Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "4H0-028" Exam

Passed 11-01-2008-Score 986-Check attached dumps

 

A Hyperion Business Rule (HBR) is being created to calculate benefit expense by Entity based on total salaries, which have been calculated for individual employees. Total Entity benefits need to be displayed when the calculation is complete.

What is the correct sequence order of the components within HBR?

A. custom calculation, aggregate benefits, aggregate salaries
B. custom calculations, aggregate salaries, aggregate benefits
C. aggregate salaries, custom calculation, aggregate benefits
D. aggregate benefits, aggregate salaries, custom calculations

Answer: C

Question 2.
Which Financial Reporting features are specific to using the Planning Details ADM driver? (CHOOSE THREE)

A. Planning Unit Annotations
B. Meta Data Security
C. Row and Column Templates
D. Supporting Details
E. Account Annotations

Answer: A, B, D

Question 3.
The budget process is now closed. The application contains a User Group that all users are included in. They want to change access on the budget Scenario from write to read only for all budget users.

What is the correct way to change access?

A. modify the NT User Group access to read only
B. update the User Group Web Forms access to read only
C. edit the User Group Access on the budget Scenario to Read
D. change the Group Security Filters to read only in Essbase Application Manager

Answer: C

Question 4.
Which three choices describe the functionality of time periods that apply to Scenarios? (CHOOSE THREE)

A. Modify the start and end year
B. Add years to the application
C. Specify to use Beginning Balance for a time period
D. Years and periods outside of the range are read-only on Web forms

Answer: A, C, D

Question 5.
If you choose the Use Calculator Cache option in the Aggregate Data component, what two statements are true? (CHOOSE TWO)

A. The CALCCACHE setting must be included in the Essbase.cfg file.
B. It can significantly improve calculation performance.
C. It only improves calculation performance on two pass calculations.
D. In the Analytic Services setting, the CALCCACHE setting must be selected.

Answer: A, B

Question 6.
What option contributes to making an Enhanced Calc Script more flexible over a native Calc Script?

A. Can be run from the Planning web
B. @CALCMODE function
C. Run-time prompts
D. Run on save

Answer: C

Question 7.
When refreshing the database in a multi-currency application, what can be selected to create a Currency Conversion Calc Script?

A. Currency, Scenario, Version Type, and Version
B. Currency, Scenario, Year, Exchange Rate Type, and Version
C. Currency, Scenario, Year, Version Type, and Version
D. Currency, Scenario, Year, and Exchange Rate Type

Answer: A

Question 8.
Which two are valid steps to help identify the relational databases associated with Hyperion Planning applications? (CHOOSE TWO)

A. View the Hsp Js Home. properties file.
B. View the HSX_DATASOURCES table in the repository.
C. View the Connection tab in the relevant UDL files.
D. Within the Planning Desktop, view Application Creator Security Group.

Answer: A, C

Question 9.
What are three valid variables to consider about Hyperion Planning application Web performance? (CHOOSE THREE)

A. Network bandwidth
B. Number of users that exist within the application
C. Server hardware specifications
D. Design of existing web forms

Answer: A, C, D

Question 10.
In an application outline, Product is a custom dimension, Accounts is dense, and the summary time periods (Quarters and Year Total) on the Time Periods dimension are set to Dynamic Calc.

How can an administrator accurately build a calculation for Gross Margin % by product for all Time Periods?

A. Use a Hyperion Business Rule (HBR)
B. Use Hyperion Analytic Services MaxL
C. Use an Analytic Services calc script
D. Use a member formula with dynamic calc storage

Answer: D

Question 11.
Which step is necessary prior to loading attribute values using Hyperion Application Link?

A. collapse the dimension in the Hyperion Planning Dimension Editor
B. add the attribute dimension in Analytic Administration Services
C. assign the attribute to a dimension in the Hyperion Planning Dimension Editor
D. refresh the database

Answer: C

Question 12.
Which two statements are true about assigning members to plan types? (CHOOSE TWO)

A. If you have more than one plan type in an application, you cannot assign more than one plan
type to an individual dimension member.
B. If the plan type is not assigned to a member, that member's children will not have access to
that plan type or its aggregation options.
C. If you use a User-defined custom dimension, you can specify the source plan type for the
members.
D. If User-defined custom dimension has been assigned to a plan type in the application, you
cannot assign which members are valid in that plan type.

Answer: B, D

Question 13.
Which Hyperion Application Link Adapter can be used for loading data values?

A. Hyperion Analytic Services Adapter
B. Hyperion Planning Adapter
C. Hyperion Business Rules Adapter
D. Hyperion Smart View for Office Adapter

Answer: A

Question 14.
Supporting Detail can have which two properties? (CHOOSE TWO)

A. Data can be in hierarchical form and include aggregation of values.
B. It can only be text information, no data can be input.
C. Data can be filled across a series of columns.
D. Detail cannot be deleted once created.
E. Detail can be retrieved in the Spreadsheet Add-in.

Answer: A, C

Question 15.
What is necessary prior to loading shared members using Hyperion Application Link?

A. Refresh the database
B. Load the base member
C. Expand the dimension in the Hyperion Planning Desktop
D. Create the shared member's parent members in Analytic Administration Services

Answer: B

Question 16.
Which two statements about account level annotations are true? (CHOOSE TWO)

A. Account level annotations can have 1500 characters.
B. A specific option must be selected in the display options page to enable the account level
annotations.
C. To enable the account level annotations, the Web form design does not matter.
D. Only parent level members can have account level annotations.

