SAP BO ADMIN Beginner Quiz
1
which of the following is true about Object-level security?
- It applies across multiple universes
- Defined both in CMC and universe object definitions
- It has multiple levels
- All of the above
2
Query Control Restrictions that cannot be applied through Data Security profile are
- Limit size of resultset to
- Limit execution timeto
- Restrict rows to
- A&B
3
Table mappings in Data security profile can be used to set
- Row level security
- column level security
- Row and column level security
- None of the above
4
Which of the following is true about schedule access level?
- User can schedule report but cannot refresh in real time
- User cannot schedule report but can refresh in real time
- User can schedule report and also reprort in real time
- all of the above
5
Version Management System is used
- to manage version of reports
- used to shift to any version of report any time using this tool
- compare the metadata information of 2 versions of content
- all of the above
6
When you create a new folder, two sets of permissions are automatically assigned:
- Administrators are given the access level Full Control and Everyone is given the access level No Access.
- Administrators are given the access level Full Control and Everyone is given the access level view.
- Administrators are given the access level Full Control and Everyone is given the access level view on demand
- all of the above
7
Which of the following offers significant improvement over import wizard
- IDT
- Rich Client
- LCM
- None of the above
8
Monitoring database uses
- Oracle
- MSSqlserver
- Java Derby
- any of the above
9
which of the following is not true
- Real-time monitoring is provided via the CMC.
- There are a number of prebuilt dashboards to show current server utilization, processes, and sessions. System administrators can specify alerts to be sent when certain situations occur.
- SAP Business objects has only apporach for monitoring which Real-Time
- all of the above
10
Version Management System is used
- To create a copy of the selected version in VMS Repository
- to lock the report, or Unlock to unlock the report
- to delete all versioned content from the VMS repository
- all of the above
11
which one of the following is not true about history options in VMS
- Compare – this option enables you to compare the metadata information of two versions of content.
- Export Copy of Version – this option enables you to obtain a copy of the selected version and save it to your local system.
- Get Copy of Version – This option enables you to obtain a copy of the selected version
- Get Version – If there are multiple versions, and if you donot require a particular version of the BI resource, then you can select the required report and click Get Version
12
which one of the following is not true
- VMS and CMS are same
- VMS and CMS are different
- Version of report in VMS and CMS can be different
- Both VMS and CMS have versions
13
When a user belongs to more than one group or when you combine multiple restrictions into one set, it’s helpful to see what the net impact is:how the restrictions will be combined. This option is provided through
- Security editor
- Object Level Security
- CMC
- all of the above
14
what happens when inheritance from multiple groups overlap: Not Specified
- Denied
- Grant
- Grant or denied
- all of the above
15
With the permission of No Access, members of the group Everyone
- will not even see that the folder exists
- can see folder but cannot open reports in folder
- can see folder but cannot modify reports in folder
- all of the above
16
which of the following is true about Access Levels
- Schedule access level can shedule report and refresh report in real time
- View access level can see folder and report but not universe
- view on demand access level can refresh report in real time
- all of the above
17
If your company does not have a centralized system for assigning user IDs and passwords
- You can use External Authentication with windows AD
- you can use the built-in security within SAP BusinessObjects, referred to as Enterprise authentication
- You can use LDAP for authentication
- all of the above
18
Which of the tasks are involved in migrating content:
- Create a job that specifies the source and destination.
- Select the repository content that you wish to migrate, such as universes and reports.
- Identify and select dependent objects and execute the job
- all of the above
19
which of the following is true about CMC
- It is webbased application
- allows for control of users
- allows for control of repository Objects
- all of the above
20
what happens when inheritance from multiple groups overlap :Grant + Deny + Not Specified
- Deny
- Grant
- Not Specified
- all of the above
21
Which of the following is not true about BIAR file
- doesnot allow to move content from one environment to another
- It is a type of zip or archive file
- It contains XML files for documents, universes, and other repository content
- all of the above
22
When you use object-level security, if a user does not have access to the object which of the following is true:
- When a user creates a new query, the user sees the object in the universe.
- When a user tries to refresh a query that contains the private object, the user receives an error message.
- When a user accesses a report that contains the private object, the user does not see the object in the report,
- all of the above
23
what happens when inheritance from multiple groups overlap: Grant + Not Specified
- Deny
- Grant
- Not Specified
- all of the above
24
what happens when inheritance from multiple groups overlap: Not Specified
- Deny
- Grant
- Not Specified
- all of the above
25
Import wizard is now called as
- Central Configuration Manager import wizard
- Life Cycle Manager
- Migration Wizard
- all of the above
26
When working with a repository, the IDT allows universe development and maintenance to be distributed across several designers through a
- IBM clear Case tool
- locking mechanism
- Microsoft Virsual sourceSafe
- all of the above
27
Which of the following is not true about auditing
- Historical usage information can be captured to a log file
- Historical usage information can be captured to a relational database
- Auditing information is Real time
- all of the above
28
For the group everyone the default access to all universes and universe connections is
- View
- Schedule
- Full Control
- all of the above
29
Business Security Profile allows to
- grant access to business layer views
- deny access to business layer views
- individual dimensions, measures, and filter objects available in the business layer
- all of the above
30
Data Security Allows to
- remap connections and tables
- set SQL control
- filter rows of data
- all of the above