3 Months Free Update
3 Months Free Update
3 Months Free Update
A Qlik Sense environment has users from Active Directory A system administrator creates a task to synchronize the users from Active Direct with Qlik Sense.
The system administrator adds a new user to Active Directory, and manually executes the synchronization tasks in Qlik Sense. The administrator observes that the new user NOT added to the Qlik environment.
What should the system administrator do to ensure the new user is added?
Refer to the exhibit.
What is the result when the administrator selects the Start button for TASK-APP1 in the Task screen?
A company recently experienced a merger and needs to integrate new users into the Qlik Sense environment.
A system administrator must make sure that the system sizing and the tokens match the requirements for all employees in the future.
The system administrator learns the following information.
* 450 active Qlik Sense users before the merger
* 300 new Qlik Sense users
* 500 current token licenses
* Reloads must have the same performance as before the merger
* The number or apps will approximately double
Management request an estimate from the system administrator about server resources and additional license.
Which set of tools should the system administrator use to meet these requirements?
An administrator must configure a QA environment to test apps before moving them to production.
Once the apps are ready, each user from the Tester directory must be able to publish their apps to a stream named ‘’App Testing’’ the users have Read and Publish access to the App Testing stream.
All user are assigned the AuditAdmin role in the QMC, but do they NOT have access to the App section of the QMC.
Which security rule should the administrator use to enable access for the users?
A Qlik Sense environment uses-based license types. A user, who can typically create new apps in personal Work, can no longer create new apps. The Personal Work area is NOT displayed for this user.
How should the system administrator resolve this issue?
A system administrator adds RIM B to a two node environment using the central node as the proxy. The system administrator is using the default virtual proxy for the central node to access the hub.
The system administrator sets up a load balancing rule to have all apps served on both RIM A and RIM B. the system administrator performs the following steps.
1. Disable the default load balancing rule, ResourcesOnNonCentralNodes’’
2. Create a new rule with the Resource filter ‘’App_*’’ and checks Load balancing
3. Sets the condition to ((node.name=RIM A’’ or node name=RIM B’’))
The rule is successfully verified. The system administrator has users log in to the hub and open apps to verify that they are opening on RIM B. However, after multiple users open the app, there still NO report of activity of activity on RIM B.
What is causing this issue?
A system administrator must set up security that does NOT allow certain users to create objects in published apps. The users that should NOT be able to create objects are in an AD group called LimitedUsers.
Which security rule should the administrator use to meet this requirement?
A system administrator needs to upgrade the environment to the latest version of Qlik Sense Enterprise and decides to create a backup.
Which three items should the administrator back up? (select three.)
A system administrator needs to set up a solution for mobile device users to access the Qlik Sense hub. The solution must meet several requirements.
* Support IOS devices
* Can be used in remote locations where users do NOT have laptop or desktop computers
* Ability to access Qlik Sense outside the office network without a compatible tunnel solution
* Ability to access Qlik Sense using a secure gateway
What should the system administrator do to meet these requirements?
A system administrator has multi-node Qlik Sense environment with a consumer node and a scheduler node. Reload task occur every 20 minutes, 24 hours a day, 7 days a week. The reload tasks cause performance cause performance for the users.
What is the most efficient method to improve performance?