1.
An IBM Notes Traveler administrator wants to allow users to manage their own security, such as 'Wipe Device', and 'Deny Access'. What must the administrator do to allow this?
2.
Which statement is true of IBM Notes Traveler for Android devices?
3.
Which is required for Blackberry 10 devices to connect with IBM Domino mail?
4.
What reason might an administrator choose to implement the IBM Notes Traveler default settings over the Notes Traveler Policy Settings document?
5.
Why might a device's Access State be set to "Prohibit" in the IBM Notes Traveler web administration interface?
6.
Which statement is true of sending encrypted mail messages from Apple iOS devices?
7.
An administrator adds User A to an IBM Notes Traveler device settings document, which requires an alphanumeric password for Apple devices. The administrator then adds User A to Group A, which is listed in the Notes Traveler Policy Settings document. The Notes Traveler Policy Settings document requires Apple users to have a device password length of 6. What behavior will User A experience on the device?
8.
The traveler utility is used to update the password on the enterprise database when the password is updated. Where should this be run from?
9.
Which statement describes IBM Traveler constraint processing?
10.
Where is the configuration setting which denies user access to IBM Notes Traveler?