MCQs on Security and Governance | Qlikview MCQ Questions

In Chapter 6: Security and Governance in QlikView, we explore critical topics like Section Access, User Authentication, Row-Level Security, and the Governance Dashboard. These 30 MCQs will test your understanding of security features.


MCQs on Security and Governance in QlikView

Implementing Section Access

  1. What is the primary purpose of Section Access in QlikView?
    • A) To provide user-level data security
    • B) To create user-friendly dashboards
    • C) To apply visualizations in reports
    • D) To manage data connections
  2. Which script function is used to implement Section Access in QlikView?
    • A) Section Access
    • B) Set Access
    • C) Apply Access
    • D) User Access
  3. In Section Access, which field is used to define user roles and their access?
    • A) USER
    • B) Role
    • C) ACCESS
    • D) USERID
  4. Which access level is granted to users who are assigned to the ADMIN role in Section Access?
    • A) Full access to all data
    • B) Read-only access to certain data
    • C) No access to any data
    • D) Access to specific sheets only
  5. How do you restrict data access at the row level using Section Access?
    • A) By defining a field to restrict access
    • B) By filtering data in the load script
    • C) By creating user-specific security rules
    • D) By using WHERE clause conditions
  6. Which of the following is a valid Section Access statement for a user with the ADMIN role?
    • A) ADMIN, *
    • B) USER, FULL
    • C) ADMIN, USER
    • D) * , ADMIN
  7. How can you mask data for users with restricted access in Section Access?
    • A) By using DataMask() function
    • B) By setting up a NULL value
    • C) By restricting fields in the Section Access table
    • D) By using FieldValue() function
  8. What must be done to ensure Section Access works correctly in QlikView?
    • A) Ensure the QlikView server is restarted
    • B) Use Section Application statement before Section Access
    • C) Use Data Masking in the Section Access
    • D) Encrypt all fields

User Authentication and Authorization

  1. Which of the following is the default method of user authentication in QlikView?
    • A) Active Directory
    • B) Username and Password
    • C) LDAP
    • D) Windows Authentication
  2. What is the role of Authorization Rules in QlikView?
    • A) To encrypt the data
    • B) To define what actions a user can perform
    • C) To create new user accounts
    • D) To validate data sources
  3. What is the purpose of using a QlikView Publisher in user authorization?
    • A) To manage data connections
    • B) To load data into the QlikView environment
    • C) To control access to the documents and tasks
    • D) To create user-specific dashboards
  4. How can you configure QlikView to authenticate users via an external directory service?
    • A) By using Windows Authentication
    • B) By enabling LDAP authentication
    • C) By creating manual user credentials
    • D) By using internal user authentication
  5. Which QlikView authentication method is primarily used for cloud-based solutions?
    • A) Active Directory
    • B) OAuth
    • C) SAML
    • D) Basic Authentication
  6. How does Single Sign-On (SSO) benefit user authentication in QlikView?
    • A) By allowing users to sign in once and access multiple applications
    • B) By creating multiple user accounts for different services
    • C) By assigning roles to users
    • D) By ensuring stronger password security
  7. What is the primary function of the Authorization tab in QlikView?
    • A) To configure data sources
    • B) To assign user roles and permissions
    • C) To manage data transformations
    • D) To design visualizations
  8. Which type of authentication is required for using QlikView on a mobile device?
    • A) Windows Authentication
    • B) OAuth Authentication
    • C) Form-based Authentication
    • D) Single Sign-On (SSO)

Data Masking and Row-Level Security

  1. What is the purpose of Data Masking in QlikView?
    • A) To delete unnecessary data
    • B) To display data in a way that hides sensitive information
    • C) To filter data for specific users
    • D) To enhance the data model
  2. How can row-level security be implemented in QlikView?
    • A) By using Section Access
    • B) By applying a filter in the sheet properties
    • C) By restricting access to data sources
    • D) By manually editing data
  3. What does Row-Level Security ensure in QlikView?
    • A) Only authorized users can view specific rows of data
    • B) Users can access all data but with different formatting
    • C) Data is encrypted for all users
    • D) Data is only accessible to administrators
  4. Which field is typically used in Section Access to define the data available to users in row-level security?
    • A) UserID
    • B) AccessKey
    • C) Role
    • D) SecurityKey
  5. In QlikView, how can you mask sensitive data from users?
    • A) By setting the data field to NULL
    • B) By using the DataMasking function in scripts
    • C) By applying row-level security and Section Access
    • D) By deleting sensitive records from the database
  6. What is the benefit of Dynamic Data Masking in QlikView?
    • A) It ensures only administrators can view all data
    • B) It hides sensitive data from unauthorized users without altering the source
    • C) It encrypts all data in the QlikView environment
    • D) It restricts data access at the field level
  7. How can you allow users to access data but hide specific sensitive fields?
    • A) Use the Section Access method with field masking
    • B) Restrict access by creating field aliases
    • C) Apply data compression techniques
    • D) Encrypt the entire data set
  8. Which technique is used to display only a portion of a field’s value to users?
    • A) Data Masking
    • B) Field Aliases
    • C) Data Compression
    • D) Partial Encryption

QlikView Governance Dashboard

  1. What is the purpose of the QlikView Governance Dashboard?
    • A) To monitor the health and performance of QlikView applications
    • B) To manage the security settings of QlikView applications
    • C) To create visualizations and reports
    • D) To validate user data integrity
  2. Which feature of the QlikView Governance Dashboard helps identify the most used data sources?
    • A) Data Usage Reports
    • B) User Access Logs
    • C) Data Source Analytics
    • D) Activity Monitoring
  3. How can the QlikView Governance Dashboard assist in monitoring user activity?
    • A) By tracking user logins and actions
    • B) By listing user roles and permissions
    • C) By providing detailed data visualizations
    • D) By managing data security settings
  4. What type of reports can be generated using the Governance Dashboard?
    • A) Load performance and resource utilization reports
    • B) Usage and access logs of users
    • C) Data source and application health reports
    • D) All of the above
  5. What type of analysis does the QlikView Governance Dashboard help with?
    • A) Security and access audits
    • B) Data quality and integrity analysis
    • C) Application performance and usage
    • D) All of the above
  6. Which QlikView component is essential for tracking data load performance and usage?
    • A) QlikView Governance Dashboard
    • B) QlikView Server Monitoring
    • C) QlikView Data Management
    • D) QlikView Performance Dashboard

Answer Key

QnoAnswer
1A) To provide user-level data security
2A) Section Access
3D) USERID
4A) Full access to all data
5A) By defining a field to restrict access
6A) ADMIN, *
7C) By restricting fields in the Section Access table
8B) Use Section Application statement before Section Access
9B) Username and Password
10B) To define what actions a user can perform
11C) To control access to the documents and tasks
12B) By enabling LDAP authentication
13C) SAML
14A) By allowing users to sign in once and access multiple applications
15B) To assign user roles and permissions
16D) Single Sign-On (SSO)
17B) To display data in a way that hides sensitive information
18A) By using Section Access
19A) Only authorized users can view specific rows of data
20A) UserID
21C) By applying row-level security and Section Access
22B) It hides sensitive data from unauthorized users without altering the source
23A) Use the Section Access method with field masking
24A) Data Masking
25A) To monitor the health and performance of QlikView applications
26A) Data Usage Reports
27A) By tracking user logins and actions
28D) All of the above
29D) All of the above
30A) QlikView Governance Dashboard

Use a Blank Sheet, Note your Answers and Finally tally with our answer at last. Give Yourself Score.

X
error: Content is protected !!
Scroll to Top