A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
A company decides to move servers from on premise to a cloud. A system administrator performs a backup, restore, and brings the server online. When users open the app on the hub, they get an error message indicating the app could not be found.
The system administrator confirms that apps are present in the required location and NO changes have been made.
What could be causing the issue?
- A . Shared persistence path is NOT reachable
- B . Synchronized persistence is in place
- C . The app has been moved from one stream to another
- D . The security rules were broken when the servers were migrated
Open the QMC and reload the monitoring apps
Explanation:
Reference: https://support.qlik.com/articles/000033150
A single-node Qlik Sense environment has all services up and running. Users report apps and sheets are slow to open.
A system administrator works remotely and does NOT have access to the shared file system for the environment. The system administrator’s computer can make requests to the Qlik Sense Repository Service. Due to the system performance issues, a system administrator can NOT run any new reloads. The system administrator receives a warning email about high RAM usage on the server.
Which step should the system administrator take to troubleshoot this issue?
- A . Request the “http://<server.domain.com>/engine/performancecheck/” API
- B . Access the server remotely and inspect the logs in %ProgramData%QlikSenseLogEngine
- C . Request the “https://<server.domain.com>/engine/healthcheck/” API
- D . Request the “https://<server.domain.com>/qmc/audit” API
B
Explanation:
Reference: https://help.qlik.com/en-US/sense-admin/November2019/pdf/Deploy%20Qlik%20Sense% 20Enterprise%20on%20Windows.pdf
Refer to the exhibit.
A user from the HR department has access to the HR stream.
The rule on the stream is:
((user.group!=”Delivery” and user.group!=”Account Manager” anduser.userDirectory!=”Externals”))
When the user tries to open the app in the HR stream, the error in the exhibit displays.
What is causing this error?
- A . The stream rule ‘user.userDirectory’ is excluding the user
- B . The app contains section access that does NOT include the HR stream security rule
- C . The HR group is NOT included in the rule to access the stream and the app
- D . The app contains section access that does NOT include the user
A system administrator creates a custom property called “dept” and assigns it to users and apps. The value of the custom property are department names such as Accounting, Finance, and IT. Users with the same value for “dept” can see and edit each other’s apps. Users with different values for the property should NOT see each other’s apps.
Which security rule should the administrator use to meet this requirement?
- A . Resource: App_*, Stream_*
Conditions: user.@dept=app.@dept - B . Resource: App_*
Conditions: user.@dept=resource.id - C . Resource: App_*
Conditions: user.@dept=resource.@dept - D . Resource: App_*
Conditions: user.@dept=resource.description
A user owns an app that was previously published and wants to delete the app in the hub. The user is NOT able to delete the app.
What could be causing this issue?
- A . The app is open and is being accessed by another user
- B . Published apps can only be deleted from the QMC
- C . The user needs to be assigned the RootAdmin role
- D . The user needs to be assigned the ContentAdmin role
B
Explanation:
Reference: https://help.qlik.com/en-US/sense/November2019/Subsystems/Hub/Content/Sense_Hub/Apps/delete-app.htm
A security audit revealed problems with the newly installed multi-node environment. The environment was deployed using the default settings for the central and rim nodes. All possible services have been added to the rim node.
The audit was based on the current IT security policy when states:
– All traffic between servers should be encrypted
– 256-bit encryption is required
– Traffic between client and server should be encrypted and trusted
– iOS devices must be supported
– Password length must be at least eight characters and include at least one number and one special character
What should the system administrator deploy to meet these requirements?
- A . A reverse proxy in the DMZ
- B . A third-party trusted certificate
- C . A certificate with third-party VPN
- D . A web app firewall in the environment
B
Explanation:
Reference: https://help.qlik.com/ru-RU/sense/February2019/Subsystems/PlanningQlikSenseDeployments/Content/Sense_Deployment/Server-Security.htm
A security audit revealed problems with the newly installed multi-node environment. The environment was deployed using the default settings for the central and rim nodes. All possible services have been added to the rim node.
