Oracle Data Management Cloud Practice
|
|
Título del Test:
![]() Oracle Data Management Cloud Practice Descripción: Oracle Data Management Cloud Practice |



| Comentarios |
|---|
NO HAY REGISTROS |
|
Viewpoint queries enable you to share for nodes in a viewpoint whose properties match your specified criteria. Which two statements identify the differences between private and public queries?. You can copy public queries and any private queries that you created. When you copy a public query, it is saved as a public query. You can run private queries for a time-labeled viewpoint, but not public queries. If you have at least Data Manager or Metadata Manager permission on a viewpoint, you can promote a private query to a public query. When you save a viewpoint query, it is saved as a private query, which can be viewed and run only by the user who created it. During the approval stage, you work with other users on the approval of requests, as defined by the approval policies triggered by request items. Which two statements are true about request enrichment?. Enrichments can only make request changes that are limited to the approval policy or the data objects in the original request. Approvers must have Participant permission with Write access in the view to be able to enrich requests. Changes to a request during enrichment are final and do not require further approval. Request enrichment must be enabled on an approval policy to allow enrichers to change the request. All validation issues must be resolved before you can submit or commit a request. Which two methods could you use as part of the process to identify and resolve request validation issues?. Select the invalid tab to display the validation messages for the nodes. Mark invalid request items with a red display manually. Expand an invalid request item to identify which viewpoint and action has the validation issue. Click the issues icon to view only request items with validation issues. Denisse needs to perform the following tasks for an Entity dimension: -Create, edit and delete metadata objects in the dimension data chain, such as node type, hierarchy sets, converters, custom validations, permissions, and policies. -Write to nodes and properties Denisse cannot perform the following tasks for the Entity dimension: -Import or export data -Configure subscriptions -Delete the dimension Which permission or combination of permissions should you assign Denisse for the Entity Dimension?. Metadata Manager and Participant (Write). Owner. Metadata Manager. Metadata Manager and Data Manager. Which EPM Automate command can you use to restart services on your instance?. Reset.Service. Start.Service. Restart.Service. Recreate.Service. When you register an application, the system automatically creates default node types for each dimension in the application. You can also define your own node types. Which two statements are true about node types?. Node types for a dimension are determined by the hierarchy set. Node types consist of either hierarchies or lists. You can create custom node types to meet your business needs. You can define test qualifiers for node names at the node type level. When you register and application, the system automatically creates default node sets for each dimension. You can also define your own node sets. Which statement is true about node sets?. Node sets can consists of either a hierarchy or a list, but not both. Node sets do not consist of hierarchies or lists. Node sets can consist of only hierarchies. Node sets can consist of both hierarchies and lists. Which two statements are true about creating a request to make changes to data in a view?. You can use comments to add summary remarks, explain a specific change, ask questions, and highlight important information about the request. A request item shows the number of actions, the viewpoint where the changes were made, and the actions performed. You can add nodes to a target viewpoint from a source viewpoint in a different view, as long as you have defined a node type converter between the source and target viewpoints. A request can contain items from multiple viewpoints across multiple views. When you register an application, the system creates a default view that contains all your dimensions. However you may have other use cases where you need to create alternate business perspectives. You can create views and viewpoints that facilitate those use cases. In which two situations would you create an alternate view and viewpoints?. You need to give users access to the default view so that they have access to only one dimension. You need an alternate view to share, compare, and map information across multiple applications. You need to create a validation view with multiple viewpoints from different dimensions so you can maintain all you application information in one piece. You need to create a maintenance view with multiple viewpoints from different applications so you can maintain all you dimension information in one place. You can define an expression to calculate a node type name during a request and then store that value when that request is completed and closed. Which request operation no longer requires to explicitly specify the node name?. Inserting nodes. Adding nodes. Updating nodes. Moving nodes. A node exists in a hierarchy. Which two types of properties could be present?. Hierarchy properties. Shared properties. Relationship properties. Node properties. You want to validate the uniqueness of calculated node names. How do you achieve this goal?. Create a constraint at the application or node type level for the Core.Name property. Enable the Node Name Exists in Node Type system validation at the application level. Add a condition that checks the uniqueness of the calculated node name to the expression. Create a custom validation to check for uniqueness at the node level. As a Data Manager, you want to know where a requirement is in the workflow process and which policies are remaining. How would you find this information?. Run a Data Governance Workflow report from the Reports page. View Request