C2040-405 | how many questions of C2040-405 practice test?
Q1. The hostname for which server is entered in the "Web federated login approved IdP configurations" field of the ID Vault configuration document?
A. IBM Domino Administration server
B. Domino server that hosts the ID vault
C. Domino Web server that hosts the iNotes users
D. server listed in the "Host names or addresses mapped to this site" field of the IdP Configuration document
Q2. Bill's users are complaining they want to have certain calendar entries more prominent in the calendar view. How can Bill's users customize calendar entries to make certain entries more visible?
A. The user can assign a calendar entry to Important Meeting view.
B. The user can utilize the Add Highlight Color action from the Calendar Action bar.
C. The user can choose to add the importance flag to a calendar entry upon creation.
D. The user can use the "Color-code calendar entries by category" feature to highlight select calendar entries.
Q3. On which IBM Domino server in the domain should Fault Analyzer be enabled?
A. all Mail servers in the domain.
B. the Administration server for the domain
C. the Domino server hosting the Fault Reports mail-in database
D. any Domino server which is defined in the DDM server collection hierarchy
Q4. What widget type can provide advanced features such as using APIs, OAuth, and rendering in an embedded experience?
Q5. JoJo would like to allow secure access to social applications in her IBM Domino applications without requiring users to enter additional passwords. How can she accomplish this?
A. Enable XPages on the Domino server.
B. Configure an Internet Certificate Authority.
C. Set up a key management store on the Domino server.
D. Set up a credential store application on the Domino server.
Q6. What two features does the OpenSocial component included in IBM Domino 9.0 Social Edition provide? (Choose two.)
A. IBM iNotes widgets
B. SPNEGO integration
C. IBM Sametime integration
D. Click-to-Call SUT integration
E. embedded experiences in IBM Notes and iNotes
Q7. Sarah set the MailFileDisabieCompactAtaort=i notes.ini parameter before creating a Program document to run the new Database Maintenance Tool (dbmt). What is the purpose of this parameter?
A. It aborts compact operations when mail needs to be routed.
B. It permanently stops mail delivery. Specify a value of 0 to resume mail delivery.
C. It permanently stops compact operations. Specify a value of 0 to resume compact operations.
D. It temporarily stops the delivery of mail to prevent the router from interrupting compact operations.
Q8. Which statement describes the results of enabling "Do not allow users to set return receipts" Mail policy setting?
A. It controls the default behavior of whether or not a return receipt would be requested for incoming messages.
B. For incoming messages requesting a return receipt, it prevents the sending of the return receipt without notifying the user.
C. It disables return receipt settings for both Notes and iNotes users so that they are not able to manually request a return receipt on outgoing messages.
D. It disables return receipt settings for IBM Notes client users only. IBM iNotes users will still be able to manually request a return receipt for outgoing messages.
Q9. Luis has installed the IBM HTTP Server (IHS) on the same computer as the IBM Domino HTTP server. How should he configure the servers so that users can use SSL/TLS?
A. The IHS server should listen on port 80 and port 443 and the Domino HTTP server should listen on port 9288.
B. The IHS server should listen on port 80 and port 9288 and the Domino HTTP server should listen on port 443.
C. The Domino HTTP server should listen on port 80 and port 443 and the IHS server should listen on port 9288.
D. The Domino HTTP server should listen on port 80 and port 9288 and the IHS server should listen on port 443.
Q10. Where can Ella ensure her users use AES-128 encryption with SHA-2?
A. In the User Registration dialog, it is only available for new users.
B. Person Document, "Can decrypt documents using FIPS 140-2 approved algorithms"
C. Person Document, "Can encrypt documents using FIPS 140-2 approved algorithms"
D. Server Configuration document, "Can encrypt documents using FIPS 140-2 approved algorithms"