Black Friday Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

examstrack slider

Ace the Qlik QSSA2018 Exam: Ultimate Preparation Guide

Questions 11

A system administrator adds RIM B to a two node environment using the central node as the proxy. The system administrator is using the default virtual proxy for the central node to access the hub.

The system administrator sets up a load balancing rule to have all apps served on both RIM A and RIM B. the system administrator performs the following steps.

1. Disable the default load balancing rule, ResourcesOnNonCentralNodes’’

2. Create a new rule with the Resource filter ‘’App_*’’ and checks Load balancing

3. Sets the condition to ((node.name=RIM A’’ or node name=RIM B’’))

The rule is successfully verified. The system administrator has users log in to the hub and open apps to verify that they are opening on RIM B. However, after multiple users open the app, there still NO report of activity of activity on RIM B.

What is causing this issue?

Options:

A.

There is a rule overlapping the custom load balancing rule

B.

The filter should be ((node.name="RIM A’’) and (node name="RiM B"))

C.

A network connection problem is occurring and the load balancing is NOT working

D.

The RIM B Engine has NOT been added to the virtual proxy

Buy Now
Questions 12

A single-node Qlik Sense environment has all services up and running. Users reports and sheets are slow to open.

A system administrator works remotely and does NOT have access to the shared file system for the environment. The system administrator’s computer can make requests to the Qlik Sense Repository Service. Due to the system for the environment. The system administrator’s computer can make request to the Qlik Sense Repository Service. Due to the system performance issues, a system administrator can NOT run any new reloads. The system administrator receives a warning email high RAM usage on the server.

Which step should the system administrator take to troubleshoot this issue?

Options:

A.

Request the <a href="‘’https://">‘’https://</a> server.domain.com >engine/performanceceche/’’ API

B.

Access the server remotely and inspect the logs in %ProgramData%Qlik C. Sense/Log/Engine

C.

Request the ‘’https//,server.domain.com>/engine/healthcheck/’’ API

D.

Request the ‘’https//’’qmc/audit’’ API

Buy Now
Questions 13

A system administrator creates a new content library to give the developers access to images. The system administrator tests the new library in the Qlik Management Console (QMC) by adding an image into a text image object in an app ion the hub. The developers are unable to see the new content library, but can see the default library.

What should the administrator do to make sure the developer have access to the content library?

Options:

A.

Build a security rule to give access to the new content library

B.

Have the users create their own individual content libraries in the QMC.

C.

Have the users upload their own images to the app in the hub

D.

Stored all required images in the default content library.

Buy Now
Questions 14

A system administrator needs to troubleshoot an issue reported with Qlik Sense. The administrator confirms the following.

* NO hardware issues exist

* NO other process are affecting Qlik Sense

* NO other systems report any issues

* The network team reports optimal performance

The system administrator decides to check the task execution details and token allocations Which two tools should the system administrator use? (Select two )

Options:

A.

Log Monitor

B.

Sessions Monitor

C.

Operations Monitor

D.

Reloads Monitor

E.

License Monitor

Buy Now
Questions 15

In a Qlik Sense environment, users in the finance department can successfully log In to the hub and open or apps in the Finance stream.

Developers in the Finance department are unable to modify the HTML code for widgets

Where should the system administrator determine the source of this issue?

Options:

A.

In Audit, select Content libraries as target resource, filter by Blocked, and select Hub as the environment

B.

In Audit, select Extension as target resource, filter by Blocked, and select Hub as the environment

C.

In Audit, select App objects as target resource, filter by User directory, and select Hub as the environment

D.

In Audit, select Extension as target resource filter by Group, and select Hub as the environment.

Buy Now