An Intelligent Map has been created of certain administered entities. Entities are to be added before the map is added to an enterprise summary view. When entities are added to the map, it is unable to be saved. What is the cause of the issue?
Answer(s): C
SolarWinds Intelligent Maps require specific functional permissions within the user's account settings to perform modifications. According to the SolarWinds Platform Administrator Guide, the ability to view a map does not automatically grant the right to edit or save changes to it.The primary cause for being unable to save edits--such as adding new entities or changing the layout--is that the user does not have Intelligent Map edit rights assigned to their user account. In the SolarWinds Web Console, map permissions are granular. An administrator must go to Settings > All Settings > Manage Accounts, select the user, and ensure the "Map Management" or specific "Allow Map Editing" toggle is set to "Yes". If this permission is absent, the user may still be able to interact with the map in a "live" temporary session (moving nodes around for visualization), but the "Save" button will either be disabled or will result in an error because the platform's security layer prevents permanent changes to the database from unauthorized accounts.
A user is building a PerfStack project to troubleshoot an issue with an application. The user is unable to find data for the storage entities that the application accesses beyond application status. Which two of the following reasons explain this discrepancy? (Choose two.)
Answer(s): A,C
PerfStack is a cross-stack data correlation tool, but its visibility is constrained by the underlying data collection modules and user security settings. According to the PerfStack Troubleshooting Guide, there are two primary reasons why specific entity data (like Storage) would be missing:Product Not Installed: Performance data for deep storage metrics (like LUN latency, Array IOPS, or Pool capacity) requires the Storage Resource Monitor (SRM) module or the equivalent HCO storage licensing tiers. If only Server & Application Monitor (SAM) is installed, the user will see the application status, but the specific storage back-end metrics will not be available for selection in the PerfStack pallet because the "collector" for that data doesn't exist.Account Limitations: SolarWinds uses Account Limitations to restrict user access to specific parts of the infrastructure. If a user account is limited to "Department = Sales" or "Vendor = Cisco," and the storage entities do not meet those criteria, those entities will be filtered out of the search results in PerfStack. Even if the data exists in the database, the platform security layer prevents the user from "finding" or displaying it to ensure data privacy and multi-tenant security.
Which two of the following ways can objects be selected when creating custom reports?
Answer(s): A,D
When creating a web-based report in the SolarWinds Platform, the first step is defining the "Selection Method" for the entities you want to include. According to the SolarWinds Platform Reporting Guide, the platform offers two primary user-friendly ways to define the scope of a report:Static Selection: This method allows the administrator to manually pick specific nodes, interfaces, or applications from a list. This is best suited for reports targeting a fixed set of infrastructure, such as "Core Data Center Switches".Dynamic Query Builder: This is the most powerful method for automated reporting. It allows you to define a set of rules--such as "Vendor is Cisco" and "Department is Finance"--that automatically update the report's content as new devices are added to monitoring that match those criteria.While advanced users can use SWQL (SolarWinds Query Language) or SQL to define a custom selection, PostgreSQL (Option B) is not used as the backend database for the SolarWinds Platform. Furthermore, while PowerShell (Option C) can be used to extract data via the SolarWinds Information Service (SWIS) API, it is not a selection method used within the native Web-Based Report builder interface.
Which two of the following formats can chart reports be exported into?
Answer(s): A,B
The export capabilities for chart-based reports are designed to provide both a visual representation and the underlying raw data. According to the SolarWinds Platform Administrator Guide, when viewing or scheduling a report that contains charts or graphs, the system supports two primary export formats:PDF: This format is the standard for visual reports. It captures the rendered chart exactly as it appears in the Web Console, making it ideal for email distribution to management or for archival purposes where the visual trend is more important than the individual data points.CSV (Comma Separated Values): When a chart is exported to CSV, the platform extracts the time- series data points used to generate that chart. This allows technical staff to import the raw performance numbers into external tools like Excel for deeper statistical analysis that may not be possible within the standard web view.While the broader reporting engine supports Excel (.xls) for tabular reports (as seen in Question 8), the specific function for exporting chart components often defaults to CSV for the data layer and PDF for the visual layer. XML (Option D) is typically reserved for report definitions (transferring a report from one server to another) rather than exporting the data results of a chart.
A user indicates when a map is created, only entities can be seen and status is not available. In addition, maps are unable to be nested. What is causing this issue?
Answer(s): B
SolarWinds Intelligent Maps are highly interactive, but their functionality is strictly gated by user permissions. According to the SolarWinds Platform documentation on Map Management, if a user can see nodes but cannot see their real-time status (the colored status ring) or perform advanced functions like nesting one map inside another, it points to a lack of Map Editing Rights.Without "Map Edit" permissions, the user is essentially in a "restricted view" mode. They can see the physical entities that have been placed on a map, but the dynamic overlays--such as the status of the node or the ability to modify the hierarchy of the map--are disabled to prevent unauthorized changes to the global map configuration. To resolve this, a Platform Administrator must navigate to Settings > All Settings > Manage Accounts, edit the specific user account, and change the "Map Management" or "Allow Map Editing" permission to "Yes". This grants the user the ability to interact with the map's metadata and organizational structure, including nesting and status visualization.
