1.
An administrator is implementing security by modifying access to the secured functions and secured features. Which statement is true?
2.
An administrator must troubleshoot query execution related issues in a DQM executed report. How is this achieved?
3.
An administrator has set up audit logging but needs to diagnose, trace, and filter for a specific user during peak period of system usage. How can this be done?
4.
An administrator wants to implement load balancing without using an external load balancing mechanism. What is one approach that can be used to achieve this?
5.
An administrator is managing authentication namespaces and needs to delete a namespace. Which statement is true?
6.
Why would an administrator use IPF (Indication Processing Facility) logging?
7.
An administrator is attempting to import a backup of the entire Content Store into an existing Content Store. What is an instance of when an object will be kept by the default conflict resolution rule?
8.
The following distributed environment has been configured: The administrator wants to limit writes to the audit database connection from the Content Manager server only. What needs to be configured?
9.
An administrator deleted a group inadvertently then recreated it, but now the access permissions based on that group no longer work. What must be done?
10.
What is the role of Cognos Access Manager (CAM)?