Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Analytics-Arch-201 Premium Exam Questions

Salesforce Certified Tableau Architect Questions and Answers

Question 9

In the context of implementing database encryption for Tableau Server, what factor is important to ensure ongoing data security?

Options:

A.

Increasing the processing power of the database server to handle the additional load from encryption and decryption processes

B.

Ensuring that backup copies of the database are also encrypted

C.

Implementing a network monitoring system to track all access to the database server

D.

Setting up a redundant database server to take over in case the primary server fails

Question 10

In a scenario where Tableau Server on Linux is experiencing performance issues, which logs would be most useful to analyze first to diagnose the problem?

Options:

A.

The Linux system's authentication logs to check for unauthorized access attempts

B.

The Tableau Server performance logs that include information on server processes and re-source usage

C.

The Linux system's boot logs to review the server startup sequence

D.

The database logs to assess query execution times and database performance

Question 11

When troubleshooting Kerberos authentication issues related to SPNs in Tableau Server, what common problem should be investigated first?

Options:

A.

Checking if the Kerberos tickets are expiring too quickly

B.

Verifying that the SPNs are correctly set for the Tableau Server service account

C.

Ensuring that the network firewall allows Kerberos traffic to pass through

D.

Confirming that all users have Kerberos enabled on their client machines

Question 12

In the process of configuring an external gateway for Tableau Server, which of the following is a critical step to ensure secure and efficient communication?

Options:

A.

Setting up a load balancer to distribute traffic evenly across multiple Tableau Server in-stances

B.

Configuring the gateway to bypass SSL for faster data transmission

C.

Enabling direct database access from the gateway for real-time data querying

D.

Implementing firewall rules to restrict access to the gateway based on IP addresses