|
Question 1.
In the HFM Business rules, the List function can be used to get the elements specified in lists that are defined _____. (Choose three.)
A. as a system list using the [Generation1] function
B. as a system list using the [Base] function
C. in the .lst file as a dynamic list
D. as a system list using the [Level0] function
E. in the .lst file as a fixed list
Answer: B, C, E
Question 2.
Using Hyperion Reports, the Relative Member function performs which arithmetic function?
A. subtraction
B. offsets
C. division
D. addition
Answer: B
Question 3.
In order for a user to log into HFM and navigate to Hyperion Reports or Hyperion Analyzer without also logging into those products, which statement is true?
A. The Microsoft Active Directory must be configured for native mode.
B. User Authentication on the browser must support automatic logon with username and
password.
C. This is only possible using LDAP authentication.
D. HFM, Hyperion Reports, and Hyperion Analyzer must all use the same CSS file.
Answer: D
Question 4.
In a Web Data Entry Form script, what is the proper syntax for calling an Account list named Income Statement?
A. A#.IncomeStatement
B. A#IncomeStatement
C. A{IncomeStatement}
D. A[IncomeStatement]
E. A#{IncomeStatement}
Answer: C
Question 5.
When writing cash flow rules in HFM, what type of account is calculated by subtracting the opening balance from the current balance yielding a source of funds?
A. Balance
B. Liability
C. Flow
D. Asset
E. Expense
Answer: B
Question 6.
You are entering currency rates in the Web Data Explorer Grid.
Which two member selections are correct? (Choose two.)
A. Custom 1 - [Base]
B. Entity - [None]
C. Custom 3 - [Currencies]
D. Value - [None]
Answer: B, D
Question 7.
Which two are valid options for an Intercompany Partner Matching Report? (Choose two.)
A. SuppressDescriptions
B. SupressTotal
C. SuppressIfMatch
D. SuppressReversedTransactions
Answer: C, D
Question 8.
Which two User Roles will allow a user to load data from the Excel add-in? (Choose two.)
A. Submitter
B. Load System
C. Administrator
D. Load Excel Data
E. Security Administrator
Answer: C, D
Question 9.
Is Calculated flag can be enabled for which two dimensions? (Choose two.)
A. Scenario
B. Value
C. Entity
D. Account
E. Custom (1..4)
Answer: D, E
Question 10.
What are two types of member lists? (Choose two.)
A. optional
B. end-user
C. system
D. dynamic
Answer: C, D
Question 11.
What are three valid process management states? (Choose three.)
A. First Pass
B. Final
C. Not Supported
D. Second Pass
E. Not Started
Answer: A, C, E
Question 12.
What is the result of the Round and Truncate function in the following example?
Column A
Account Data Round([A],-3) Truncate([A],-3)
Sales 2,560
1. 2,500 2,500
2. 3,000 2,000
3. 2,000 3,000
4. 3,000 3,000
A. 3
B. 4
C. 2
D. 1
Answer: C
Question 13.
A user needs to create an integration that will allow a master application to overwrite a sub application's values, but not the reverse. How is this accomplished?
A. Define the source application as master.
B. Choose the override check box in the integration definition.
C. Mark the source application as read only.
D. Define the destination application as slave to the source application.
Answer: B
Question 14.
Using Hyperion Reports, the Relative Member function can be used with which dimension?
A. Period
B. Entity
C. Accounts
D. Scenario
Answer: A
Question 15.
A balance sheet account is translated using the TransPeriodic function. What will be the February result of a translation?
January Feburary
Exchange rate 0.1 0.2
Local Currency account balance 1000 2000
Translated account balance 100 _____
A. 200
B. 100
C. 400
D. 300
Answer: D
|
Question 1. What are the results of the command: fw sam [Target IP Address]? A. Connections to the specified target are blocked without the need to change the Security Policy B. Connections to and from the specified target are blocked without the need to change the Security Policy C. The Security Policy is compiled and installed on the target's embedded VPN/FireWall Modules D. Connections from the specified target are blocked without the need to change the Security Policy Answer: B Question 2. The command fw fetch causes the: A. Security Gateway to retrieve the user database information from the tables on theSmartCenter Server. B. SmartCenter Server to retrieve the debug logs of the target Security Gateway C. Security Gateway to retrieve the compiled policy and inspect code from theSmartCenter Server and install it to the kernel. D. SmartCenter Server to retrieve the IP addresses of the target Security Gateway Answer: C Question 3. Which of the following deployment scenarios CANNOT be managed by Check Point QoS? A. Two lines connected directly to the Gateway through a hub B. Two lines connected to separate routers, and each router is connected to separate interfaces on the Gateway C. One LAN line and one DMZ line connected to separate Gateway interfaces D. Two lines connected to a single router, and the router is connected directly to the Gateway Answer: D Question 4. Your company's Security Policy forces users to authenticate to the Gateway explicitly, before they can use any services. The Gateway does not allow Telnet service to itself from any location. How would you set up the authentication method? With a: A. Session Authentication rule B. Client Authentication rule using the manual sign-on method, using HTTP on port 900 C. Client Authentication for fully automatic sign on D. Client Authentication rule, using partially automatic sign on Answer: B Question 5. You must set up SIP with a proxy for your network. IP phones are in the 172.16.100.0 network. The Registrar and Proxy are installed on the host, 172.16.101.100. To allow handover enforcement for outbound calls from SIP-net to the Internet, you have defined the following objects: Network object: SIP-net: 172.16.100.0/24 SIP-gateway: 172.16.101.100 VoIP Domain object: VoIP_domain_A End-point domain: SIP-net VoIP gateway installed at: SIP-gateway host object How would you configure the rule? A. VoIP_domain_A / any / sip_any / accept B. VoIP_Gateway_A / any / sip / accept C. Unsupported because the SIP Registrar and the SIP Proxy are installed on the same host. Separate and create two VoIP Domain objects. D. SIP-net & SIP-gateway / any / sip / accept Answer: A Question 6. A _______ rule is used to prevent all traffic going to the VPN-1 NGX Security Gateway A. Stealth B. Cleanup C. SmartDefense D. Reject Answer: A Question 7. An advantage of using central vs local licensing is: A. Only one IP address is used for all licenses. B. Licenses are automatically attached to their respective Security Gateways. C. The license must be renewed when changing the IP address of a Security Gateway. D. A license can be taken from oneSmartCenter Server and given to SmartCenter Server. Answer: A Question 8. Which command allows verification of the Security Policy name and install date on a Security Gateway? A. fw ver -p B. fw show policy C. fw stat -l D. fw ctl pstat -policy Answer: C Question 9. What command displays the version of an already installed Security Gateway? A. cpstat -gw B. fw printver C. fw ver D. fw stat Answer: C Question 10. When configuring objects in SmartMap, it is helpful to ____________ the objects so that they are properly defined for use in a policy rule. A. Save B. Actualize C. Physically connect to D. Expand Answer: B
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.