Related Posts
analyze the data for one field at a time
* The chart should show the unique number of customers for each dimension being analyzed
* The dimensions and measures created must be re-used on other charts
Which steps should the business analyst perform to configure the chart correctly?
A. * Create all three dimensions as master items and add one as the chart dimension and the other two as alternative dimensions
* Create a master item measure using Count(Distinct [Customer Number]) and add it to the chart
* Change the chart presentation to Horizontal and sort it by the measure
B. * Create all three dimensions as master items and add to the bar chart
* Create a master item measure using Count{Distinct [Customer Number]) and add it to the chart
* Change the chart presentation to Horizontal and sort it by the first dimension
C. * Create all three dimensions as master items and add one as the chart dimension and the other two as alternative dimensions
* Create a master item measure using Count(Total (Customer Number)) and add it to the chart
* Change the chart presentation to Horizontal and sort it by the measure
D. * Create a cyclic dimension as a master item using all three dimensions and add it to the chart
* Create a master item measure using Count{Distinct [Customer Number]) and add it to the chart
* Change the chart presentation to Horizontal and sort it by the measure
Answer: DNEW QUESTION: 4
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)
A. Prevent the loss of passwords by disabling password encryption.
B. Always use Telnet to access the device command line because its data is automatically encrypted.
C. Use SSH or another encrypted and authenticated transport to access device configurations.
D. Use a firewall to restrict access from the outside to the network devices.
E. Allow unrestricted access to the console or VTY ports.
Answer: C,D
Explanation:
Using a firewall is a must for networks of any size to protect the internal network from outside threats and unauthorized access. SSH traffic is encrypted while telnet is not, so it is always recommended to use SSH.