The audit was based on the current IT security policy when states:
– All traffic between servers should be encrypted
– 256-bit encryption is required
– Traffic between client and server should be encrypted and trusted
– iOS devices must be supported
– Password length must be at least eight characters and include at least one number and one special character
What should the system administrator deploy to meet these requirements?
- A . A reverse proxy in the DMZ
- B . A third-party trusted certificate
- C . A certificate with third-party VPN
- D . A web app firewall in the environment
B
Explanation:
Reference: https://help.qlik.com/ru-RU/sense/February2019/Subsystems/PlanningQlikSenseDeployments/Content/Sense_Deployment/Server-Security.htm
A security audit revealed problems with the newly installed multi-node environment. The environment was deployed using the default settings for the central and rim nodes. All possible services have been added to the rim node.
The audit was based on the current IT security policy when states:
– All traffic between servers should be encrypted
– 256-bit encryption is required
– Traffic between client and server should be encrypted and trusted
– iOS devices must be supported
– Password length must be at least eight characters and include at least one number and one special character
What should the system administrator deploy to meet these requirements?
- A . A reverse proxy in the DMZ
- B . A third-party trusted certificate
- C . A certificate with third-party VPN
- D . A web app firewall in the environment
B
Explanation:
Reference: https://help.qlik.com/ru-RU/sense/February2019/Subsystems/PlanningQlikSenseDeployments/Content/Sense_Deployment/Server-Security.htm
A security audit revealed problems with the newly installed multi-node environment. The environment was deployed using the default settings for the central and rim nodes. All possible services have been added to the rim node.
The audit was based on the current IT security policy when states:
– All traffic between servers should be encrypted
– 256-bit encryption is required
– Traffic between client and server should be encrypted and trusted
– iOS devices must be supported
– Password length must be at least eight characters and include at least one number and one special character
What should the system administrator deploy to meet these requirements?
- A . A reverse proxy in the DMZ
- B . A third-party trusted certificate
- C . A certificate with third-party VPN
- D . A web app firewall in the environment
B
Explanation:
Reference: https://help.qlik.com/ru-RU/sense/February2019/Subsystems/PlanningQlikSenseDeployments/Content/Sense_Deployment/Server-Security.htm
Sets the condition to ((node.name=“RIM A” or node.name=”RIM B”))
The rule is successfully verified. The system administrator has users log in to the hub and open apps to verify that they are opening on RIM B.
However, after multiple users open the same app, there is still NO report of activity on RIM B.
What is causing this issue?
- A . There is a rule overlapping the custom load balancing rule
- B . The filter should be ((node.name=“RIM A”) and (node.name=“RIM B”))
- C . A network connection problem is occurring and the load balancing is NOT working
- D . The RIM B Engine has NOT been added to the virtual proxy
D
Explanation:
Reference: https://community.qlik.com/t5/Qlik-Sense-Deployment-Management/Load-BalancingConsumer-Nodes/td-p/1525604
Refer to the exhibit.
A ContentAdmin user discovers TASK_RELOAD_APP2 fails. The user double-clicks the Failed task to open the Edit reload task screen. There are NO issues found in the Edit reload task screen.
The user opens the Operations Monitor app, and finds an error message in the Task Details sheet:
Message from ReloadProvider: Reload failed in Engine. Check Engine or Scriptlogs.
The Engine log did NOT provide any reason for the failure.
Which is the most efficient method to find the cause of this issue?
- A . On the Failed task, click the information icon in the Status field, then click Download script log
- B . Navigate to C:ProgramDataQlikSenseLog, then open and review the most recent file
- C . Navigate to C:Program FilesQlikSenseLogging, then open and review the most recent file
- D . In the QMC, select Audit, select Reload Tasks under Target resource, then click Audit and review
A system administrator must design a Qlik Sense server architecture that meets the following requirements:
– Approximately 1000 users will be using apps
– Apps are reloaded outside of office hours
– The total size of data in all apps will be approximately 600 million rows
– Apps must be available 24/7
Which architecture meets these requirements in the most cost efficient way?
