REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
Acacallis
 
 

 

Braindumps of 190-510
Domino R5 Designer Fundamentals(AD210)

Exam Questions, Answers, Braindumps (190-510)

Thanx to www.exams.ws and www.4exam.com. But you don't need to have it from both of them, questions from only one are sufficient regarding paper.

 

QUESTION .1
Lilly has created a form that contains a field of Authors data type. The Role [Manager] is listed in the Authors field. Arthur is a reader in the ACL of the database that contains this form and is assigned the [Manager] Role. What can Arthur do with documents created from this form?
A. Read documents only since his ACL is Reader.
B. Edit all documents created from any form within this database.
C. Edit documents created from this form by other users and only read all other documents within the database.
D. Edit and delete documents created from this form and only read other documents within this database.
Answer: A
QUESTION .2
Kristy created a database with several views. Her default view has a read access list limiting use of the view to only some of the database users. What will happen when users restricted from using the view open the database for the first time?
A. Users will be prompted to choose an alternative view.
B. Users will see a view other than the default view.
C. Users will not be able to open the database.
D. Users will see the view even though they aren't included in the read access list.
Answer: C
QUESTION .3
There are both Web browser users and Notes client users at Adam's company. He wants to allow Web browser users to access an application, but not allow access by Notes client users. Which one of the following would he assign in the ACL?
A. No Access to Anonymous, and no entry for -Default.
B. Reader access -Default-, and No Access to Anonymous.
C. Reader access to -Default-, and no entry for Anonymous.
D. No Access to -Default-, and Reader access to Anonymous.
Answer: D
QUESTION .4
Henry wanted to use the Groups and Roles dialog box to find out why Lisa, a content creator, is unable to author documents in an application. However, the dialog box was NOT available. Doing which of the following allows the dialog box to appear?
A. Enforcing local encryption.
B. Enforcing a consistent ACL.
C. Placing Lisa's name in a role.
D. Increasing Henry's ACL access level to Manager.
Answer: D
QUESTION .5
Ronny has submitted some technical support questions to the STS company on their Web site. After 24 hours he goes to the STS folder on the site and reviews feedback. When he selects the folder, he receives a message that he is not authorized to access. However, he authenticated using and SSL Client Certificate and has Author access in the database. Why can't Ronny open the folder?
A. He needs Editor access or higher.
B. He needs to be added to the folder Read Access list.
C. He needs to be added to the Directly Link Access list.
D. He needs to be added to the View Read Access list.
Answer: C.
QUESTION .6
Which one of the following access levels does Erhard need to create Roles in the ACL?
A. Author
B. Manager
C. Designer
D. Role Creator
Answer: B
QUESTION .7
APP1. NSF needs to replicate between two servers. Server A should only be able to add and modify information in Server B's replica copy of APP1. NSF. Server B should be able to pull new and modified information from Server A's replica copy of APP1. NSF, but should not be able to write new or modified information to Server A’s copy. This is not happening. Which one of the following levels of access should each server have?
A. Server A should have Author access to APP1.NSF on Server B. Server B should have Reader access to APP1. NSF on Server A.
B. Server A should have Editor access to APP1.NSF on Server B. Server B should have reader access to APP1. NSF on Server A.
C. Server A should have Manager access to APP1. NSF on Server B. Server B should have Reader access to APP1. NSF on Server A.
D. Server A should have Editor access to APP1.NSF on Server B. Server B should have Depositor access to APP1. NSF on Server A.
Answer: B
QUESTION .8
Which one of the following does this formula do when it is in a form action?
@MailSend("User1";"";"";" Urgent meeting";" Please attend";"")
A. Sends a memo containing a subject and a copy to User1.
B. Sends a memo containing two body field entries to Use1.
C. Sends a memo containing a subject and a remark to User1.
D. Sends a memo with the document attached as a document link.
Answer: C
QUESTION .9
What is the minimum level in the Access Control List that Larry can assign users who must run a shared agent in the Abc Sales database?
A. Designer
B. Reader
C. Author
D. Depositor
Answer: B
QUESTION .10
Ivy, the database manager, has not selected the Create personal folders/views option for Olga, an Author in the database ACL. Which one of the following statements describes how Olga is affected?
A. She cannot create any personal folders or views.
B. She can create personal folders, but not personal views.
C. She can create personal folders and views which are stored locally.
D. He can create personal folders and views which are stored on the server.
Answer: C.
QUESTION .11
Hannibal wants to protect the HTML and graphics files used in his Web site application. Which one of the following will work?
A. Enforcing ECLs.
B. Enforcing consistent ACLs.
C. Creating File Protection documents.
D. This cannot be done using Notes and Domino.
Answer: C
QUESTION .12
Rene created a form read access list for a form in his web-enabled database. Which is true about his form read access list when users access the database via the web?
A. Web users not listed in the form read access list will not be able to open documents created with that form.
B. Form read access lists are not supported when databases are accessed via the web.
C. Web users will see links to documents that they cannot access.
D. Anonymous users will see the documents regardless of the form read access list.
Answer: A

190-510


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend