Exam Code: C2040-986
Exam Name: Creating IBM Lotus Notes & Domino 8.5 Applications with Xpages &Advanced Technique
To approve an expense report, Quy goes to a controlled-access section and marks the Status field “Approved”. Status is a sign-enabled field. When is the signature attached?
B. When the document is saved
C. When the document is mailed
D. When the document is encrypted
Josh needs to associate the Price and ProductName fields of the Sales database with fields from the Inventory table in a relational database. His company uses DECS. He has created a Data Connection Resource to handle the connection to the Inventory table. What is the next step to make this connection available to fields on the Product form?
A. From the Advanced tab of the ACL, select “Allow connection to external databases using DCRs”.
From the Defaults tab of the Product form properties dialog, click Browse by the Data Source
Options and select the DCR.
B. From the Advanced tab of the database Properties, select “Allow connection to external
databases using DCRs”. From the Data Connection Resource properties, select the Product
form under “Connection enabled for?
C. From the Advanced tab of the ACL, select “Allow connection to external databases using
From the Security tab of the Form Properties dialog, click Browse by the Data Source
Options and select the DCR.
D. From the Basics tab of the Database properties, select “Allow connection to external
databases using DCRs”. From the Defaults tab of the Form Properties dialog, click Browse
by the Data Source Options and select the DCR.
Dierdre is periodically asked to update the Readers field in documents created with the SalesOrder form. If a person’s name changes, they are no longer able to access documents they’d been able to access in the past. Dierdre would like the Readers fields to be automatically updated when someone’s name has been changed in the Domino directory. How can she do this?
A. Open the Security tab of the SalesOrder Form properties. Place a checkmark next to “Enable
B. Open the Advanced tab of the database ACL. In the selection list for Action, choose “Modify
all Readers and Authors fields”.
C. Open the Security tab of the Database properties. In the selection list for Administration
Actions, choose “Update all Readers and Authors fields”.
D. Ask a Notes Administrator to enable “Maintain Reader/Author field consistency” on the
Security tab of the server document for her application server.
Juanes needs to import some data from a custom application not using a standard database engine, which is being migrated to a Lotus Notes/Domino application. How can he accomplish this task?
A. Use Lotus Enterprise Integrator.
B. Import data using one of the built-in connection services like DECS or connectors.
C. Export the data to XML on the old application and import it using XMLT.
D. Export the data from the old application to one or more ASCII files and import them by
using LotusScript file access methods.
Which of the following describes the destination URL that is generated by Lotus Domino when the user enters */projects/cio/index.html as the URL?
Mary is posting a discussion database on the Web. She would like to give general users Author access to the database, as long as they identify themselves and have registered with her site. Which one of the following should Mary do to ensure that all users accessing her database are identified and have Author access?
A. Create an Authors field on her forms and set it to Anonymous.
B. Set the database ACL Default entry to No Access and set the Anonymous to Author.
C. Set the database ACL Default entry to Author and set the Anonymous to No Access.
D. Set the form security property, “Who can create documents with this form”, to only allow users
in the Author role.
Jim is looking at the Properties dialog box for an agent. Which one of the following best describes the use of the “Allow user activation” option?
A. Allows users with Editor access or above in the ACL to run an agent
B. Allows users with Author access or above in the ACL to run an agent
C. Allows users with Editor access or above in the ACL to enable an agent
D. Allows users with Author access or above in the ACL to enable an agent
Monique’s laptop was stolen. Monique had locally encrypted the databases on her machine using medium encryption. Which one of the following can unauthorized users do?
B. Compact the databases
C. Read copies of the databases made through the operating system
D. Use their user ids to access local databases on Monique’s workstation
Marge wants to track user preference information while users navigate through her Web site, but does not want to require users to authenticate when accessing the site. Which of the following should she use to track the user information?
C. User profile documents
D. The users must authenticate
Winnie is enhancing the interface on the Corporate Phone Book Web application. Ted, the graphics designer who is providing Winnie with the images for her Domino application, has suggested that she use image resource sets. What is a feature that Winnie can incorporate by using image resource sets?
A. A vertical image set can be used to incorporate effects using the onmouseover, onmouseout,
and onclick events of an image on an XPage.
B. A vertical image set can be used to incorporate effects using the Normal, Mouse-over, Selected,
and Mouse-down image states of a Domino Web page image.
C. A horizontal image set can be used to add effects when a user hovers the mouse over an image.
For example, the normal image could be replaced with a larger image when the mouse
hovers over it.
D. A horizontal image set can be used to add effects when a user hovers the mouse over an image.
For example the normal image could be replaced with an image with different coloring when
the mouse hovers over it.
What is the purpose of using XSLT in a Lotus Domino Web application?
A. To define what DXL should be available for export.
B. To allow a Web service to interact with a Java agent.
C. To display a view as HTML without using a Java applet.
D. To transform XML documents to HTML or even to another XML document.
Nancy is creating a Web application and she needs anonymous users to be able to read content and create certain documents. What does Nancy need to do?
A. Anonymous users cannot create documents if the ACL is set to Reader.
B. Anonymous must be set to Author in the ACL and forms must be blocked to Anonymous users.
C. Nancy needs to create an Anonymous entry to the ACL with access set to Author. Then, using
@Formula she needs to validate if a document is being created by an Anonymous user.
D. Nancy needs to create an Anonymous entry to the ACL with access set to Reader and the option
“Write public documents.” She also needs to make the forms Available to Public Access users.
Joy wants to implement single sign-on for her Lotus Domino Web applications. What does she need to do?
A. Encode the Single Sign-On form in each database.
B. Enable “Use Single Sign-on” in the database properties.
C. Ensure that all servers are using the same certificate authority.
D. Update the “Session authentication” field in the server’s configuration document.
DJ is developing his first Lotus Domino application. He wants to show a particular set of data to unauthenticated users and provide additional data to authenticated users. Which of the following can DJ use to determine whether the user is authenticated or not?
A. @WebName to get the current user’s name
B. @UserName, which returns “Anonymous” for unauthenticated users
C. @IsAuthenticated to determine if the user is authenticated or not
D. @WebUserName, which returns an empty string ( “” ) when a user is not authenticated
Which of the following statements describes the function of SSL?
A. SSL encrypts the database ahead of transmission by using a SOCKS proxy.
B. SSL encrypts the database by creating a certificate authority as a key ring.
C. SSL encrypts the transmission of HTTP by using the user’s ID as an encryption key
D. SSL encrypts the transmission of HTTP by using a registered certificate as an encryption key.
Barney imports a WSDL file into a LotusScript script library, which generates code to call the Web service methods defined by the WSDL file. Where can he use this script library?
A. Only in agents
B. Only in agents that run on the server
C. Only in agents and form or view actions
D. Anywhere that LotusScript can be used
If you want to pass IBM C2040-986 successfully, donot missing to read latest lead2pass IBM C2040-986 practice tests.
If you can master all lead2pass questions you will able to pass 100% guaranteed.