SAP Bo Admin Beginner Quiz

SAP BO ADMIN Beginner Quiz




1
which of the following is true about Object-level security?

  1. It applies across multiple universes
  2. Defined both in CMC and universe object definitions
  3. It has multiple levels
  4. All of the above

Answer : All of the above

 
2
Query Control Restrictions that cannot be applied through Data Security profile are

  1. Limit size of resultset to
  2. Limit execution timeto
  3. Restrict rows to
  4. A&B

Answer : A & B

 
3
Table mappings in Data security profile can be used to set

  1. Row level security
  2. column level security
  3. Row and column level security
  4. None of the above

Answer : Row level security

 
4
Which of the following is true about schedule access level?

  1. User can schedule report but cannot refresh in real time
  2. User cannot schedule report but can refresh in real time
  3. User can schedule report and also reprort in real time
  4. all of the above

Answer : User can schedule report but cannot refresh in real time

 
5
Version Management System  is used

  1. to manage version of reports
  2. used to shift to any version of report any time using this tool
  3. compare the metadata information of 2 versions of content
  4. all of the above

Answer : all of the above

 
6
When you create a new folder, two sets of permissions are automatically assigned:
 

  1. Administrators are given the access level Full Control and Everyone is given the access level No Access.
  2. Administrators are given the access level Full Control and Everyone is given the access level view.
  3. Administrators are given the access level Full Control and Everyone is given the access level view on demand
  4. all of the above

Answer : Administrators are given the access level Full Control and Everyone is given the access level No Access.

 
7
Which of the following offers significant improvement over import wizard

  1. IDT
  2. Rich Client
  3. LCM
  4. None of the above

Answer : LCM

 
8
Monitoring database uses

  1. Oracle
  2. MSSqlserver
  3. Java Derby
  4. any of the above

Answer : Java Derby

 
9
which of the following is not true

  1. Real-time monitoring is provided via the CMC.
  2. There are a number of prebuilt dashboards to show current server utilization, processes, and sessions. System administrators can specify alerts to be sent when certain situations occur.
  3. SAP Business objects has only apporach for monitoring which Real-Time
  4. all of the above

Answer : SAP Business objects has only apporach for monitoring which Real-Time




10
Version Management System  is used

  1. To create a copy of the selected version in VMS Repository
  2. to lock the report, or Unlock to unlock the report
  3. to delete all versioned content from the VMS repository
  4. all of the above

Answer : all of the above

 
11
which one of the following is not true about history options in VMS

  1. Compare – this option enables you to compare the metadata information of two versions of content.
  2. Export Copy of Version – this option enables you to obtain a copy of the selected version and save it to your local system.
  3. Get Copy of Version – This option enables you to obtain a copy of the selected version
  4. Get Version – If there are multiple versions, and if you donot require a particular version of the BI resource, then you can select the required report and click Get Version

Answer : Get Version – If there are multiple versions, and if you donot require a particular version of the BI resource, then you can select the required report and click Get Version

 
12
which one of the following is not true

  1. VMS and CMS are same
  2. VMS and CMS are different
  3. Version of report in VMS and CMS can be different
  4. Both VMS and CMS have versions

Answer : VMS and CMS are same

 
13
When a user belongs to more than one group or when you combine multiple restrictions into one set, it’s helpful to see what the net impact is:how the restrictions will be combined. This option is provided through

  1. Security editor
  2. Object Level Security
  3. CMC
  4. all of the above

Answer : Security editor

 
14
what happens when inheritance from multiple groups overlap: Not Specified

  1. Denied
  2. Grant
  3. Grant or denied
  4. all of the above

Answer : Denied

 
15
With the permission of No Access, members of the group Everyone

  1. will not even see that the folder exists
  2. can see folder but cannot open reports in folder
  3. can see folder but cannot modify reports in folder
  4. all of the above

Answer : will not even see that the folder exists

 
16
which of the following is true about Access Levels

  1. Schedule access level can shedule report and refresh report in real time
  2. View access level can see folder and report but not universe
  3. view on demand access level can refresh report in real time
  4. all of the above

Answer : view on demand access level can refresh report in real time

 
17
If your company does not have a centralized system for assigning user IDs and passwords

  1. You can use External Authentication with windows AD
  2. you can use the built-in security within SAP BusinessObjects, referred to as Enterprise authentication
  3. You can use LDAP for authentication
  4. all of the above

Answer : you can use the built-in security within SAP BusinessObjects, referred to as Enterprise authentication

 
18
Which of the tasks are involved in migrating content:

  1. Create a job that specifies the source and destination.
  2. Select the repository content that you wish to migrate, such as universes and reports.
  3. Identify and select dependent objects and execute the job
  4. all of the above

Answer : all of the above

 
19
which of the following is true about CMC

  1. It is webbased application
  2. allows for control of users
  3. allows for control of repository Objects
  4. all of the above

Answer : all of the above




20
what happens when inheritance from multiple groups overlap :Grant + Deny + Not Specified

  1. Deny
  2. Grant
  3. Not Specified
  4. all of the above

Answer : all of the above

 
21
Which of the following is not true about BIAR file

  1. doesnot allow to move content from one environment to another
  2. It is a type of zip or archive file
  3. It contains XML files for documents, universes, and other repository content
  4. all of the above

Answer : doesnot allow to move content from one environment to another

 
22
When you use object-level security, if a user does not have access to the object which of the following is true:
 

  1. When a user creates a new query, the user sees the object in the universe.
  2. When a user tries to refresh a query that contains the private object, the user receives an error message.
  3. When a user accesses a report that contains the private object, the user does not see the object in the report,
  4. all of the above

Answer : When a user tries to refresh a query that contains the private object, the user receives an error message.

 
23
what happens when inheritance from multiple groups overlap: Grant + Not Specified

  1. Deny
  2. Grant
  3. Not Specified
  4. all of the above

Answer : Grant

 
24
what happens when inheritance from multiple groups overlap: Not Specified

  1. Deny
  2. Grant
  3. Not Specified
  4. all of the above

Answer : Deny

 
25
Import wizard is now called as

  1. Central Configuration Manager import wizard
  2. Life Cycle Manager
  3. Migration Wizard
  4. all of the above

Answer : Life Cycle Manager

 
26
When working with a repository, the IDT allows universe development and maintenance to be distributed across several designers through a

  1. IBM clear Case tool
  2. locking mechanism
  3. Microsoft Virsual sourceSafe
  4. all of the above

Answer : locking mechanism

 
27
Which of the following is not true about auditing

  1. Historical usage information can be captured to a log file
  2. Historical usage information can be captured to a relational database
  3. Auditing information is Real time
  4. all of the above

Answer : Auditing information is Real time

 
28
For the group everyone the default access to all universes and universe connections is

  1. View
  2. Schedule
  3. Full Control
  4. all of the above

Answer : View

 
29
Business Security Profile allows to

  1. grant access to business layer views
  2. deny access to business layer views
  3. individual dimensions, measures, and filter objects available in the business layer
  4. all of the above

Answer : all of the above

 
30
Data Security Allows to

  1. remap connections and tables
  2. set SQL control
  3. filter rows of data
  4. all of the above

Answer : all of the above