History from the viewpoint to which the request applies. View Policy Execution Plan from Request Inspector. Run an Audit report for the request from the Audit page. Your goal is to register a customizable planning application with full dimension and cube flexibility for multi-dimensional analysis, reporting, and planning. Which application type do you choose during the registration process?. Planning modules. Universal. Freeform. Planning. Which two are true about registering an application in Enterprise Data Management Cloud?. You must be a Service Administrator to use templates. You can transfer both active and archived applications. You can use templates to move all applications in an environment to a different environment at one. Templates enable you to store application or dimension configuration in an offline JSON file. 17. Casey has access to your Enterprise Data Management instance as a regular used. He needs to perform the following tasks in Enterprise Data Management. • Manage groups and assign application roles to users. • Import and Export migration snapshots. • Create applications and views. However, Casey cannot have access to write or change data or metadata for applications to which he has not been granted permission or view changes made to data in all applications. How can you provision Casey?. Assing Casey the application roles Application-Create, Migrations-Administer, and Views-Create. Assign Cassey the application roles Access Control-Manage, Application-Create, Audit, Migrations-Administer, and Views-Create. Assign Cassey the application roles Access Control-Manage, Applications-Create, Migrations-Administer, and Views-Create. Changes Casey's access role on the instance to Service Administrator. You are the Service Administrator for an instance with Planning applications. You are provisioning a user who needs to be able to view the entire Planning application and create requests to update data in two of its dimensions (Entity and Product). The user cannot import or export dimension data. Which two permissions are required for this user?. Participant (Write) permission for the application. Participant (Read) permission for the application. Participant (Write) permission for the Entity and Product dimensions. Data Manager permission for the Entity and Product dimensions. You want to use custom validations to create custom logic to enforce business rules on your enterprise data. Which two statements are true about custom validations?. Custom validations are run when a request is submitted, approved, or committed. You configure custom validations at the application level. Custom validations are general system checks that run for all application types. You configure custom validations at the node types or hierarchy set level. You are mapping accounts from an acquired subsidiary company to both a Financial Consolidation and Close application and a Planning application. How many mapping viewpoints are required to accomplish this?. One. Two. Three. Four. On the Applications page, you copied the FinPlan planning application to create a Planning application with the same configuration as the original. Which items from the FsnPlan application are copied to the new application?. All metadata, views, and viewpoints, regardless of permissions. All data and metadata, including dimension data and properties. All metadata, connection login details, views and viewpoints, time labels and time-labeled viewpoints, and compare profiles. All metadata, including dimensions, data chains, validations, policies, and subscriptions. Which two statements are true about an alternate viewpoint in an unbound state?. The alternate viewpoint may be partially bound if it shares data chain objects with a bound viewpoint. The alternate viewpoint is not used in a binding and all the data chain objects that it contains have a binding status of Unbound. The alternate viewpoint is not used in a binding, but all the data chain objects that it contains have a binding status of Bound. You cannot use the alternate viewpoint to construct a what-if scenario that is isolated form the production. You have a Planning view with dimension viewpoints that are subscribed to related viewpoints in a General Ledger view: • Viewpoint Account Subscription: General Ledger | Account Assignee: User 1 • Viewpoint Entity Subscription: General Ledger | Entity Assignee: User 2 • Viewpoint Product: General Ledger | Product Assignee: User 2 • Viewpoint Customer: General Ledger | Customer Assignee User 1 A Data Manager creates a request in the General Ledger view that includes changes in all four viewpoints and submits it. How many subscriptions requests are created?. Three. Two. Four. One. In which two circumstances does a subscription request assignee receive a notification that a request is assigned to them for review?. When an auto-submit subscription request has validation issues. When a subscription request is created and auto-submit is not enabled. When a subscription request is auto-submitted. When another assignee manually submits subscription request items. Which two statements are true about exporting dimensions and mappings?. You need the Data Manager or Owner permission to the application to export its dimensions and mappings. For bound hierarchy viewpoints, nodes are exported starting with the top nodes. For Planning and Universal applications, you can export enterprise data by using either a connection or a comma delimited file. All application types support exporting dimensions and mappings to registered external applications by using connections. Which application type does NOT support exporting mappings?. Planning. Financials Cloud General Ledger. Financial Consolidation and Close. Universal. Which two statements are true about mapping keys?. Mapping keys control which dimensions are output in the source and target columns of the mapping export. The system automatically generates mapping keys for each unique location. Mapping keys consist of a location, source node type, and target node type. One mapping key is required per location . You want to map