Pentaho Solutions Architect Certification Exam
Preparation
**Question 1. Which Pentaho component is primarily responsible for managing transformations
and jobs in a clustered environment to provide high availability?**
A) Pentaho Server
B) Pentaho Data Integration (PDI) Server
C) Pentaho Repository
D) Pentaho BA Server
Answer: B
Explanation: PDI Server (also called Carte) can be deployed in a cluster, enabling fail‑over and
load‑balancing for transformations and jobs, which is the core of PDI high availability.
**Question 2. In a Pentaho BA server cluster, which of the following is the recommended way to
share session state across nodes?**
A) Local file system caching
B) In‑memory Java object caching
C) Distributed cache such as Hazelcast or Terracotta
D) Database‑based session storage only
Answer: C
Explanation: Distributed caches like Hazelcast or Terracotta allow session data to be shared
among cluster members, ensuring users experience a seamless fail‑over.
**Question 3. When deciding between vertical and horizontal scaling for Pentaho Server, which
metric is most directly impacted by horizontal scaling?**
A) CPU clock speed per node
B) Number of concurrent user sessions supported
C) Amount of RAM per JVM
D) Disk I/O throughput of a single server
, [HCE3900] HCE 3900 Hitachi Vantara Certified Epert
Pentaho Solutions Architect Certification Exam
Preparation
Answer: B
Explanation: Horizontal scaling adds more nodes, increasing the total number of concurrent
sessions the environment can handle.
**Question 4. Which repository type does Pentaho use by default for storing metadata,
transformations, and reports?**
A) MySQL
B) PostgreSQL
C) Jackrabbit (JCR)
D) Oracle
Answer: C
Explanation: Pentaho’s default repository implementation is based on Apache Jackrabbit, a Java
Content Repository (JCR) that stores objects as hierarchical nodes.
**Question 5. To promote a transformation from development to production without losing
version history, which practice is recommended?**
A) Export the .ktr file and manually copy to production
B) Use the Pentaho Repository’s built‑in version control and promote via “Publish” workflow
C) Store the transformation in a shared network drive
D) Re‑create the transformation in production manually
Answer: B
Explanation: The repository’s version control tracks changes and the “Publish” workflow moves
artifacts between environments while preserving history.
**Question 6. Which JVM tuning parameter most directly influences the heap size available to
Pentaho Server?**
, [HCE3900] HCE 3900 Hitachi Vantara Certified Epert
Pentaho Solutions Architect Certification Exam
Preparation
A) -XX:MaxPermSize
B) -Xms
C) -Xmx
D) -XX:+UseG1GC
Answer: C
Explanation: -Xmx sets the maximum heap size for the JVM, which is critical for Pentaho Server
memory allocation.
**Question 7. When integrating Pentaho with LDAP for authentication, which attribute is
typically used to map LDAP groups to Pentaho roles?**
A) cn
B) uid
C) memberOf
D) objectClass
Answer: C
Explanation: The memberOf attribute contains the groups a user belongs to, allowing Pentaho
to map those groups to its internal role definitions.
**Question 8. Which protocol enables Single Sign‑On (SSO) for Pentaho using a web‑based
identity provider?**
A) FTP
B) SAML
C) SMTP
D) SNMP
Answer: B
, [HCE3900] HCE 3900 Hitachi Vantara Certified Epert
Pentaho Solutions Architect Certification Exam
Preparation
Explanation: Security Assertion Markup Language (SAML) is the standard protocol for
web‑based SSO, and Pentaho can act as a Service Provider.
**Question 9. Row‑level security in Pentaho is typically implemented using which feature of the
Mondrian schema?**
A) Role‑based access control (RBAC)
B) Dynamic schema generation
C) Security filters (row‑level security) in the schema XML
D) Data source encryption
Answer: C
Explanation: Mondrian supports row‑level security via `<rowSecurity>` elements that filter rows
based on the current user’s role.
**Question 10. Column‑level security in Pentaho can be achieved by:**
A) Hiding columns in the UI only
B) Defining column permissions in the repository’s ACL
C) Using the “Hide” property in the Analyzer UI
D) Adding column‑level security rules in the Mondrian schema’s `<columnSecurity>` element
Answer: D
Explanation: Mondrian’s `<columnSecurity>` element restricts visibility of specific columns for
defined roles.
**Question 11. In a multi‑tenant SaaS deployment, which architectural pattern best isolates
tenant data at the database level?**
A) Shared schema, shared tables with tenant_id column
B) Separate schema per tenant