Top Banner
COG CERTS COG 180 Qs & Ans - V0l 3 - 11.2009 Test: COG 180: Cognos 8 BI Professional Total: Qs & Ans: 72 Give your feed back at [email protected] Page 1 of 26
26
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: COG-180

COG CERTSCOG 180

Qs & Ans - V0l 3 - 11.2009

Test: COG 180: Cognos 8 BI Professional

Total: Qs & Ans: 72

Give your feed back [email protected]

Page 1 of 23

Page 2: COG-180

COG 180: IBM Cognos 8 BI Professional

A Cognos Certification Study Guide for COG 180: IBM Cognos 8 BI Professional

EXAM INFORMATION:VER: 28.11.09Exam Number : COG 180Exam Title : IBM Cognos 8 BI ProfessionalNumber of Qs & Ans : 66Format multiple choices – single responsePassing score : 71%Time : 60 minutesRegistration http://www.prometric.com/Cognos

KEY TOPICSThe Cognos 8 BI Professional exam covers key concepts, technologies, and functionality of the Cognos products. In preparation for an exam, we recommend a combination of training and hands-on experience.

Iterative Development and CSIM (9%)a. Identify different approaches for implementing BI projectsb. Identify the value of using a methodologyc. Distinguish between an approach and a methodologyd. Describe the iterative development process

Dimensional Design and Key Metrics (14%)a. Describe the relationship between dimensions, facts, and granularityb. Identify the differences between SQL and MDXc. Define the Key Performance Indicators and identify their business purposed. Map Cognos 8 components to KPI process flowe. Describe the functional and organizational scope of Corporate Performance Management

Identify the Right Tool for the Business Need (16%)a. Identify the differences between reporting, querying, and analysisb. Map the Cognos 8 products to reflect relationship between interactivity and formattingc. Identify the need for scorecardingd. Identify the need for planninge. Identify the need for data managerf. Identify the need for event managementg. Identify the need for analysis, reporting and queryingh. Identify different roles and categories of users

Determine User Requirements (15%)a. Describe the importance of and the activities in the Analyze phaseb. Identify the elements of conducting a successful interviewc. Identify the dimensional elements of how users think about their businessd. Identify the metric elements and KPI of the dimensional designe. Identify the business area to prototype with the highest return on investmentf. Identify methods of enriching the dimension map

Common Data Stores (14%)a. Describe the data normalization processb. Identify the difference between relational and OLAP data structuresc. Compare data store designs

Page 2 of 23

Page 3: COG-180

d. Identify variations on data warehouse designse. Compare operational vs. reporting database designsf. Identify considerations for modeling dimensionally (DMR) in Framework Manager

Cognos BI Architecture (12%)a. Identify components and services of the Cognos 8 Services Oriented Architectureb. Describe benefits of the Cognos Application Firewall (CAF)c. Describe the installation processd. Identify considerations for installing to environments that include separate instances of a security providere. Identify considerations for addressing high availability and failoverf. Identify a properly designed installation map

Cognos BI Request Flows and Queues (8%)a. Identify the correct flow of the request between architectural components and services for a given requestb. Identify the differences between high affinity and low affinity report execution requests and associated

connectionsc. Identify the relationship between scheduled jobs and batch reporting

Design, Build, and Deploy Considerations (8%)a. Understand the use of the V-model testingb. Considerations for moving between environmentsc. Identify the important considerations for monitoring and tuning for performanced. Identify application design and system considerations for performance

Maintain the BI Application (4%)a. Identify the importance of ongoing monitoring the performance of the applicationb. Describe the tracking and planning for enhancement requests and subsequent development phasesc. Identify integrating the new solution into regular backups and maintenance programs

Page 3 of 23

Page 4: COG-180

Page 4 of 23

Page 5: COG-180

Question No. 1

Question No. 2

Question No. 3

Question No. 4

Page 5 of 23

Page 6: COG-180

Question No. 5

Question No. 6

Question No. 7

Question No. 8

Page 6 of 23

Page 7: COG-180

Question No. 9

Question No. 10

Question No. 11

Question No. 12

Page 7 of 23

Page 8: COG-180

Question No. 13

Question No. 14

Question No. 15

Question No. 16

Page 8 of 23

Page 9: COG-180

Question No. 17

Question No. 18

Question No. 19

Question No. 20

Page 9 of 23

Page 10: COG-180

Question No. 21

.

