Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

IBM C2090-623 - IBM Cognos Analytics Administrator V1

Page: 1 / 2
Total 60 questions

A report author gets the following error message:

“An error has occurred. Please contact your administrator. The complete error has been logged by CAF with SecureErrorID:2004-05-25-15:44:11.296-#9.”

How can the administrator get the complete error message?

A.

Open the cogerror.log file using a text editor.

B.

Open the cogserver.log file using a text editor.

C.

Run the user report errors audit report from the samples Audit package.

D.

Run the user session details audit report from the samples Audit package.

An administrator created a Content Store export and included the user account information.

How can a listing of the content be exported?

A.

Within the export, ensure the Recording level option is set to Trace.

B.

By default when the Content Store is backed up, a full detailed listing is generated and available in the Logs folder.

C.

Modify the Advanced settings on the ContentManagerService by adding the parameter CM.DeploymentDetailEntireContent with a value of true.

D.

Modify the Advanced settings on the ContentManagerService by adding the parameter CM.DeploymentIncludeConfiguration with a value of true.

An administrator is reviewing the memory allocations listed below in the current environment.

Which action should the administrator take?

A.

No action is needed.

B.

Increase the current heap size by 20%.

C.

Increase the committed heap size by 50%.

D.

Decrease the maximum heap size by 25%.

An administrator is implementing security by managing and working with the Cognos namespace.

Which statement is true?

A.

To gain access to IBM Cognos Analytics, users can log on to the Cognos namespace.

B.

Create domain users in the Cognos namespace to avoid cluttering the existing authentication provider.

C.

User-defined groups and roles must be created in a 3rd-party authentication provider and cannot be created in the Cognos namespace.

D.

Although the use of the predefined and built-in groups and roles within the Cognos namespace is optional, the Cognos namespace cannot be deleted.

An administrator deleted a group inadvertently then recreated it, but now the access permissions based on that group no longer work.

What must be done?

A.

Re-implement all the access permissions.

B.

On the group properties, select “Apply to all children”.

C.

Make sure that it has the exact same spelling as before.

D.

Restore from a backup selecting only the access permissions.

An administrator is configuring settings for the Cognos Analytics Mobile app.

Which settings can be managed?

A.

To store the user credentials in the IBM Cognos Mobile app.

B.

The maximum number of minutes to store cached credentials.

C.

Allow the user to create an image (screenshot) of the Active Report.

D.

The maximum number of Active Reports to store locally on the mobile device.

An administrator wants to exclude Request level logging details from being captured.

Which logging level must be set?

A.

Basic logging level

B.

Trace logging level

C.

Verbose logging level

D.

Request logging level is turned on by default

An administrator wants to control server workload by putting routing rules in place.

Which components can be used?

A.

a package and/or group or role

B.

a package and/or a server group

C.

a group or role and/or a server group

D.

a package and/or group or role and/or a server group

An administrator wants to start the LifeCycle Manager service.

How can this be done?

A.

Open IBM Cognos Configuration and start the service.

B.

Open Administrative tools, Services, and start the LCM service.

C.

Use the lcm_start.bat command from a command prompt window.

D.

Type the URL in a browser, http://server_name:port_number/lcm_servlet/webcontent/app/main.

An administrator is performing tasks in the IBM Cognos Administration console.

Which task can be performed on the Status > System page?

A.

Enable and disable schedules to control resource utilization in the system.

B.

Monitor upcoming activities, such as reports and jobs, to identify potential impact on system resources.

C.

Stop and start individual services under the control of a dispatcher, such as the BatchReportService service.

D.

Configure datasource connections so that reports can execute, query the datasource, and return a result set.