A user wants to be able to view the contents of a container entry, such as a package or a folder, and view general properties of the containeritself without having full access to the content. Which permission does the administrator assign to the user?
A. Read
B. Write
C. Traverse
D. Set Policy
When a namespace is no longer used for authentication, what must the administrator do to permanently remove itfrom the content store?
A. Delete the namespace in IBM Cognos Administration, and then delete it in Cognos Configuration.
B. Delete the namespace in IBM Cognos Configuration only.
C. Delete the namespace in IBM Cognos Configuration, and then delete itin IBM Cognos Administration.
D. Delete the namespace in IBM Cognos Administration only.
A user must be able to only view the contents of the Americas Inventory folder. What permissions must be granted to the user for the folder?
A. Write
B. Execute
C. Traverse
D. View
What is true about servlets and services?
A. The Content Manager and dispatcher servlets run within the Java servlet container configured for IBM Cognos BI.
B. If a servicefails, users get email notification.
C. The report service and batch report service run within the Java servlet container.
D. The report service and batch report service are Java-based applications.
There is a load balancing infrastructure set up in a IBM Cognos BI environment. In order to disable the IBM Cognos BI internal load balancing mechanism, what value must be selected for the Load Balancing Mode setting?
A. Custom balancing
B. Cluster compatible
C. Weighted roundrobin
D. Server-side processing
What must the administrator do to set up the sample audit reports that come with IBM Cognos BI?
A. Create a separate data source connection to the content store.
B. Set up an audit databaseand configure log messages to be sent to the database.
C. Set up a log file and configure log messages to be sent to the file.
D. Create a Framework Manager model using either a database or flat file as the data source, and then publish a package.
Computer 1 is set up as a gateway.Computer 2 is set up as a report server.Computer 3 is set up as a report server and a failover content manager.Computer 4 is set up as the default content manager. Where does the administrator need to disable anonymous access?
A. Computers 1, 2, and 3 only
B. Computers 3 and 4 only
C. Computers 2 and 3 only
D. Computer 4 only
What is a recommendation for tuning during high interaction request processing?
A. Set thenumber of jobs lower during peak hours.
B. Set the number of jobs higher during peak hours.
C. Increase the processing capacity on the dispatcher.
D. Increase the peak period hours.
Which statement describes IBM Cognos BI architecture?
A. Communication between components is SOAP on HTTP Protocol.
B. The BIBus is the communication tier of the IBM Cognos BI architecture.
C. The two-tiered architecture is component based and typically separated by firewalls.
D. The content manager consists of a set of protocols governing communication among IBM Cognos BIservices.
When an administrator exports entries from IBM Cognos10, what file gets created?
A. Database backup file
B. Object extract file
C. Deployment archive file
D. Configuration export file