The administration tool is the developer's interface to the repository file. It allows the development of and changes to the metadata repository file. Which statement is true?
A. Changes to the repository can only be carried out in offline mode.
B. Multiple developers can work on one repository at the same time. Results can be merged later on.
C. All aspects of security are being held in the repository file.
D. Opening the rpd.file in online mode results in performance Issues for the application user.
The Oracle BI office plug-in allows you to import the results of an OBI request into which two MS applications?
A. MS Visio
B. MS Excel
C. MS Project
D. MS Word
Which of the following characteristics pertain to a "ragged" hierarchy?
A. It can only be stored in an XML structure.
B. A branch of the hierarchy may have a different number of levels than other branches.
C. All values can have a maximum of six levels.
D. It creates multiple levels of hierarchy in the database table.
Which two options are valid Repository Variable names?
A. USER
B. CurrentDay
C. CurrentMonth
D. Date
Identity the three advantages of the BI Server metadata repository.
A. Mapping of federated data sources to one logical object
B. Ability to change physical sources without losing reports
C. Little changes in the physical layer to shift from development to production environment
D. Three layers support the highest level of security
The Time Dimension hierarchy is a good example of a__________.
A. Level-based Time Dimension hierarchy
B. Ragged Hierarchy
C. Skip Level Hierarchy
D. Value-based Hierarchy
When designing a Star Schema, which option does not apply?
A. The facts are quantifiable.
B. The fact has several foreign keys that are primary keys in the dimensional table
C. Fact table is joined to the related dimensional tables.
D. Dimensional tables are normalized.
E. Dimensional tables have one attribute primary key as Product_ID for products.
Which of the following native features of Essbase are not supported in OBIEE 11g?
A. Member Alias
B. Alternate Hierarchies
C. Dynamic Time Series
D. Parent/Child-based Hierarchies
How do you get the BI plug-in for MS Office?
A. By contacting the administrator
B. By downloading it from the BI Server
C. By downloading it from the Database Server
D. By downloading it from Microsoft Server
The three metadata layers are an important concept of the BI Server. Which statement is incorrect?
A. The physical layer defines the objects and relationships that the Oracle BI Server needs to write native queries against each physical data source.
B. Separating the logical of the application from the physical model provides the ability to federate multiple physical sources to the same logical object.
C. The model and mapping layer define the business or logical model of the data. This layer determines the analytic behavior seen by users.
D. The presentation layer defines the relationship that is needed to create the DML.
To add multiple sources to on existing logical table dimension in the Business Model and Mapping layer, the source of the data must first exist in which option?
A. Presentation Layer
B. Business Aggregate Layer
C. Physical Layer
D. Web Catalog
OBIEE default security model stores security Information such as user names and password combinations for accessing an external system such as Active Directory. It is stored in the____________.
A. Policy Store
B. Credential Store
C. Identity Store
D. Person Store
You run the Consistency Check and receive the warning: [39003] Missing functional dependency association for column: DIM_Offer_End_Date.CREATE_DT.
What would you check?
A. Whether the logical table source for this column has been disabled
B. Whether the columns creating CREATE_DT have been deleted
C. Whether there is a logical join between the DIM and FACT tables
D. Whether there is a physical join between the DIM and FACT tables
E. Whether there is a physical column mapped to the logical column
F. DIM_Offer_End_Date.CREATE_DT
Use of the Enterprise Install option is recommended for which three options?
A. Multiple instances on a single computer
B. Scale out for High Availability and Failover
C. Support for high security requirements
D. Evaluation of end user functionality
E. Single users working on a single computer
Object Security controls access to Subject Areas, Tables, and Columns in OBIEE and can be implemented by using which method?
A. Single Sign-On (SSO)
B. Database Authentication
C. Business Logic Object Security
D. External Table Authentication
E. LDAP Authentication