Weekend Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

Oracle 1z0-588 Oracle Hyperion Data Relationship Management Essentials Exam Practice Test

Page: 1 / 7
Total 73 questions

Oracle Hyperion Data Relationship Management Essentials Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$42  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$36.75  $104.99
Question 1

After the requirements and analysis phase of the DRM implementation, you documented key findings pertinent to the project.

Choose the three findings that pose risk to the implementation of DRM.

Options:

A.

Lack of understanding about how the data elements 3r& used by the business

B.

Proper business involvement

C.

Inexperience with DRM

D.

Unclear owners of data and unclear data process

E.

Phase includes single dimension with many sources and targets

F.

There is a well defined data governance model.

Question 2

Per the example:

Identify the two true Statements about the Product hierarchy and its alternate hierarchy.

Options:

A.

300-10 is called an Explicit Shared Node.

B.

300-10 is called an Implicit Shared Node.

C.

300 is not a valid shared node because only leaf nodes may be shared.

D.

You can delete the node 300-10 in the alternate product hierarchy,

E.

You can change local property values in the alternate product hierarchy.

F.

You can change any of the system generated property values on the Shared Node property category forthe alternate product hierarchy.

Question 3

A department may only have 10 cost centers. How can you address this requirement?

Options:

A.

Security

B.

Validation rule

C.

Filter

D.

Node Type

E.

Property query

Question 4

The Time Balance property definition is applicable to the Account hierarchy only and is not valid for any other hierarchy. You would like to simplify the view for end users so they do not see the Time Balance property for the Entity dimension.

What method will achieve this requirement?

Options:

A.

Assigning the Time Balance property to the Account hierarchy

B.

Assigning security to the Time Balance property

C.

Choosing the property definition option to hide the Time Balance property for all hierarchies except Account

D.

Creating a node type for the Account hierarchy

E.

Assigning a glyph for the Account hierarchy

Question 5

Which three types of mappings are managed via properties in DRM?

Options:

A.

One-to-one mapping

B.

Mapping nodes across versions

C.

Many-to-many mapping

D.

One-to-many mapping

E.

Validations for format of mapped nodes

Question 6

Identify three ways to narrow the scope of the first phase of the DRM implementation.

Options:

A.

Design and build the DRM process for a single dimension.

B.

Design and build the DRM process for a single target and single source.

C.

Exclude workflow and automations from the DRM process.

D.

Exclude validations and verifications.

E.

Focus the design to a single version.

Question 7

Identify the three true statements.

Options:

A.

A version may contain multiple hierarchies.

B.

A version may contain a single hierarchy with shared nodes.

C.

A version may contain version-specific node types.

D.

A version may be assigned validations.

E.

A version may be assigned exports.

Question 8

Identify the valid Import sections and the required columns for each section.

1. Version, Required column: version name

2. Hierarchy, Required columns: hierarchy name, top node

3. Hierarchy, Required columns: hierarchy name

4. Node, Required column: node name

5. Relationship, Required columns: parent node name, child node name

6. Hierarchy Node, Required columns: hierarchy name, node name

7. Hierarchy Node, Required columns: hierarchy name

Options:

A.

1, 2, 4, 5 only

B.

1, 2, 4, 5, 6 only

C.

1, 3, 4, 5, 6 only

D.

1, 2, 4, 5, 7 only

E.

1, 3, 4, 5, 7 only

F.

1, 2, 3, 4, 5, 6, 7

Question 9

Identify the two true statements about node access groups.

Options:

A.

Node access groups use inheritance to assign the same access to descendants of a node but this inherited security may be overwritten at lower levels.

B.

Valid node access levels are Read, Edit,LimitedEdit, Insert, Inactivate, and Add.

C.

Access levels are assigned separately for leaf and limb nodes.

D.

Node access groups can be used to filter the display of the hierarchy so that users only see the section of the hierarchy for which they have access.

E.

Node access groups may be assigned by the Application Administrator or Access Manager.

Question 10

You want an import to stop if a duplicate node is found. How do you do this?

Options:

A.

Set the duplicate error mode to Generate Error and Max Errorscount to 0.

B.

Set the Unique String value to "Error" in the Duplicate Handling options.

C.

Create a validation to find duplicates that runs after the import is processed.

D.

Make sure that the EnableSharedNodes property is set to False.

E.

Choose the option to skip Duplicate Members.

Page: 1 / 7
Total 73 questions