Question No. 22

Question No. 23

Question No. 24

Page 10 of 23

Page 11: COG-180

Question No. 25

Question No. 26

Question No. 27

Question No. 28

Page 11 of 23

Page 12: COG-180

Question No. 29

Question No. 30

Question No. 31

Question No. 32

Page 12 of 23

Page 13: COG-180

Question No. 33

Question No. 34

Question No. 35

Question No. 36

Page 13 of 23

Page 14: COG-180

Question No. 37

Question No. 38

Question No. 39

Question No. 40

Page 14 of 23

Page 15: COG-180

Question No. 41

Question No. 42

Question No. 43

Question No. 44

Page 15 of 23

Page 16: COG-180

Question No. 45

Question No. 46

Question No. 47

Page 16 of 23

Page 17: COG-180

Question No. 48

Question No. 49

Question No. 50

Question No. 51

Page 17 of 23

Page 18: COG-180

Question No. 52

Question No. 53

Question No. 54

Question No. 55

Question No. 56

Page 18 of 23

Page 19: COG-180

Question No. 57

Question No. 58

Page 19 of 23

Page 20: COG-180

Question No. 59

Question No. 60

Question No. 61

Question No. 62

Page 20 of 23

Page 21: COG-180

Question No. 63

Question No. 64

Question No. 65

Page 21 of 23

Page 22: COG-180

Question No. 66

Question No. 67All of the following are requirements for successful iterative development EXCEPT:

A. Active user participation.B. A minimum of 3 iterations with short cycle times.C. Small, empowered project teams.D. Returning to any preceding step when required.

Answer: B

Question No. 68Which of the following is a key feature of Cognos Planning?

A. Workflow determination.B. Workflow analysis.C. Workflow implementation.D. Workflow notification.

Answer: D

Question No. 69When launching a new project, which groups of users should be interviewed first?

A. Stakeholders and IT.B. IT and executives.C. IT and users.D. Stakeholders and users.

Answer: D

Question No. 70An OLAP cube may be created as an alternative to SQL relational data access because of certain specific features of such cubes. All of the following are examples of these features EXCEPT:

A. A cube typically has faster aggregation.B. A cube typically is more flexible for analysis than aggregate tables.C. A cube typically has special relative date functions.D. A cube typically will build faster than aggregate tables.

Page 22 of 23

Page 23: COG-180

Answer: D

Question No. 71When installing Cognos 8 BI, the source environment will be configured to connect to an instance of Sun One LDAP Directory Server. The source and target environments will be configured to connect to separate yet structurally identical instances of Sun One LDAP Directory Server Knowing that the secured application from the source environment will have to be deployed to the target environment, how should you implement security in the source so that it will work in the target?

A. Create application specific Cognos 8 BI groups and roles in the Cognos namespace, map users created in the Cognos namespace to them, and then secure Cognos 8 BI objects.B. Secure Cognos 8 BI objects using users directly from the source Sun One LDAP Directory Server instance.C. Map users from the source Sun One LDAP Directory Server instance to the built-in and predefined Cognos 8 BI groups and roles, and then secure Cognos 8 BI objects.D. Use Cognos 8 BI groups and roles from the source Sun One LDAP Directory Server instance, map users created in the Cognos namespace to them, and then secure Cognos 8 BI objects.

Answer: C

Question No. 72Which of the following is a high affinity request?

A. Run a report in PDF.B. Schedule a job to run immediately.C. Two successive tests of a data source connection.D. Change the report delivery to send the report by e-mail.

Answer: D

Page 23 of 23