A)
B)
C)
D)
- A . Option A
- B . Option B
- C . Option C
- D . Option D
A domain user is granted access and could successfully log into the hub yesterday.
The same domain user attempts to log in into the hub today, and receives this error message:
Your account is inactive. Contact your administrator to activate it.
The user is able to successfully log into the Windows domain network. The user did NOT change the password recently. The user has NO limited working hours in the Active Directory.
What should the system administrator investigate to determine the cause of this error message?
- A . The user properties in the QMC
- B . The Qlik Sense proxy logs
- C . The security rules which impact the user
- D . The Windows event viewer
A customer uses Qlik Sense Enterprise v3.2 SR5 and wants to upgrade to the latest version. Qlik Sense Enterprise is running on Microsoft Windows Server 2008 R2.
Which option should the system administrator recommend?
- A . Run Microsoft Windows Updates to prepare Windows Server 2008 R2 for the latest Qlik Sense version
- B . Download the latest patch, Qlik_Sense_update.exe, and install it using Windows compatibility mode
- C . Upgrade to Microsoft Windows Server 2012 or later
- D . Upgrade only up to the Qlik Sense February 2018 version
A company recently experienced a merger and needs to integrate new users into the Qlik Sense environment.
A system administrator must make sure that the system sizing and the tokens match the requirements for all employees in the future.
The system administrator learns the following information:
– 450 active Qlik Sense users before the merger
– 300 new Qlik Sense users
– 500 current token licenses
– Reloads must have the same performance as before the merger
– The number of apps will approximately double
Management requests an estimate from the system administrator about server resources and additional licenses.
Which set of tools should the system administrator use to meet these requirements?
- A . Performance Monitor, Reloads Monitor, Scalability Tools, and License Monitor
- B . Performance Monitor, License Monitor, Operations Monitor, and Scalability Tools
- C . Performance Monitor, Reloads Monitor, QlikCockpit, and License Monitor
- D . Performance Monitor, Reloads Monitor, Operations Monitor, and Scalability Tools
A system administrator must set up security that does NOT allow certain users to create objects in published apps. The users that should NOT be able to create objects are in an AD group called LimitedUsers.
Which security rule should the administrator use to meet this requirement?
- A . Resource filter: App_*
Action: Create
Rule Condition: (resource.objectType=”charts” and user.group!=”LimitedUsers”)
Context: Both in hub and QMC - B . Resource filter: App.Object_*
Action: Create
Rule Condition: (resource.objectType=”sheet” and user.group!=”LimitedUsers”)
Context: Only in hub - C . Resource filter: App.Object_*
Action: Create
Rule Condition: (resource.objectType=”charts” and user.group!=”LimitedUsers”)
Context: Both in hub and QMC - D . Resource filter: App_*
Action: Create
Rule Condition: (resource.objectType=”sheet” and user.group!=”LimitedUsers”)
Context: Only in hub
A
Explanation:
Reference: https://help.qlik.com/en-US/sense/June2019/Subsystems/ManagementConsole/Content/Sense_QMC/apply-access-rights-for-user-types.htm
In a Qlik Sense environment, users in the Finance department can successfully log in to the hub open or edit apps in the Finance stream.
Developers in the Finance department are unable to modify the HTML code for widgets.
Where should the system administrator determine the source of this issue?
- A . In Audit, select Content libraries as target resource, filter by Group, and select Hub as the environment
- B . In Audit, select Extension as target resource, filter by Blocked, and select Hub as the environment
- C . In Audit, select App objects as target resource, filter by User directory, and select Hub as the environment
- D . In Audit, select Extension as target resource, filter by Group, and select Hub as the environment