IBM C2090-623 Exam (page: 2)
IBM Cognos Analytics Administrator V1
Updated on: 25-Dec-2025

Viewing Page 2 of 13

An administrator needs to add users from multiple authentication providers to a single role. What needs to be done?

  1. Log on to each of the namespaces before starting.
  2. Add external namespaces to the Cognos namespace manually.
  3. Add the users to a Cognos group, then add the group to the Cognos role.
  4. Import the users to the Cognos namespace first, then add the users to the Cognos role.

Answer(s): B

Explanation:

In the Cognos Analytics user interface, authentication providers are represented by namespaces. Cognos Analytics supports the following types of authentication providers:
Authentication providers are configured in IBM Cognos Configuration, under the Security > Authentication category. After the provider namespace is added there, and the IBM Cognos service is restarted, the namespace name is displayed in Manage > Accounts, and users can log on to Cognos Analytics using that namespace.


Reference:

https://www.ibm.com/support/knowledgecenter/en/SSEP7J_11.0.0/com.ibm.swg.ba.cognos
.ag_manage.doc/c_ca_external_namespaces.html



To monitor performance, an administrator has set thresholds on a system metric and notices that over time, the metric score has changed from green, to yellow, to red, and then back to yellow.
Which system metric is the administrator monitoring?

  1. Dispatcher: JVM: Current heap size
  2. ContentManageService: Request: Number of failed requests
  3. ReportService: Process: Number of processes high watermark
  4. BatchReportService: Request: Percentage of successful requests

Answer(s): B

Explanation:

Figure: A detailed view showing the status of individual system metrics for a service


Reference:

https://www.ibm.com/developerworks/data/library/cognos/infrastructure/cognos_specific/pa ge589.html



An administrator needs to setup security for a newly installed environment. Which of the following is a valid step?

  1. Remove the default authentication provider.
  2. Enable anonymous access for selected users, groups, or roles.
  3. Delete the Everyone group to limit access to the environment for selected users, groups, and roles.
  4. Add trusted users, groups, or roles to the System Administrators role, and then remove the Everyone group from the role.

Answer(s): D

Explanation:

You may not want all users that exist in an authentication source to have access to IBM Cognos software. To secure IBM Cognos software, configure the product so that only users who belong to a specific group or role in your authentication source, or in the Cognos namespace, are allowed access.
We recommend using the Cognos namespace because it contains preconfigured groups and roles that help you to secure IBM Cognos software quickly. One of the preconfigured groups is Everyone.
By default, the group Everyone belongs to several built-in groups and roles in the Cognos namespace.
If you decide to use the Cognos namespace, you must remove the Everyone group from all built-in groups and roles and replace it with groups, roles, or users authorized to access IBM Cognos software.


Reference:

IBM Cognos Administration Version 10.1.0, Administration and Security Guide, page 64



An administrator created a Content Store export and included the user account information. How can a listing of the content be exported?

  1. Within the export, ensure the Recording level option is set to Trace.
  2. By default when the Content Store is backed up, a full detailed listing is generated and available in the Logs folder.
  3. Modify the Advanced settings on the ContentManagerService by adding the parameter CM.DeploymentDetailEntireContent with a value of true.
  4. Modify the Advanced settings on the ContentManagerService by adding the parameter CM.DeploymentIncludeConfiguration with a value of true.

Answer(s): D

Explanation:

You can specify if configuration objects and their children are included as part of deployment. By default, they are not included.
You can change the default setting using the advanced setting CM.DEPLOYMENTINCLUDECONFIGURATION. By default, it is set to False (do not include configuration objects in deployments).
To change the default to include configuration objects and their children, set it to True.



An administrator wants to describe the internal architecture and request flow for a Query service of an executed DQM report.
How is this done?

  1. A report specification is executed via BIBus which directly queries via RDBMS adapter, and caches then waits for the result and generates the report output.
  2. A report specification is executed via Query service which directly queries via RDBMS adapter, and caches then waits for the result and generates the report output.
  3. A report specification is executed via Query service which parses the request into two trees and executes via RDBMS adapter and caches then waits for the result and generates the report output.
  4. A report specification is executed via BIBus then to Query service which parses the request into two trees and executes via RDBMS adapter and caches then waits for the result and generates the report output.

Answer(s): B

Explanation:

The SQL engine obtains data directly from the RDBMS Adapter. The Query Execution Engine updates the secure Data Cache with dimensional data for future reuse.
Note: A report specification is an executable definition of a report, including query and layout rules, which can be combined with data to produce a report output.


