Free QSSA2018 Exam Braindumps (page: 3)

Page 2 of 13

A system administrator creates a custom property called “dept” and assigns it to users and apps. The value of the custom property are department names such as Accounting, Finance, and IT. Users with the same value for “dept” can see and edit each other’s apps. Users with different values for the property should NOT see each other’s apps.

Which security rule should the administrator use to meet this requirement?

  1. Resource: App_*, Stream_*
    Conditions: user.@dept=app.@dept
  2. Resource: App_*
    Conditions: user.@dept=resource.id
  3. Resource: App_*
    Conditions: user.@dept=resource.@dept
  4. Resource: App_*
    Conditions: user.@dept=resource.description

Answer(s): A



A user owns an app that was previously published and wants to delete the app in the hub. The user is NOT able to delete the app.

What could be causing this issue?

  1. The app is open and is being accessed by another user
  2. Published apps can only be deleted from the QMC
  3. The user needs to be assigned the RootAdmin role
  4. The user needs to be assigned the ContentAdmin role

Answer(s): B


Reference:

https://help.qlik.com/en-US/sense/November2019/Subsystems/Hub/Content/Sense_Hub/Apps/delete-app.htm



A security audit revealed problems with the newly installed multi-node environment. The environment was deployed using the default settings for the central and rim nodes. All possible services have been added to the rim node.

The audit was based on the current IT security policy when states:
-All traffic between servers should be encrypted
-256-bit encryption is required
-Traffic between client and server should be encrypted and trusted
-iOS devices must be supported
-Password length must be at least eight characters and include at least one number and one special character

What should the system administrator deploy to meet these requirements?

  1. A reverse proxy in the DMZ
  2. A third-party trusted certificate
  3. A certificate with third-party VPN
  4. A web app firewall in the environment

Answer(s): B


Reference:

https://help.qlik.com/ru-RU/sense/February2019/Subsystems/PlanningQlikSenseDeployments/Content/Sense_Deployment/Server-Security.htm



A system administrator adds RIM B to a two-node environment using the central node as the proxy. The system administrator is using the default virtual proxy for the central node to access the hub.

The system administrator sets up a load balancing rule to have all apps served on both RIM A and RIM B. The system administrator performs the following steps:
1. Disables the default load balancing rule, “ResourcesOnNonCentralNodes”
2. Creates a new rule with the Resource filter “App_*” and checks Load balancing
3. Sets the condition to ((node.name=“RIM A” or node.name=”RIM B”))

The rule is successfully verified. The system administrator has users log in to the hub and open apps to verify that they are opening on RIM B. However, after multiple users open the same app, there is still NO report of activity on RIM B.

What is causing this issue?

  1. There is a rule overlapping the custom load balancing rule
  2. The filter should be ((node.name=“RIM A”) and (node.name=“RIM B”))
  3. A network connection problem is occurring and the load balancing is NOT working
  4. The RIM B Engine has NOT been added to the virtual proxy

Answer(s): D


Reference:

https://community.qlik.com/t5/Qlik-Sense-Deployment-Management/Load-Balancing-Consumer-Nodes/td-p/1525604






Post your Comments and Discuss QlikView QSSA2018 exam with other Community members:

QSSA2018 Exam Discussions & Posts