two General Ledger systems. GL1 and GL2 to single EPM Planning application. Which statement about mapping keys is true in this scenario?. Mapping keys are created automatically when you create map bindings. You need only one mapping key and location to export plan account mappings. You create shadow mapping keys in the target application to represent the values coming from GL1 and GL2 respectively. You create one mapping key per location where a location is a unique target combination. You use a maintenance view to manage entities across two applications, a Financial Consolidation and Close application and a Planning application. You open a request and add an entity to the Financial Consolidation and Close application. What happens when you drag and drop the new entity to the Planning entity viewpoint?. The system uses you defined node type converter to convert the node from a Financial Consolidation node to a Planning node, and then adds the node to the planning viewpoint and application. The system inserts the node into the planning viewpoint. Then you click the Convert button to run your defined node type converter, which converts the node from a financial consolidation node to a planning node. The system adds the financial consolidation node to the planning viewpoint without converting it because conversion is not necessary in this scenario. The system prompts you to select a node type converter, and uses your selection to convert the node from a financial consolidation node to a planning node. The it adds the node to the planning viewpoint and application. Enterprise Data Management Cloud aligns business applications through self-service enterprise data maintenance, sharing in support of ongoing change management. Which two are use cases for Enterprise Data Management Cloud?. Map dimensions across applications. Report automated cash flow by using movement hierarchies and built-in calculations. Desing a global chart of accounts for group finance. Match, link, or merge duplicate customer information. Which two statements are true about subscriptions?. Subscription assignees are automatically granted read access to the source viewpoint. You create a subscription in the source viewpoint by subscribing to a target viewpoint. Subscriptions can automate the process of sharing data between viewpoints. You can select a request assignee to receive subscription requests when they are generated. Which statement is NOT true about import modes when importing dimensions?. Replace import mode results vary depending on whether you are importing to a hierarchy viewpoint or a list viewpoint. You should avoid using Merge import mode in an empty dimension. Merge import node adds nodes that are in the import source but not in the bound viewpoint. Hierarchy relationships in the bound viewpoint and the import source are deleted when you select Replace mode. Nodes from different data sources can be matched and merged to create master records and linked to provide traceability of information from sources systems to target applications? Which two are correct ways to specify a data source for request items?. Configure the Default Data Source import options at the dimension level. On the Viewpoint Load screen, use the Data Source field to identify the data source for the viewpoint load file. Configure a Default Data Source in a viewpoint load profile. For request file uploads, use the Data Source columns to identify the data source for each request item in the file. Which two statements are true about permissions?. User with the Participant (Write) permission for a dimension can perform data imports for the dimension. The Owner permission on a view enable a user to configure the view and grants full access to the data objects in that view. By Default, when you assign the Participant permission to a user or group, their data access is set to Write. Permissions assigned to a dimension also apply to the hierarchy sets and node types that they contain. You must create bindings between dimensions and viewpoints in an Oracle Enterprise Data Management Cloud application to ensure that the bound data objects conform to an external application's requirements. Which two statements are true about unbound dimensions?. You can extract data from unbound dimensions using extracts. You cannot load data into unbound dimension viewpoints using request load files. You can use unbound dimensions to manage complex data sets, such as related value sets, account combinations, and multidimensional mappings. Unbound dimensions are created as part of the application registration process but do not get imported or exported. Maintenance views contain viewpoints from multiple applications. Which two types of sharing do these views facilitate?. Sharing workflows and approvals for comparable dimensions across applications. Copying hierarchies from one application to another. Adding new nodes to comparable dimensions across multiple applications. Aligning nodes and property values between comparable dimensions in different applications. You want to configure hierarchy set validations to enforce specific hierarchical relations. Which two examples of when you would configure a hierarchy set validation?. To enforce that nodes of certain node type always match a specific hierarchy level. To enforce a business rule that prevents having a parent node without children. To create custom property rules to provide meaningful failure messages. To enforce specific validation triggers. You are mapping nodes from dimensions in two source applications to a dimension in a single target application. How do you set up hierarchy sets for this mapping?. Set up the target nodes in one hierarchy and the converted source nodes in another hierarchy of the same hierarchy set. Set up separate hierarchy sets for each source-to-target relationship. Set up the target nodes as parents and the converted source nodes as children in the same hierarchy set . Set up the target nodes in one hierarchy set and the converted source nodes in another hierarchy set. You are creating an expression to transform a property