Reference:

https://www.ibm.com/developerworks/data/library/cognos/infrastructure/cognos_specific/pa ge529.html



Viewing Page 2 of 13



Share your comments for IBM C2090-623 exam with other users:

Bhavya 9/12/2023 7:18:00 AM

help to practice csa exam
Anonymous


Malik 9/28/2023 1:09:00 PM

nice tip and well documented
Anonymous


rodrigo 6/22/2023 7:55:00 AM

i need the exam
Anonymous


Dan 6/29/2023 1:53:00 PM

please upload
Anonymous


Ale M 11/22/2023 6:38:00 PM

prepping for fsc exam
AUSTRALIA


ahmad hassan 9/6/2023 3:26:00 AM

pd1 with great experience
Anonymous


Žarko 9/5/2023 3:35:00 AM

@t it seems like azure service bus message quesues could be the best solution
UNITED KINGDOM


Shiji 10/15/2023 1:08:00 PM

helpful to check your understanding.
INDIA


Da Costa 8/27/2023 11:43:00 AM

question 128 the answer should be static not auto
Anonymous


bot 7/26/2023 6:45:00 PM

more comments here
UNITED STATES


Kaleemullah 12/31/2023 1:35:00 AM

great support to appear for exams
Anonymous


Bsmaind 8/20/2023 9:26:00 AM

useful dumps
Anonymous


Blessious Phiri 8/13/2023 8:37:00 AM

making progress
Anonymous


Nabla 9/17/2023 10:20:00 AM

q31 answer should be d i think
FRANCE


vladputin 7/20/2023 5:00:00 AM

is this real?
UNITED STATES


Nick W 9/29/2023 7:32:00 AM

q10: c and f are also true. q11: this is outdated. you no longer need ownership on a pipe to operate it
Anonymous


Naveed 8/28/2023 2:48:00 AM

good questions with simple explanation
UNITED STATES


cert 9/24/2023 4:53:00 PM

admin guide (windows) respond to malicious causality chains. when the cortex xdr agent identifies a remote network connection that attempts to perform malicious activity—such as encrypting endpoint files—the agent can automatically block the ip address to close all existing communication and block new connections from this ip address to the endpoint. when cortex xdrblocks an ip address per endpoint, that address remains blocked throughout all agent profiles and policies, including any host-firewall policy rules. you can view the list of all blocked ip addresses per endpoint from the action center, as well as unblock them to re-enable communication as appropriate. this module is supported with cortex xdr agent 7.3.0 and later. select the action mode to take when the cortex xdr agent detects remote malicious causality chains: enabled (default)—terminate connection and block ip address of the remote connection. disabled—do not block remote ip addresses. to allow specific and known s
Anonymous


Yves 8/29/2023 8:46:00 PM

very inciting
Anonymous


Miguel 10/16/2023 11:18:00 AM

question 5, it seems a instead of d, because: - care plan = case - patient = person account - product = product2;
SPAIN


Byset 9/25/2023 12:49:00 AM

it look like real one
Anonymous


Debabrata Das 8/28/2023 8:42:00 AM

i am taking oracle fcc certification test next two days, pls share question dumps
Anonymous


nITA KALE 8/22/2023 1:57:00 AM

i need dumps
Anonymous


CV 9/9/2023 1:54:00 PM

its time to comptia sec+
GREECE


SkepticReader 8/1/2023 8:51:00 AM

question 35 has an answer for a different question. i believe the answer is "a" because it shut off the firewall. "0" in registry data means that its false (aka off).
UNITED STATES


Nabin 10/16/2023 4:58:00 AM

helpful content
MALAYSIA


Blessious Phiri 8/15/2023 3:19:00 PM

oracle 19c is complex db
Anonymous


Sreenivas 10/24/2023 12:59:00 AM

helpful for practice
Anonymous


Liz 9/11/2022 11:27:00 PM

support team is fast and deeply knowledgeable. i appreciate that a lot.
UNITED STATES


Namrata 7/15/2023 2:22:00 AM

helpful questions
Anonymous


lipsa 11/8/2023 12:54:00 PM

thanks for question
Anonymous


Eli 6/18/2023 11:27:00 PM

the software is provided for free so this is a big change. all other sites are charging for that. also that fucking examtopic site that says free is not free at all. you are hit with a pay-wall.
EUROPEAN UNION


open2exam 10/29/2023 1:14:00 PM

i need exam questions nca 6.5 any help please ?
Anonymous


Gerald 9/11/2023 12:22:00 PM

just took the comptia cybersecurity analyst (cysa+) - wished id seeing this before my exam
UNITED STATES