Number of questions: 60
Number of questions to pass: 44
Time allowed: 90 mins
Status: Live
An IBM Certified Developer – IBM Cognos Analytics Developer V11.1.x is
responsible for building advanced reports and dashboards and connecting to data
and modeling meta data sources. This individual has project related experience
authoring and troubleshooting complex and intermediate level reports and
dashboards and is capable of participating in project implementations as an
effective team member.
This exam consists of 5 sections described below. For more detail, please see
the study guide on the Exam Preparation tab.
Section 1: Dashboards 22% Explain design considerations for small form factors (mobile devices)
Describe how to create simple Dashboards
Describe how to create complex interactive Dashboards
Describe how to modify Dashboards
Demonstrate how to control Dashboard data
Section 2: Reports 32% Describe the various data container types
Describe how to apply filters
Describe how to use prompts
Describe using conditions to control formatting layout and rendering
Describe using calculations and macros
Demonstrate presenting data graphically
Explain designing for multiple outputs
Describe using reusable objects
Explain various interactivity usages
Demonstrate understanding of relational vs dimensional reporting styles
Demonstrate understanding the use of multiple queries in a report
Demonstrate understanding the use of multiple Data sources in a report
Describe forms of report distribution and collaboration
Section 3: Data 21% Explain connecting to the Data source
Describe the various types of Physical Data sources and their usage
Describe the various types of metadata sources and their usage
Describe using data shaping (end user data preparation)
Section: 4 Other Features 10% Describe where the offering uses AI
Describe ways to augment with AI
Describe how to create a story for the presentation of information
Describe where Exploration is used to enhance analytics
Section 5: Troubleshooting and Performance 15% Describe utilities that are available in the product for troubleshooting
Describe approach(s) methods to perform root cause analysis/diagnose issues
Exam Details JNCIS-SEC exam topics are based on the content of the recommended
instructor-led training courses, as well as the additional resources.
Exam code: JN0-334
Written exam
Administered by Pearson VUE
Exam length: 90 minutes
Exam type: 65 multiple-choice questions
Pass/fail status is available immediately
Junos Software Release: 19.1
Identify the concepts, benefits, or operation of security policies ALGs
Logging
Session management
Scheduling
Demonstrate knowledge of how to configure, monitor, or troubleshoot security
policies
Preparation The resources listed on this section are recommended, but do not guarantee
passing scores on JNCP exams. Success depends on each candidate’s motivation,
experience, and dedication. Candidates may find additional resources not listed
on this page helpful as well.
Exam Objectives This list provides a general view of the skill set required to successfully
complete the specified certification exam.
Demonstrate knowledge how to configure, monitor, or troubleshoot application
security Identify application IDP/IDS concepts
IPS database management
IPS policy
Demonstrate knowledge how to configure, monitor, or troubleshoot IDP/IDS Identify the concepts, benefits, or operation of security policies
ALGs
Logging
Session management
Scheduling
Demonstrate knowledge of how to configure, monitor, or troubleshoot security
policies Identify the concepts, benefits, or operation of Sky ATP
Supported files
Components
Security feeds
Traffic remediation
Workflow
Demonstrate knowledge of how to configure, monitor, or troubleshoot Sky ATP Identify the concepts, benefits, or operation of JATP
Cyber kill chain
Application
Traffic remediation
Demonstrate knowledge of how to configure, monitor, or troubleshoot JATP Identify the concepts, benefits, or operation of HA
HA features and characteristics
Deployment requirements and considerations
Chassis cluster characteristics and operation
Real-time objects and state synchronization
Demonstrate knowledge of how to configure, monitor, or troubleshoot
clustering Describe concepts, general features, or functionality of virtualized
security using vSRX or cSRX
Installation
Deployment scenarios
Troubleshooting
Identify concepts, general features, or functionality of JIMS Ports and protocols
Data flow
Demonstrate knowledge of how to configure, monitor, or troubleshoot JIMS Identify concepts, general features, or functionality of SSL Proxy
Certificates
Client and server protection
Demonstrate knowledge of how to configure, monitor, or troubleshoot SSL proxy Identify concepts, general features, or functionality of JSA
Logging
Analytics
QUESTION 1 What are two examples of RTOs? (Choose two.)
A. IPsec SA entries
B. session table entries
C. fabric link probes
D. control link heartbeats
Correct Answer: C,D
QUESTION 2 Which three features are parts of Juniper Networks’ AppSecure suite? (Choose
three.)
A. AppQoE
B. APBR
C. Secure Application Manager
D. AppQoS
E. AppFormix
Correct Answer: A,B,D
QUESTION 3 Which two statements are correct about server-protection SSP proxy? (Choose
two.)
A. The server-protection SSL proxy intercepts the server certificate.
B. The server-protection SSL proxy is also known as SSL reverse proxy.
C. The server-protection SSL proxy forwards the server certificate after
modification.