in a node type to evaluate your expression?. A viewpoint. A viewpoint, a node, and a request. A viewpoint and a node. A viewpoint, a node, a request, and a dimension. You have account dimension in two different applications, and new account nodes to either application must be shared with the other. What node type converters do you need to create to facilitate sharing between the applications?. Two node type converters: A node type with application 1 accounts as the source and Applications2 accounts as the target and a node type converter with Application2 accounts as the source and Application1 accounts as the target. Two node type converters: A node type converter with the Application1 account viewpoint as the source and the Application2 account viewpoint as the target, and a node type converter with the Application2 account viewpoint as the source and the Application1 account viewpoint as the source. One node type converter: A node type converter with Application1 accounts as the source and Application2 accounts as the target that specifies a reverse conversion in request when sharing in the opposite direction. One node type converter: A bi-directional node type converter between the account node types in the two applications. When you register applications with one or more dimensions, each dimension has a data chain associated with it end users interact with viewpoints. What are the related data chain objects in a list viewpoint?. Node type, hierarchy set, node set. Node type, hierarchy set, node set, properties. Node type, node set. Node type, node set, dimension. Matching rules allow data records with different identifiers from multiple data sources to be matched base on similar property values. Which two statements are true about matching rules?. You can specify an auto accept threshold that must be met or exceeded for a match result to automatically be accepted. You can define only one rule criteria per matching rule to evaluate any indexed property. If you define multiple rules for a node type, the rules are executed in the order in which they are created. Each matching rule is configured for a particular combination of node type and data source. Node links are relationships between node across node types. Which statement is true about node links?. Users with at least Participant (write) permission on a source node manually define node links for the target nodes. Node links are established automatically when you insert an existing node to make it a shared node. Node links are established between source nodes and target node base on a match and merge of request items or via a subscription request. Node links cannot be used to locate or compare nodes across viewpoints. In which two scenarios are mapping nodes across applications required?. When applications share an external connection. When applications share common dimensions but use different granularity. When applications have common dimensions but use different prefixes or suffixes for member names. When applications share data but have different dimensions. You are configuring a policy so that requests submitted by different users can have different approvers based on an organizational hierarchy that is maintained in EDM? For which policy type can you configure the management hierarchy method?. Commit. Approval. Submit. Notification. You want to enforce the 'four-eyes' principle for your approval policy. How can you do this?. Use a parallel approval method. Use a serial approval method. Use any approval method and do not select 'include submitter'. Use any approval method with at least three different approval groups. You are an approver for a request and the approval policy has enrichment enabled. Which statement is true?. Enrichment a request can trigger additional approval policies. The actions you can perform are based on the data access of the request submitter. You can change or delete request items, but you cannot add new items. You can assign the request enrichment to other users for collaboration. Which two are true about lookup sets?. Lookup sets associated source, values, or keys, with target values. Lookup sets area created during application registration. You can use lookup sets to group and filter nodes. You use lookup sets in expressions to derive properties or transform properties in node type converter. You want to maintain a historical reference of the product dimension for the last fiscal year's structure and retain that for comparison purposes as you make changes to production. Which method should you use to accomplish this?. Create a new default product viewpoint. Export the product viewpoint to a new archived viewpoint. Copy the product viewpoint and archived it to make it read-only. Copy the product hierarchy to a new viewpoint. You are an assignee for a subscription in a target viewpoint that listens for changes in a source viewpoint. When a request was submitted that changed the source viewpoint you received a notification to review a request in the target viewpoint before submitting it. Which two might be true about the subscription?. Auto-submit is not enabled, so you need to review the request before submitting it. Auto-submit is enabled but some of the items in the original request were removed from the subscription request because of a subscription filter. It includes a commit policy that you must approve before submitting. Auto-submit is enabled but one or more request items are invalid for the target viewpoint. The Owner permission for an application lets users perform which three tasks? (Choose three). Modify application registration. Assign permissions for an application's data objects to other users and groups. Import viewpoints from external applications. Manage an application's data objects. Delete service administrators from an instance. Maintenance views contains viewpoints from multiple applications. What two types of sharing do these views facilitate?. Sharing workflows and approvals for comparable dimensions across applications. Adding new nodes to comparable dimensions across multiple applications. Copying hierarchies