You need to ensure that aggregations are populated
You maintain a SQL Server 2008 Analysis Services (SSAS) instance.
You plan to process a cube by using an XML for Analysis (XMLA) script.
You need to ensure that aggregations are populated.
What should you do?
You need to enable query logging
You maintain a SQL Server 2008 Analysis Services (SSAS) instance.
You plan to run the Usage-Based Optimization Wizard. You need to enable query logging.
What should you do?
You need to ensure that the users of the application can successfully access the SSAS database
You maintain a SQL Server Analysis Services (SSAS) database. The database is configured
by using multiple security roles.
The database is accessed by a Microsoft ASP.NET application that runs on a remote
computer.
The application is configured to use Windows Authentication.
You need to ensure that the users of the application can successfully access the SSAS
database.
You also need to ensure that security restrictions of the roles are applied.
What should you do?
You need to ensure that only one measure group is deployed to the cube in the production environment
You are maintaining a SQL Server 2008 Analysis Services (SSAS) solution in the production
environment. You modify the solution to include two new measure groups in the
development environment. You need to ensure that only one measure group is deployed to
the cube in the production environment. What should you do?
You need to configure the Dimension Data settings to meet the following requirements…
You maintain a SQL Server 2008 Analysis Services (SSAS) database that contains a
dimension named Customer.
You need to configure the Dimension Data settings to meet the following requirements:
Deny access to the {[Customer].[Country].&[Germany],[Customer].[Country].&[France]} set
of attribute members.
New members added to the attribute are visible by default. What should you do?
You need to execute an XML for Analysis (XMLA) command to process the dimension to successfully reflect the ch
You maintain a SQL Server 2008 Analysis Services (SSAS) database that contains a
Product dimension. The dimension contains the Category and Subcategory attributes.
The attributes have a Rigid relationship type.
The data source for the Product dimension changes the relationship between the Category
and Subcategory values.
You need to execute an XML for Analysis (XMLA) command to process the dimension to
successfully reflect the change.
What should you do?
You need to deploy the new functionality from the development server to the production server by ensuring that
You maintain a SQL Server 2008 Analysis Services (SSAS) database on a production
server. The database contains a cube.
You add new functionality to the cube on a development server.
You need to deploy the new functionality from the development server to the production
server by ensuring that the effect on the users is minimized.
What should you do?
Which object should you use?
You maintain a SQL Server 2008 Analysis Services (SSAS) database on a default instance.
You plan to document the Analysis Services performance information.
You need to collect information related to the temporary file usage when the database is
processed.
Which object should you use?
You need to verify that users in the Northern Region role can view data only for their region
You are a server administrator of a SQL Server 2008 Analysis Services (SSAS) instance.
The instance contains a database that is used by the members of the Sales group.
You configure a new role named Northern Region by using the
“{[Customers].[Region].[Region].[Northern]}’ allowed permission set.
You assign the Sales group to the Northern Region role.
You need to verify that users in the Northern Region role can view data only for their region.
What should you do?
You need to ensure that the instance will only support Kerberos authentication
You maintain a SQL Server 2008 Reporting Services (SSRS) instance.
The network security model for the domain that hosts the instance changes.
You need to ensure that the instance will only support Kerberos authentication.
What should you do?