D. The server-protection SSL proxy acts as the server from the client’s
perspective.
Professional Collaboration Engineer A Professional Collaboration Engineer transforms business objectives into
tangible configurations, policies, and security practices as they relate to
users, content, and integrations. Collaboration Engineers leverage their
understanding of their organization’s mail routing and identity management
infrastructure to enable efficient and secure communication and data access.
Operating with an engineering and solutions mindset, they use tools, programming
languages, and APIs to automate workflows. They look for opportunities to
educate end users and increase operational efficiency while advocating for G
Suite and the Google toolset.
The Professional Collaboration Engineer exam assesses your ability to:
Plan and implement G Suite authorization and access
Manage user, resource, and Team Drive lifecycles
Manage mail
Control and configure G Suite services
Configure and manage endpoint access
Monitor organizational operations
Advance G Suite adoption and collaboration
Related job roles: IT systems administrator, cloud solutions engineer,
enterprise collaboration engineer, systems engineer About this certification exam
Length: 2 hours
Registration fee: $200 (plus tax where applicable)
Languages: English, Japanese
Exam format: Multiple choice and multiple select, taken in person at a test
center. Locate a test center near you.
Prerequisites: None
Recommended experience: 3+ years of industry experience including 1+ year G
Suite administration experience.
1. Review the exam guide The exam guide contains a complete list of topics that may be included on
the exam. Review the exam guide to determine if your skills align with the
topics on the exam.
2. Training
G Suite logo
G Suite Administration Specialization
Register
Professional Collaboration Engineer Practice Exam
Check your readiness for the Collaboration Engineer exam
Learn more
3. Hands-on practice This exam is designed to test technical skills related to the job role. In
addition to being familiar with the day-to-day tasks carried out by the G Suite
administrator, use the hands-on labs available on Qwiklabs to learn about G
Suite integrations to level up your knowledge and skills.
4. Additional resources In-depth discussions on the concepts and critical components of G Suite:
5. Assess your knowledge Familiarize yourself with the types of questions that will be on the exam.
Check your readiness to take this exam.
6. Schedule your exam Register and find a location near you.
QUESTION 1 Madeupcorp.com is in the process of migrating from a third-party email
system to G Suite. The VP of
Marketing is concerned that her team already administers the corporate AdSense,
AdWords, and YouTube
channels using their @madeupcorp.com email addresses, but has not tracked which
users have access to
which service. You need to ensure that there is no disruption.
What should you do?
A. Run the Transfer Tool for Unmanaged users.
B. Use a Google Form to survey the Marketing department users.
C. Assure the VP that there is no action required to configure G Suite.
D. Contact Google Enterprise Support to identify affected users.
Correct Answer: A
QUESTION 2 Your company has an OU that contains your sales team and an OU that contains
your market research team.
The sales team is often a target of mass email from legitimate senders, which is
distracting to their job duties.
The market research team also receives that email content, but they want it
because it often contains
interesting market analysis or competitive intelligence. Constant Contact is
often used as the source of these
messages. Your company also uses Constant Contact for your own mass email
marketing. You need to set
email controls at the Sales OU without affecting your own outgoing email or the
market research OU.
What should you do?
A. Create a blocked senders list as the Sales OU that contains the mass email
sender addresses, but bypass this setting for Constant Contact emails.
B. Create a blocked senders list at the root level, and then an approved senders
list at the Market Research OU, both containing the mass email sender addresses.
C. Create a blocked senders list at the Sales OU that contains the mass email
sender addresses.
D. Create an approved senders list at the Market Research OU that contains the
mass email sender addresses.
Correct Answer: A
QUESTION 3 Your organization is part of a highly regulated industry with a very high
turnover. In order to recycle licenses
for new employees and comply with data retention regulations, it has been
determined that certain G Suite
data should be stored in a separate backup environment.
How should you store data for this situation?
A. Use routing rules to dual-deliver mail to an on-premises SMTP server and G
Suite.
B. Write a script and use G Suite APIs to access and download user data.
C. Use a third-party tool to configure secure backup of G Suite data.
D. Train users to use Google Takeout and store their archives locally.
Correct Answer: C
QUESTION 4 Your organization is on G Suite Enterprise and allows for external sharing
of Google Drive files to facilitate
collaboration with other G Suite customers. Recently you have had several
incidents of files and folders being
broadly shared with external users and groups. Your chief security officer needs
data on the scope of external
sharing and ongoing alerting so that external access does not have to be
disabled.
What two actions should you take to support the chief security officer's
request? (Choose two.)
A. Review who has viewed files using the Google Drive Activity Dashboard.
B. Create an alert from Drive Audit reports to notify of external file sharing.
C. Review total external sharing in the Aggregate Reports section.
D. Create a custom Dashboard for external sharing in the Security Investigation
Tool.
E. Automatically block external sharing using DLP rules.