Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

IBM Exam C2090-623 Topic 3 Question 47 Discussion

Actual exam question for IBM's C2090-623 exam
Question #: 47
Topic #: 3
[All C2090-623 Questions]

All users have unrestricted access in a secured environment.

What must be modified to control this access?

Show Suggested Answer Hide Answer
Suggested Answer: D

You may not want all users that exist in an authentication source to have access to IBM Cognos software. To secure IBM Cognos software, configure the product so that only users who belong to a specific group or role in your authentication source, or in the Cognos namespace, are allowed access.

We recommend using the Cognos namespace because it contains preconfigured groups and roles that help you to secure IBM Cognos software quickly. One of the preconfigured groups is Everyone.

By default, the group Everyone belongs to several built-in groups and roles in the Cognos namespace.

If you decide to use the Cognos namespace, you must remove the Everyone group from all built-in groups and roles and replace it with groups, roles, or users authorized to access IBM Cognos software.

References: IBM Cognos Administration Version 10.1.0, Administration and Security Guide, page 64


Contribute your Thoughts:

Justine
1 months ago
Ah, the joys of securing a system. It's like a never-ending game of whack-a-mole, but with more paperwork.
upvoted 0 times
...
Wava
1 months ago
Removing the 'Everyone' group from the 'System Administrators' role? Sounds like a recipe for a lonely admin party!
upvoted 0 times
...
Joaquin
1 months ago
Haha, deleting the 'All Authenticated Users' group? That's like throwing the baby out with the bathwater!
upvoted 0 times
Melvin
17 days ago
C) Modify the advanced properties of the authorization namespace.
upvoted 0 times
...
Luann
18 days ago
B) Disable anonymous access using IBM Cognos Configuration.
upvoted 0 times
...
Deja
24 days ago
A) Delete the ''All Authenticated Users'' group.
upvoted 0 times
...
...
Erasmo
2 months ago
B seems like a good option too. Disabling anonymous access using IBM Cognos Configuration could also be a way to control the access.
upvoted 0 times
Stefan
22 days ago
C) Modify the advanced properties of the authorization namespace.
upvoted 0 times
...
Sina
1 months ago
B) Disable anonymous access using IBM Cognos Configuration.
upvoted 0 times
...
...
Bernadine
2 months ago
But what about deleting the ''All Authenticated Users'' group? Wouldn't that also help?
upvoted 0 times
...
Carmen
2 months ago
I think C is the correct answer here. Modifying the advanced properties of the authorization namespace would be the best way to control the access in a secured environment.
upvoted 0 times
Raul
14 days ago
Disabling anonymous access using IBM Cognos Configuration might also be a good way to control access.
upvoted 0 times
...
Agustin
17 days ago
That's true, removing the ''Everyone'' group from the ''System Administrators'' role could also be effective.
upvoted 0 times
...
Nicolette
23 days ago
But wouldn't deleting the ''All Authenticated Users'' group also help in controlling access?
upvoted 0 times
...
Cammy
1 months ago
I agree, C seems like the most appropriate option to modify access control.
upvoted 0 times
...
...
Jess
2 months ago
I agree with Judy, that seems like the best way to control access.
upvoted 0 times
...
Judy
2 months ago
I think we should modify the advanced properties of the authorization namespace.
upvoted 0 times
...

Save Cancel