How are devices within a network that does not respond to SNMP or WMI, discovered and imported for monitoring?
Network Discovery in the SolarWinds Platform is designed to identify as much infrastructure as possible, even if that infrastructure is "locked down." According to the SolarWinds Platform Administrator Guide, the discovery wizard follows a specific hierarchy of identification.If a device has SNMP or WMI disabled (often the case for security-hardened servers, basic switches, or simple IP-enabled appliances), the platform cannot gather deep performance metrics like CPU or memory. However, the device can still be discovered and monitored for "Up/Down" availability using a simple Ping (ICMP). To ensure these devices are added to the database during a scan, the administrator must check the box to "Include devices that only respond to ICMP" during the discovery configuration. If this is not selected, the discovery engine will skip any IP address that does not provide a valid SNMP or WMI credential response, potentially leaving gaps in the network inventory. This is the standard method for monitoring "Ping-only" nodes.
Which three of the following user accesses are available when restricting access to reports on SolarWinds Hybrid Cloud Observability (HCO)? (Choose three.)
Answer(s): A,B,C
Access control for reporting in Hybrid Cloud Observability (HCO) is highly granular, allowing administrators to define exactly what a "standard" (non-admin) user can do within the reporting module. According to the SolarWinds Platform User Account Management guides, three distinct restrictions can be applied:Preventing Access to All Reports (A): By setting a "Report Limitation" on the user account to "No Reports," the entire module is effectively hidden from the user.Preventing Access to Reports by Other Users (B): This is a privacy and security feature. Administrators can configure report permissions so that users can only see the reports they have created or those explicitly shared with them, hiding the potentially sensitive custom reports created by other teams.Preventing Access to the Report Manager (C): The "Report Manager" is the administrative interface used to create, schedule, and delete reports. By removing the "Manage Reports" permission from a user account, you allow them to view and run existing reports but prevent them from accessing the management tools required to modify them.Option D is logically incorrect because if a user has access to reports at all, they must be able to see the ones they are authorized for; "preventing access to their own reports" while allowing others would not be a standard security use case.
Alerts A and B were assigned the same trigger action through the action manager. What describes what happens when the action is modified while editing alert A's configuration?
Answer(s): D
The SolarWinds Platform utilizes a centralized Action Manager to handle alert notifications and remediations efficiently. According to the SolarWinds Platform Alerting Guide, alert actions (such as sending an email, executing a script, or posting to a Slack channel) are often treated as reusable objects. When multiple alerts (Alert A and Alert B) share the same action from the Action Manager, they are essentially pointing to a single configuration entry in the database.If an administrator edits Alert A and modifies the parameters of that shared trigger action, the change is not isolated to just that alert's workflow. Instead, the trigger action is updated in the manager. Because Alert B is linked to that same action ID, it will immediately reflect the updated configuration the next time it triggers. This behavior is designed to simplify administration; for example, if a primary on-call email address changes, an admin only needs to update the action once rather than editing every individual alert. However, it requires caution: if a user intended to change the action for Alert A only, they should instead "Copy" the action or create a new one to avoid inadvertently altering the behavior of Alert B and all other alerts sharing that centralized action.
Share your comments for SolarWinds Observability-Self-Hosted-Fundamentals exam with other users:
a good source for exam preparation
nice questions
i need ielts general training audio guide questions
please make this content available
content is good
latest dumps please
aside from pdf the test engine software is helpful. the interface is user-friendly and intuitive, making it easy to navigate and find the questions.
questions and options are correct, but the answers are wrong sometimes. so please check twice or refer some other platform for the right answer
90% of questions was there but i failed the exam, i marked the answers as per the guide but looks like they are not accurate , if not i would have passed the exam given that i saw about 45 of 50 questions from dump
answer to this question "what administrative safeguards should be implemented to protect the collected data while in use by manasa and her product management team? " it should be (c) for the following reasons: this administrative safeguard involves controlling access to collected data by ensuring that only individuals who need the data for their job responsibilities have access to it. this helps minimize the risk of unauthorized access and potential misuse of sensitive information. while other options such as (a) documenting data flows and (b) conducting a privacy impact assessment (pia) are important steps in data protection, implementing a "need to know" access policy directly addresses the issue of protecting data while in use by limiting access to those who require it for legitimate purposes. (d) is not directly related to safeguarding data during use; it focuses on data transfers and location.
password lockout being the correct answer for question 37 does not make sense. it should be geofencing.
for question 4, the righr answer is :recover automatically from failures
question number 4s answer is 3, option c. i
very good questions
i am confused about the answers to the questions. are the answers correct?
very usefull
need certification.
great exam prep
i require dump
good morning, could you please upload this exam again,
hi can you please upload the dumps for sap contingent module. thanks
good questions
looking forward to the real exam
good ones for exam preparation
this is a good experience
hi everyone
waiting for the dump. please upload.
upload cks exam questions
awesome training material
where is dump
q. 289 - the correct answer should be b not d, since the question asks for the most secure way to provide access to a s3 bucket (a single one), and by principle of the least privilege you should not be giving access to all buckets.
please i need if possible h12-831,
good collection of questions and solution for pl500 certification
i would like to appear the exam.