PdfPrep.com

Which of the following is a valid step?

An administrator needs to setup security for a newly installed environment.

Which of the following is a valid step?
A . Remove the default authentication provider.
B . Enable anonymous access for selected users, groups, or roles.
C . Delete the Everyone group to limit access to the environment for selected users, groups, and roles.
D . Add trusted users, groups, or roles to the System Administrators role, and then remove the Everyone group from the role.

Answer: D

Explanation:

You may not want all users that exist in an authentication source to have access to IBM Cognos software. To secure IBM Cognos software, configure the product so that only users who belong to a specific group or role in your authentication source, or in the Cognos namespace, are allowed access.

We recommend using the Cognos namespace because it contains preconfigured groups and roles that help you to secure IBM Cognos software quickly. One of the preconfigured groups is Everyone.

By default, the group Everyone belongs to several built-in groups and roles in the Cognos namespace.

If you decide to use the Cognos namespace, you must remove the Everyone group from all built-in groups and roles and replace it with groups, roles, or users authorized to access IBM Cognos software.

References: IBM Cognos Administration Version 10.1.0, Administration and Security Guide, page 64

Exit mobile version