C2020-615 IBM Cognos Real-Time Monitoring Developer
C2020-615 exam is known as IBM Cognos Real-time Monitoring Developer. There are 60 questions in real IBM C2020-615 exam, which will take the candidates 90 minutes to complete the test. The required passing score of IBM C2020-615 exam is 65%. The test language is English. Candidates can register IBM C2020-615 exam at Pearson VUE testing center.
IBM Certified Developer - Cognos Real-time Monitoring is the related certification of C2020-615 exam. The IBM Cognos Financial Statement Developer C2020-614 exam covers key concepts, technologies, and functionality of Real-time Monitoring.IBM C2020-615 exam objectives are as follows.
Architecture (18%)
knowledge of architecture concepts
Demonstrate of integration with Cognos 10
knowledge of Streaming Data Store concepts
Describe data acquisition concepts
Describe Alerting Engine concepts
Demonstrate of various system settings
Business Requirements and Key Performance Indicators (10%)
Demonstrate appropriate use-cases for the solution
Demonstrate appropriate KPIs for the solution
Data Modeling (30%)
Demonstrate of Agents
Describe Data Streams concepts
knowledge of Lookup Tables
Demonstrate of View concepts
knowledge of View implementation
Demonstrate of Cubes
Security and Authentication Providers (9%)
Identify security model concepts
Demonstrate knowledge of Authentication Providers
Business Rules and Exception Management (14%)
Demonstrate basic knowledge of the exception management architecture
Demonstrate of exception management advanced capabilities
knowledge of alert subscription
Demonstrate of augmenting alerts with data
Dashboard (12%)
Demonstrate of Dashboard and Dashboard Object concepts
knowledge of Watchpoints
Business Insight (7%)
Demonstrate of using RTM objects
When editing a user's Access Permissions, what is meant by the term Effective Permissions?
A. the greatest level of permission assigned by Role-Granted and User-Specific permissions
B. the user's permissions against the currently selected object
C. the lowest level of permission assigned by Role-Granted and User-Specific permissions
D. the permission implementation that most effectively secures your application
Answer: A
A customer switches from internal authentication to external LDAP authentication. They have an existing internal user "Bob" with a password "internal". They have another user named "Bob" in the external LDAP server with password "external". They synchronize the users from the external LDAP server to Real-time Monitoring. Why is the customer unable to login with the username and password "Bob/external"?
A. Synchronization succeeded and the external user Bob replaced the existing internal user Bob.
B. Synchronization failed as there was an existing internal user Bob in the metadata, so no new external user was imported.
C. Synchronization succeeded and the external user Bob was skipped because there was an existing internal user Bob in the metadata.
D. Synchronization failed but the internal user Bob was deleted and no new external user was imported.
Answer: C
A user belongs to a role whose members have read-only access to views, cubes, and dimensions. Why is this user able to edit a particular view in the Real-time Monitoring Workbench?
A. The user has been granted read/write permission directly on the DataStream used by the view.
B. The role the user belongs to has been granted read/write permission directly on the DataStream used by the view.
C. All views are editable by default, regardless of permissions inherited by the role.
D. The user has been granted read/write permission directly on the view object.
Answer: D
A virtual machine farm technician is monitoring the memory usage of hundreds of virtual machines in the farm. The technician previously defined a rule to be informed with an immediate notification if the memory usage on any virtual machine remains above 90 percent for two minutes. The technician now wants to reset the alert once the memory usage stabilizes and falls below 80 percent after such an incident. Which three steps are part of the solution? (Choose three.)
A. Define a rule with condition -- memory usage
B. Define a rule with condition -- memory usage
C. Create a new alert and select "Reset an alert".
D. Select the alert defined for "memory usage > 90%" and choose "Reset an alert for a specific occurrence".
E. Specify "Maintain alert states for".
Answer: B,D,E
http://www.c4040.com/c2020-615-online-test-ibm-cognos-real-time-monitoring-developer/
IBM Certified Developer - Cognos Real-time Monitoring is the related certification of C2020-615 exam. The IBM Cognos Financial Statement Developer C2020-614 exam covers key concepts, technologies, and functionality of Real-time Monitoring.IBM C2020-615 exam objectives are as follows.
Architecture (18%)
knowledge of architecture concepts
Demonstrate of integration with Cognos 10
knowledge of Streaming Data Store concepts
Describe data acquisition concepts
Describe Alerting Engine concepts
Demonstrate of various system settings
Business Requirements and Key Performance Indicators (10%)
Demonstrate appropriate use-cases for the solution
Demonstrate appropriate KPIs for the solution
Data Modeling (30%)
Demonstrate of Agents
Describe Data Streams concepts
knowledge of Lookup Tables
Demonstrate of View concepts
knowledge of View implementation
Demonstrate of Cubes
Security and Authentication Providers (9%)
Identify security model concepts
Demonstrate knowledge of Authentication Providers
Business Rules and Exception Management (14%)
Demonstrate basic knowledge of the exception management architecture
Demonstrate of exception management advanced capabilities
knowledge of alert subscription
Demonstrate of augmenting alerts with data
Dashboard (12%)
Demonstrate of Dashboard and Dashboard Object concepts
knowledge of Watchpoints
Business Insight (7%)
Demonstrate of using RTM objects
When editing a user's Access Permissions, what is meant by the term Effective Permissions?
A. the greatest level of permission assigned by Role-Granted and User-Specific permissions
B. the user's permissions against the currently selected object
C. the lowest level of permission assigned by Role-Granted and User-Specific permissions
D. the permission implementation that most effectively secures your application
Answer: A
A customer switches from internal authentication to external LDAP authentication. They have an existing internal user "Bob" with a password "internal". They have another user named "Bob" in the external LDAP server with password "external". They synchronize the users from the external LDAP server to Real-time Monitoring. Why is the customer unable to login with the username and password "Bob/external"?
A. Synchronization succeeded and the external user Bob replaced the existing internal user Bob.
B. Synchronization failed as there was an existing internal user Bob in the metadata, so no new external user was imported.
C. Synchronization succeeded and the external user Bob was skipped because there was an existing internal user Bob in the metadata.
D. Synchronization failed but the internal user Bob was deleted and no new external user was imported.
Answer: C
A user belongs to a role whose members have read-only access to views, cubes, and dimensions. Why is this user able to edit a particular view in the Real-time Monitoring Workbench?
A. The user has been granted read/write permission directly on the DataStream used by the view.
B. The role the user belongs to has been granted read/write permission directly on the DataStream used by the view.
C. All views are editable by default, regardless of permissions inherited by the role.
D. The user has been granted read/write permission directly on the view object.
Answer: D
A virtual machine farm technician is monitoring the memory usage of hundreds of virtual machines in the farm. The technician previously defined a rule to be informed with an immediate notification if the memory usage on any virtual machine remains above 90 percent for two minutes. The technician now wants to reset the alert once the memory usage stabilizes and falls below 80 percent after such an incident. Which three steps are part of the solution? (Choose three.)
A. Define a rule with condition -- memory usage
B. Define a rule with condition -- memory usage
C. Create a new alert and select "Reset an alert".
D. Select the alert defined for "memory usage > 90%" and choose "Reset an alert for a specific occurrence".
E. Specify "Maintain alert states for".
Answer: B,D,E
http://www.c4040.com/c2020-615-online-test-ibm-cognos-real-time-monitoring-developer/
Source...