Q1. Which resource identifies the OBIEE Web Catalog (webcat)?
A. instanceconfig.xml
B. RCU Schema
C. Identity Store
D. nqsconfig.ini
E. Admin Server
Answer: CE
Q2. Select the scenario in which block storage must be used instead of aggregate storage.
A. Incremental data loading
B. Top - down planning
C. Extremely sparse data sets
D. Millions of members in the outline
Answer: B
Q3. If you have a database with four aggregate tables, how should the repository be configured to take advantage of the aggregates?
A. By creating four new logical tables sources
B. By creating four new logical table sources and choosing each dimension's level of aggregationin the Content tab
C. By creatingfour new logical table sources and using the Fragmentation content to specify theaggregation levels
D. By creating four new logical table sources and using the "where" section of the Content tab to specify the aggregation levels
Answer: B
Q4. Identify the two Object level security functions that are done on the repository by using the BI Admin tool.
A. Assign users to a webcatalog group
B. Create a new repository group
C. Createanew user in the repository
D. Createaweb catalog group
E. Define permissions for Dashboard
Answer: BC
Q5. Query limits tab can be accessed through________.
A. Security Manager, Query tab, Application role dialog box, Permissions
B. Security Manager, Application Roles tab, Query dialog box, Permissions
C. Security Manager, Application Roles tab, Application role dialog box, Permissions
D. Security Manager, Application Roles tab, Application role dialog box, Query Properties
Answer: C
Q6. Which task can be performed after the Administrator link has been reached through logging into OBIEE?
A. Associate map layers to columns
B. Manage access to Subject Areas
C. SSO enablement
D. Start or Stop BI Managed Servers
Answer: BCD
Q7. If Security attributes conflict, what happens?
A. The user or application role is granted the minimum security attribute
B. The user or application role is granted the maximum security attribute
C. The user or application role is granted No security attribute
D. The user or application role is granted the Fully Restrictive security attribute
Answer: A
Q8. What are the two types of Session Variables?
A. System
B. Non System
C. Static
D. Dynamic
Answer: AB
Q9. When creating Aggregate tables in the OBI repository by using the Aggregate Persistence Wizard, which two statements are true?
A. The analyst mustfirstwrite DML (Data Manipulation Language) scriptstocreate the aggregate table.
B. TheAggregate Persistence Wizard enables youto automate the creation of physical aggregate tables and theircorresponding objects in the repository.
C. Job Managercanbe used to run the Aggregate Persistence script.
D. TheExtractionTransformation and Loading process creates the aggregate tables.
Answer: BC
Q10. How do System Session Variables obtain their values?
A. They are entered by user input on a dashboard
B. They are obtained from data fields in the Physical Layer
C. They are obtained from the Presentation Layer
D. They are obtained from the Initialization Block
Answer: D