Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

IBM C2020-615 Exam - Cheat-Test.com

Free C2020-615 Sample Questions:

Q: 1
Which three settings are required to synchronize the user and/or roles from an external directory server, like LDAP, to Real-time Monitoring? (Choose three.)
A. LDAP User Primary Email
B. LDAP User Base DN
C. LDAP Port
D. LDAP Synchronization User DN
E. LDAP Principal DN Prefix
Answer: B,C,D

Q: 2
What contains the minimum required access permissions to create a cube?
A. CREATE for Views, Cubes, and Dimensions, CREATE for Lookup Tables and Data Streams, and READ-ONLY for an existing View
B. CREATE for Views, Cubes, and Dimensions, CREATE for Lookup Tables and Data Streams, and READ-ONLY for the dimensions to include in the cube
C. CREATE for Views, Cubes, and Dimensions, READ-ONLY for an existing View, and READONLY for the dimensions to include in the cube
D. CREATE for Views, Cubes and Dimensions, and READ-ONLY for an existing View
Answer: C

Q: 3
When editing a user's Access Permissions, what is meant by the term Effective Permissions?
A. the greatest level of permission assigned by Role-Granted and User-Specific permissions
B. the user's permissions against the currently selected object
C. the lowest level of permission assigned by Role-Granted and User-Specific permissions
D. the permission implementation that most effectively secures your application
Answer: A

Q: 4
A customer switches from internal authentication to external LDAP authentication. They have an existing internal user "Bob" with a password "internal". They have another user named "Bob" in the external LDAP server with password "external". They synchronize the users from the external LDAP server to Real-time Monitoring. Why is the customer unable to login with the username and password "Bob/external"?
A. Synchronization succeeded and the external user Bob replaced the existing internal user Bob.
B. Synchronization failed as there was an existing internal user Bob in the metadata, so no new external user was imported.
C. Synchronization succeeded and the external user Bob was skipped because there was an existing internal user Bob in the metadata.
D. Synchronization failed but the internal user Bob was deleted and no new external user was imported.
Answer: C

Q: 5
A user belongs to a role whose members have read-only access to views, cubes, and dimensions.
Why is this user able to edit a particular view in the Real-time Monitoring Workbench?
A. The user has been granted read/write permission directly on the DataStream used by the view.
B. The role the user belongs to has been granted read/write permission directly on the DataStream used by the view.
C. All views are editable by default, regardless of permissions inherited by the role.
D. The user has been granted read/write permission directly on the view object.
Answer: D

Q: 6
A virtual machine farm technician is monitoring the memory usage of hundreds of virtual machines in the farm. The technician previously defined a rule to be informed with an immediate notification if the memory usage on any virtual machine remains above 90 percent for two minutes. The technician now wants to reset the alert once the memory usage stabilizes and falls below 80 percent after such an incident. Which three steps are part of the solution? (Choose three.)
A. Define a rule with condition -- memory usage < 90%.
B. Define a rule with condition -- memory usage < 80%.
C. Create a new alert and select "Reset an alert".
D. Select the alert defined for "memory usage > 90%" and choose "Reset an alert for a specific occurrence".
E. Specify "Maintain alert states for".
Answer: B,D,E


© 2014 Cheat-Test.com, All Rights Reserved