from one application to another. Aligning nodes and property values from one application to another. Which two are valid data sources for importing dimensions?. Registered external applications. Maintenances snapshots. Comma-delegated files. Tab-delegated files. You have account dimensions in two different applications that must be kept in sync. Given a business requirement that nodes added to either application must be shared with the other, what should you do?. Create one bi-directional node type converter between the two applications. Create two node type converters: one with Application1 accounts as the source and Application2 accounts as the target, and another with Application2 accounts as the source and Application1 accounts as the target. Create one node type converter with Application1 accounts as the source and Application2 accounts as the target, and specify a reverse conversion in requests when sharing in the opposite directio. Create three node type converters: one with Application1 accounts as the source and Application2 accounts as the target, another with Application2 accounts as the source and Application1 accounts as the target, and a third for bi-directional sharing. In your application, you have nodes for cost centers. You want to group them two ways: by department and geography. What are two ways to accomplish this? (Choose two.). Create two hierarchy sets; one where parent nodes are departments and child nodes are cost centers; and another where parent nodes are geographical regions and child nodes are cost centers. Create a list viewpoint for cost centers, then add parents for departments and geography. Create two node sets; one with a group of departments and another with a group of geographical regions. Create one hierarchy set with different top nodes for departments and geography, and add shared cost center nodes as children. Which statement is true about permissions?. The Owner permission on a view enables a user to configure the view and grants full access to the data objects in that view. When you grant a permission at a higher level, such as Owner, it includes all of the permissions at lower levels, such as Participant. Permissions assigned to a dimension do not also apply to the hierarchy sets and node types that they contain. By default, when you assign the Participant permission to a user or group, their data access is set to Write. How does an information model represent data relationships?. Through tables and columns. Through mathematical formulas. Through flowcharts and diagrams. Through graphs and charts. What is an API in the context of sharing data across applications?. A set of rules and protocols for communication between applications. A database management system used for data storage. A data visualization tool. A file format for exchanging. When registering an application, what is typically required to be configured?. Application version control. Application deployment schedule. Application roles and permissions. Application encryption algorithms. How are data import and export typically performed?. Storing data in a centralized database accessible to all applications. Manually copying and pasting data between systems. Sharing data files via email attachments. Using data integration tools or ETL (Extract, Transform, Load) processes. Which two objects can you transfer using templates?. Data. Requests. Applications. Dimensions. Transaction History. Which two statements are true about the Participant permission? (Choose two). When you grant a user Participant (Write) permission on a hierarchy set, that user is also granted implicit Participant (Write) permission on any node type in that hierarchy set. Granting the Participant (Read permissions at the application levels lets users browse viewpoints that contain data for any dimension in the application. You can assign the Participant permission at the application, dimension, hierarchy set, node type, and property level. The Participant permission enables you to specify which actions users can take and which properties they can view or edit for node types and hierarchy sets. Which three statements are true about lookup sets?. You use lookup sets in expressions for deriving properties or transforming properties in node type convertors. Lookup sets associate source values, or keys, with target values. Keys and values in a lookup set can be configured for one or more applications. Lookup sets are created during application registration. You can use lookup sets to group and filter nodes. Which statement is FALSE about unbound dimensions?. Unbound dimensions are created as part of the application process but do not get imported or exported. You can extract data from unbound dimensions using extracts. You can load data into unbound dimensions viewpoints using request load files. You can use unbound dimensions to manage complex data sets such as related value sets, account combinations, and multi dimensional mappings. Which four of the following does the registration wizard help you define when you register and Oracle Financials Cloud General Ledger application?. Segments. Dimensions. Connections. Value Sets. Node Types. Trees. Which two occur as the end result of the registration process?. An application is created in EDMC. An application is created in Planning. Data objects generated to manage, import, and export the enterprise data in the instance. Data is imported into the EDMC instance. Which three of the following does the registration wizard help you define when you register a Planning application?. Segments. Cubes. Properties. Dimensions. Node Types. Connections. Which three of the following does the registration wizard help you define when you register a universal application?. Connections. Cubes. Segments. Node Types. Properties. Dimensions. Which of the following can you perform in the Financial Categories section while registering a Financial Cloud General Ledger application?. Add a category and modify a category only. Modify a category only. Add a category only. Add a category, modify a category, and delete a category. |




