1) In Oracle Business Intelligence a 32-character
hexadecimal string that is system-generated to form a unique identifier for an
object. Is used to refer to individual users and groups. This unique
identifier is known as a:
Ans) Globally Unique Identifier (GUID)
Note: A GUID is typically a 32-character
hexadecimal string that is system-generated to form a unique identifier for an
object. In Oracle Business Intelligence a GUID is used to refer to individual
users and groups.
2) Groups are organized hierarchically, and inherit
privileges from parent groups. In other words, the BI Administrators group
automatically inherits privileges from the BI Authors and BI Consumers groups.
Oracle recommends that you do not change this hierarchy.
3) Oracle does not recommend using Web Logic Embedded
LDAP Server in an environment with more than __1000___ users.
To
authenticate proxy users, which two session variables must be created?
- PROXY — Use this variable to store the name of the proxy user.
Use the initialization block named Proxy
Block and includes code such as the following:
Select
targetIdfrom Proxies where ‘VALUEOF (NQ_SESSION.RUNAS)'=targetId and ': USER’=proxy
ID
- PROXYLEVEL — Use this optional variable to store the proxy level, either Restricted or Full. If you do not create the PROXYLEVEL variable, then the restricted level is assumed.
4) Use the initialization block named Proxy
Level and includes code such as the following:
Select
proxyLevel from Proxies where 'VALUEOF(NQ_SESSION.RUNAS)'=targetId and
':USER'=proxyId
Impersonation is a feature used by
Oracle Business Intelligence components to establish a session on behalf of a
user without employing the user's password
5) The default security groups in
OBIEE 11g are named:
a) BIConsumers
b) BIAuthors
c) BI Administrators
6) During installation an Oracle Web Logic
Server domain is created and Oracle Business Intelligence is installed into
that domain. The domain is named _________ (in Simple or Enterprise
installations), and is found under the Web Logic Domain
folder in the Fusion Middleware Control navigation pane.
Ans)
bifoundation_domain
6) A placeholder for an Application
Role definition can be created in the Administration Tool to facilitate
offline repository development. But this is just a placeholder visible in the
Administration Tool and is not an actual application role. You cannot create an
actual application role in the Administration Tool. You can create an
application role only in the policy store, using the administrative interface
available for managing the policy store.
An authentication provider that knows how to access information about the users and groups accessible to Oracle Business Intelligence and is responsible for authenticating user
A policy store provider
that provides access to application roles and application policies. which forms
a core part of the security policy and determines what users can and cannot see
and do in Oracle Business Intelligence.
A credential store
provider that is responsible for storing and providing access to
credentials required by Oracle Business Intelligence.
8) If you reconfigure Oracle Business Intelligence to use
Oracle Internet Directory (OID), you can view and manage users and groups in
Oracle Web Logic Server Administration Console
Ans) False.
9) Oracle Business Intelligence Release 11g supports the use of SA System Subject
Area, in combination with the BI Server initialization blocks, to access user,
group and profile information stored in database tables.
10) True or False: In Oracle Business Intelligence Release
10g users and groups could be defined within a
repository file using the Oracle BI Administration Tool. In Oracle Business
Intelligence Release 11g users and groups can still
be defined within a repository.
Ans) false
11) Oracle Business Intelligence 11g
is tightly integrated with the________________ architecture and delegates
core security functionality to components of that architecture.
Ans)
Oracle Fusion Middle ware Security
12) When configuring a SQLAuthenticator, use this tab on
the Settings dialog box to enter the SQL statements used to query,
and authenticate against, your database tables.
13) In the Provider Specific tab
you specify the SQL statements used to query, and authenticate against, your
database tables.
14) If you want user Fred to be a Sales dashboard author,
you might create a ______ called Sales Dashboard Author that has
permissions to see Sales subject areas in the repository and edit Sales
dashboards.
Ans) application role
15) A list of application roles that a user is a member
of is available from the Roles and Groups tab in the ______ dialog in Presentation Services.
Ans) My Account
16) A (n) _______ defines
a subset of policies in the policy store. The Oracle Business Intelligence
instance is named obi.
Ans) application stripe
17) Oracle Business Intelligence components communicate
with each other using TCP/IP by default. Configuring ___ between the Oracle
Business Intelligence components enables secured network communication.
Ans) SSL
18) After a user has been authenticated, the next
critical aspect of security is ensuring that the user can do and see what they
are authorized to do and see.
Authorization for Oracle Business Intelligence Release 11g
is controlled by a security policy defined in terms of application roles.
19) A method of authorization enabling a user to authenticate
once and gain access to multiple software application during a single browser
session is called:
Ans) Single Sign on (SSO) a method of authorization
enabling a user to authenticate once and gain access to multiple software
application during a single browser session.
20) Assigning an application role to be a member of a
Presentation Services Catalog group is considered a best practice.
Ans) false
No comments:
Post a Comment