Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

C2090-623 IBM Cognos Analytics Administrator V1 Questions and Answers

Questions 4

An administrator created a Content Store export and included the user account information.

How can a listing of the content be exported?

Options:

A.

Within the export, ensure the Recording level option is set to Trace.

B.

By default when the Content Store is backed up, a full detailed listing is generated and available in the Logs folder.

C.

Modify the Advanced settings on the ContentManagerService by adding the parameter CM.DeploymentDetailEntireContent with a value of true.

D.

Modify the Advanced settings on the ContentManagerService by adding the parameter CM.DeploymentIncludeConfiguration with a value of true.

Buy Now
Questions 5

An administrator has set up audit logging but needs to diagnose, trace, and filter for a specific user during peak period of system usage.

How can this be done?

Options:

A.

Delete the appended ipfclientconfig.xml in the install_location\configuration directory.

B.

Increase the logging level to search for the user’s first/last name in the audit logging tables.

C.

Set up the Audit Reports package and open the “Users and Reports report”, and filter on the user id.

D.

Connect to the JMX Remote Process service by launching jconsole executable and using the CAMID and enable Dye Trace.

Buy Now
Questions 6

The database containing the Content Store crashed. The administrator needs to restore the Content Store in its entirely including all of the configuration settings that were defined.

What must be done to recover the configuration settings?

Options:

A.

The configuration settings are automatically included when running the import.

B.

Manually apply the settings because configuration settings are not a part of the Content Store deployment.

C.

Configuration settings are not included in the Content Store deployment. The parameter CM.DEPLOYMENTINCLUDECONFIGURATION must be set to true on the ContentManagerService prior to running the Content Store export deployment.

D.

Configuration settings are included in the Content Store deployment but not included in the import unless you set the parameter CM.DEPLOYMENTINCLUDECONFIGURATION to true on the ContentManagerService before running the import.

Buy Now
Questions 7

In a multi-server environment, an administrator wants to ensure that items in the Content Manager Cache service are re-validated every thirty seconds.

Which option would accomplish this?

Options:

A.

Set the memory limit of the Content Manager Cache service to 30000.

B.

Set the DISP.contentManagerCacheService.accountInactivityTimer property to 30000.

C.

Set the DISP.contentManagerCacheService.cacheValidatorTimetoLive property to 30000.

D.

Set the DISP.contentManagerCacheService.cacheValidatorTimetoLinger property to 30000.

Buy Now
Questions 8

An environment has twenty dispatchers. The administrator wants to change one property to the same value for all dispatchers.

How can that be accomplished?

Options:

A.

This can be accomplished if all dispatchers are put inside a folder.

B.

This can be accomplished by changing the desired property for the configuration.

C.

This cannot be accomplished unless the property value is changed for each dispatcher.

D.

This can be accomplished by selecting all dispatchers at once and changing the desired property.

Buy Now
Questions 9

Which attribute can an administrator enable to prevent malicious scripts from reading or manipulating the CAM passport cookie during a user’s session with their Web browser?

Options:

A.

cc_session

B.

userCapabilities

C.

Secure flag enabled?

D.

Enable CAF validation?

Buy Now
Questions 10

An administrator is managing authentication namespaces and needs to delete a namespace.

Which statement is true?

Options:

A.

To recreate a namespace that was previously deleted in IBM Cognos Configuration, a unique ID must be used.

B.

After a namespace has been deleted in IBM Cognos Configuration, it no longer appears in the directory tool.

C.

An inactive namespace in the directory tool is one that was configured, but later deleted in IBM Cognos Configuration.

D.

If a namespace is deleted in IBM Cognos Configuration and is no longer required, any authenticated member of the namespace can delete in permanently in the directory tool.

Buy Now
Questions 11

An administrator wants to describe the internal architecture and request flow for a Query service of an executed DQM report.

How is this done?

Options:

A.

A report specification is executed via BIBus which directly queries via RDBMS adapter, and caches then waits for the result and generates the report output.

B.

A report specification is executed via Query service which directly queries via RDBMS adapter, and caches then waits for the result and generates the report output.

C.

A report specification is executed via Query service which parses the request into two trees and executes via RDBMS adapter and caches then waits for the result and generates the report output.

D.

A report specification is executed via BIBus then to Query service which parses the request into two trees and executes via RDBMS adapter and caches then waits for the result and generates the report output.

Buy Now
Questions 12

An administrator needs to add users from multiple authentication providers to a single role.

What needs to be done?

Options:

A.

Log on to each of the namespaces before starting.

B.

Add external namespaces to the Cognos namespace manually.

C.

Add the users to a Cognos group, then add the group to the Cognos role.

D.

Import the users to the Cognos namespace first, then add the users to the Cognos role.

Buy Now
Questions 13

Which statement is true when working with datasource credentials?

Options:

A.

Users can view and delete datasource credentials from the My Data Sets page.

B.

Users may be prompted for datasource credentials when they view, run, or open an entry, or when they use a schedule or a job.

C.

When determining appropriate access to a datasource, the system first checks the user’s profile to see if they have stored their own datasource credentials.

D.

If a user wants to create a datasource credentials, the administrator must grant Write permissions for the Manage own datasource signons capability for the user.

Buy Now
Questions 14

An administrator is implementing security by modifying access to the secured functions and secured features.

Which statement is true?

Options:

A.

A hyperlink on the Capabilities page represents a secures function that contains secured features.

B.

Granting execute permission on a secured function automatically grants execute permission to all secured features.

C.

As part of the initial security implementation, an administrator must grant access to secured functions and features to the predefined roles.

D.

To view a list of the second functions and features available to them, a user must contact their administrator because only the administrator can perform this function.

Buy Now
Questions 15

An administrator must troubleshoot query execution related issues in a DQM executed report.

How is this achieved?

Options:

A.

By default, settings to trace DQM Query execution are enabled in the system.

B.

Open IBM Cognos Configuration, under IBM Cognos Services/IBM Cognos, select QueryService and check Enable Query execution trace and view logs in /logs/XQE.

C.

Open IBM Cognos Administration portal, on the Configuration tab, select Dispatchers and locate QueryService and check Enable Query execution trace and view logs in /logs/XQE.

D.

Edit the install_location/configuration/qfs_config.xml.sample file and set < parameter name=”EnableQueryTrace” value=”true” > , save as qfs_config.xml, restart services.

Buy Now
Questions 16

All users have unrestricted access in a secured environment.

What must be modified to control this access?

Options:

A.

Delete the “All Authenticated Users” group.

B.

Disable anonymous access using IBM Cognos Configuration.

C.

Modify the advanced properties of the authorization namespace.

D.

Remove the “Everyone” group from the “System Administrators” role.

Buy Now
Questions 17

What is the role of Cognos Access Manager (CAM)?

Options:

A.

To serve as the relational database that stores user data.

B.

To implement authentication, authorization, and encryption.

C.

To start all services that have been enabled and configured.

D.

To route requests from the gateway to local services for execution.

Buy Now
Questions 18

An environment has the following routing rules set:

C2090-623 Question 18

If a report using the ‘Australia Package’ is run by a user belonging to ‘Australia Group’, which server group will the request be sent to?

Options:

A.

Group 1

B.

Group 2

C.

The request will be sent to the first available server because there is more than one rule for the Australia Package.

D.

The request would fail because there is more than one rule for the Australia Package and only one for the Australia group.

Buy Now
Exam Code: C2090-623
Exam Name: IBM Cognos Analytics Administrator V1
Last Update: Apr 30, 2026
Questions: 60

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now C2090-623 testing engine

PDF (Q&A)

$43.57  $124.49
buy now C2090-623 pdf