encrypt all three of these element types. |
Question 2 | Jake wants to create a secret encryption key. How would Jake go about doing this?
|
A2: | Answer B is correct. The User Security dialog box can be opened from the pull-down menu by selecting File, Security, User Security. Then clicking on Notes Data, Documents from the left navigator opens the Document Encryption screen. From there, Jake clicks on New Secret Key to open the New Secret Encryption Key dialog. Answer A is incorrect because this option has been moved since release 5. Answer C is incorrect because this is not a valid menu option. Answer D is incorrect because, as previously mentioned, the system administrator does not need to be contacted to create a New Secret Key. |
Question 3 | Which of the following keyword field types displays the list of people, servers, groups, and roles in the ACL of the current database?
|
A3: | Answer A is correct. The keyword field type of Use Access Control List for Choices displays the list of people, servers, groups, and roles in the ACL of the current database. Answer B is incorrect because the Use Address dialog for choices displays the Name dialog box to select names from the Domino directory. Answer C is incorrect because there is no Names dialog. Answer D is incorrect because the Use View dialog for choices displays a dialog box displaying entries from a column in an existing view. |
Question 4 | If a user is listed both explicitly and implicitly in the database ACL, what is true regarding the rights granted to the user?
|
A4: | Answer D is correct. Despite which access rights are higher between the explicit listing and the groups, the rights granted to the explicit name take precedence. Answer A, B, and C are wrong because which rights are highest (or lowest) are irrelevant when the user is explicitly listed. |
Question 5 | A document was previously created using the Store Form in document. Since then, the following items were removed from the document: $Title, $Info, $WindowTitle, and $Body. Which of the following options takes precedence in determining the form with which the document is opened?
|
A5: | Answer B is correct. If the $Title, $Info, $WindowTitle, and $Body items are removed, effectively the form stored in the document is removed as well. Therefore, answer A is incorrect and B is correct because the next item to be used based upon its precedence is the Form formula (if one has been specified in the view). Answers C and D are incorrect because they have a lower precedence that B. |
Question 6 | Roles help define and further refine control and user capabilities within the application. Using roles, you can programmatically control who can do all of the following, except
|
A6: | Answer E is correct. Roles can programmatically control who can do all of the options displayed. |
3.138.117.75