Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

A system administrator is creating a user directory connector (UDC) for an Active Directory using SSL Which path should the administrator use to configure the UDC?

A.

tls //company domain com/ssI

B.

https //company domain, com

C.

ldaps://compatiy domain com

D.

Idap //company domain com/ssI

A security audit revealed problems with the newly installed multi-node environment The environment was deployed using the default settings for the central and nm nodes All possible services have been added to the rim node

The audit was based on the current IT security policy which states:

* All traffic between servers should be encrypted

* 2 56-bit encryption is required

* Traffic between client and server should be encrypted and trusted

* iOS devices must De supported

* Password length must be at least eight characters and include at least one number and one specie! character

What should the system administrator deploy to meet these requirements?

A.

A reverse proxy in the DMZ

B.

A third-party trusted certificate

C.

A certificate with third-party VPN

D.

A web app firewall in the environment

A system administrator must set up security that does NOT allow certain users to create objects in published apps. The users that should NOT be able to create objects are in an AD group called LimitedUsers.

Which security rule should the administrator use to meet this requirement?

A.

Resource filter App_*

Action Create

Rule Condition: (resource, objectType=charts’’ and user group=’’ LimitedUsers’’)

Context Both in hub and QMC

B.

Resource filter App_*

Action Create

Rule Condition: (resource, objectType=charts’’ and user group=’’ LimitedUsers’’)

Context: Only in hub

C.

Resource filter App_*

Action Create

Rule Condition: (resource, objectType=charts’’ and user group=’’ LimitedUsers’’)

Context: Both in hub and OMC

D.

Resource filter App_*

Action Create

Rule Condition: (resource, objectType=charts’’ and user group=’’ LimitedUsers’’)

Context: Only in hub

A system administrator has a Qlik Sense environment with a central node and a scheduler node. One of the apps loads data from text files which are located in the FinanceData folder on the D drive on the central node

The system administrator creates a folder data connection and sets Name = Finance Data and Path = D :\FinanceData

When the reload task runs for lint firs! lime, it tails

What is the cause of the error?

A.

The network share is NOT configured yet

B.

Resources are limited in the current scheduler node

C.

Port 4747 was NOT opened on the central node

D.

Access permissions to the FinanceData folder are No granted to users

A user needs to update a published app in the Finance stream. After the changes have been made, the needs to be moved to the Accounting stream. The user only has access to a laptop running windows 7(32-bit). The owner of all published apps is the sa_repository user.

Which steps should a system administrator take to efficiently complete this task?

A.

1. Change the app owner to the user to make changes

2. Add the Accounting tag to the app

3. Move the app to the Accounting stream

B.

1. Give the user permissions to make changes to the app

2. Move the app to the Accounting Stream

C.

1. Export the app to a location for the user to make the changes using Qlik Sense Desktop

2. Import the app back using QMC after the changes have been made

3. Publish the app to the Accounting stream

D.

1Change the app owner to the user to make changes

2Move the app to the Accountings stream

A system administrator needs to set up a solution for mobile device users to access the Qlik Sense hub. The solution must meet several requirements.

* Support IOS devices

* Can be used in remote locations where users do NOT have laptop or desktop computers

* Ability to access Qlik Sense outside the office network without a compatible tunnel solution

* Ability to access Qlik Sense using a secure gateway

What should the system administrator do to meet these requirements?

A.

Download the QVF and copy it to the mobile devices

B.

Copy the SSL certificates to the IOS devices, and then access the hub via a browser

C.

Set up access to the Qlik Sense hub via VPN

D.

Implement a Enterprise Mobile Management solution

Refer to the exhibit.

A system administrator creates the security rule shown No other custom security rules exist

What effect will the security rule have when applied to a user?

A.

If the user Is in AAAConsumer group, the user can create app objects in published apps

B.

If the user is NOT In AAAConsumer group, the user cannot create sheets

C.

If the user is NOT in AAAConsumer group, the user can create app objects in published apps

D.

If the user is NOT in AAAConsumer group, the user can create app objects in non-published apps

A Qlik Sense environment uses-based license types. A user, who can typically create new apps in personal Work, can no longer create new apps. The Personal Work area is NOT displayed for this user.

How should the system administrator resolve this issue?

A.

In License Management, verify that Analyzer access rules applies to this user

B.

In License Management, verify that Professional access rules applies to this user

C.

In Users, look up the user and verify that the users assigned the ContentAdmin role

D.

In Audit, select Audit license rules, and verify there are no rules for this user.

A system administrator adds RIM B to a two node environment using the central node as the proxy. The system administrator is using the default virtual proxy for the central node to access the hub.

The system administrator sets up a load balancing rule to have all apps served on both RIM A and RIM B. the system administrator performs the following steps.

1. Disable the default load balancing rule, ResourcesOnNonCentralNodes’’

2. Create a new rule with the Resource filter ‘’App_*’’ and checks Load balancing

3. Sets the condition to ((node.name=RIM A’’ or node name=RIM B’’))

The rule is successfully verified. The system administrator has users log in to the hub and open apps to verify that they are opening on RIM B. However, after multiple users open the app, there still NO report of activity of activity on RIM B.

What is causing this issue?

A.

There is a rule overlapping the custom load balancing rule

B.

The filter should be ((node.name="RIM A’’) and (node name="RiM B"))

C.

A network connection problem is occurring and the load balancing is NOT working

D.

The RIM B Engine has NOT been added to the virtual proxy

Refer to the exhibit.

A system administrator creates this security rule to keep User1 out of the finance stream.

((user.name1 =User1''))

After conducting an audit on the finance stream, the system administrator notices that the security rule does NOT function as expected.

What is censing this issue?

A.

The syntax of the security rule for User1 is NOT correct

B.

The resource filter which applies to User1 does NOT include App_" to deny access for every app in the stream

C.

Another security rule is allowing User1 Read and Publish permissions

D.

UDC synchronization has NOT been performed