Answer: A, B

Question 17.
Which three Data Types are valid for the Account dimension? (CHOOSE THREE)

A. Non-Currency
B. Currency
C. Statistical
D. Percentage
E. Average

Answer: A, B, D

Question 18.
Which three statements about Shared Members are correct? (CHOOSE THREE)

A. Access cannot be assigned to a shared member.
B. Shared Members are only available for the Entity Dimension.
C. There is no limit to the number of shared members you can create for the base member.
D. Shared Members cannot be moved to a new parent.
E. Custom Attributes and Member Formulas are not allowed for Shared Members.

Answer: C, D, E

Question 19.
Which three statements differentiate the Currencies dimension from the HSP_Rates dimension? (CHOOSE THREE)

A. Currency is displayed in the Available Currencies Link on the Enter Data page on the Web.
B. Currency includes reporting currencies.
C. Currency includes non-reporting currencies.
D. Currency stores foreign currency exchange rates.

Answer: A, B, C

Question 20.
What are two best practices for using Hyperion Planning User Groups? (CHOOSE TWO)

A. Assigning access to Web Forms
B. Assigning access to Hyperion Business Rules (HBR)
C. Assigning access to Financial Reporting
D. Assigning access to Dimension Members

Answer: A, D

Question 21.
When opening a Web form, a Web user experiences very slow retrieval time. What three steps could you take to improve the retrieval time? (CHOOSE THREE)

A. Reduce the number of rows and columns displayed on the Web form
B. Upgrade the client machine's operating system, processing speed, and RAM
C. Reduce the text used for instructions that is contained on the Properties tab of the Web form
D. Reduce the number of page dimensions used on the Web form
E. When creating the Web form, remove the option to "Display: Alias"

Answer: A, B, D

Question 22.
What differentiates a User-defined custom dimension from the Entity and Account dimensions?

A. You assign valid plan types at the dimension level.
B. You can only add custom attributes to a User-defined custom dimension.
C. You have the ability to set up a two-pass calculation on a User-defined custom dimension.
D. You assign valid plan types to the members of a User-defined custom dimension.
E. You assign data types at the dimension level.

Answer: A

Question 23.
Which four options are supported authentication providers for CSS? (CHOOSE FOUR)

A. NTLM
B. Sun Open Net Environment (Sun ONE)
C. BEA's LDAP Provider
D. Microsoft Active Directory
E. Novell NDS
F. eTrust SiteMinder

Answer: A, B, D, F

Question 24.
Which four recommendations are valid suggestions to help increase performance for the Hyperion Planning Web application? (CHOOSE FOUR)

A. Increase the heap size allocated to the Java VM
B. Increase the CPU processing speed on the Web application server
C. Decrease the JDBC connection pooling parameters in the HspJSHome.properties file
D. Increase the amount of physical RAM on the Java application server
E. Decrease the size of the existing Web forms

Answer: A, B, D, E

Question 25.
When should you use multiple plan types?

A. When detailed revenue information must be separate from high-level P and L
summary accounts
B. When multiple currencies must be kept in a separate database
C. When data cannot be shared across an organization
D. When exchange rates must be kept in a separate database

Answer: A

Question 26.
In multi-currency applications, after running a Refresh from the Planning Desktop, where
are the foreign currency exchange rates stored in the Analytic Services database?

A. "Entity" --> "1st Draft" --> "USD" --> "Product" --> "HSP_Average" -->"HSP_Rate_USD"
B. "Entities" --> "Version" --> "Currency" --> "Product" --> "HSP_Average" -->"HSP_Rate_USD"
C. "8110" --> "Version" --> "Currency" --> "Product" --> "HSP_Average" -->"HSP_Rate_USD"
D. "Entity" --> "1st Draft" --> "USD" --> "Product" --> "HSP_Average" -->"HSP_InputValue"

Answer: B

Question 27.
In a multi-currency application using a Target Version, what calculation options should be used with the Aggregate Data component?

A. Aggregate Data up to Local Currency, Optimize the Calculation of Formulas on Sparse
Dimensions, and Use Calculator Cache
B. Aggregate Missing Values, Optimize the Calculation of Formulas on Sparse Dimensions, and
Use Calculator Cache
C. Aggregate Missing Values, Aggregate Data up to Local Currency, and Optimize the
Calculation of Formulas on Sparse Dimensions
D. Aggregate Data up to Local Currency, Aggregate Missing Values, and Use Calculator Cache

Answer: A

Question 28.
What determines the items a planner user can see in a form?

A. Member access
B. Form Read access
C. Web application access
D. Form Write access
E. User Type

Answer: A

Question 29.
What must be done prior to using the Create Blocks action in a Hyperion Business Rule (HBR)?

A. Analytic Services configuration file (essbase.cfg) must have the Create Blocks option turned
on.
B. Analytic Services Information must be validated for the potential number of blocks.
C. Data must be loaded to the blocks prior to running the Hyperion Business Rule.
D. Analytic Services database settings Create Blocks on Equation must be selected.

Answer: D

Question 30.
Refreshing Security from the Hyperion Desktop initially updates user information where?

A. Analytic Services security
B. Microsoft Windows security
C. Relational database security
D. Web application security

Answer: A

Question 31.
What functionality is available using an alternate hierarchy that is not available using a Custom Attributes dimension?

A. Hyperion Application Link can only load alternate hierarchy members.
B. Security can only be assigned to alternate hierarchy members.
C. Calculations can only reference Custom Attributes dimension members.
D. Financial Reporting can only reference an alternate hierarchy.

Answer: B

Question 32.
What are two reasons for creating or re-creating a Currency Conversion calc script? (CHOOSE TWO)

A. Another year has been added to the application.
B. A foreign currency exchange rate value was modified.
C. A new entity member was added to the application.
D. A currency is no longer a reporting currency.
E. Data in the Analytic Services database were modified.

Answer: A, D

Question 33.
Which two statements are true when working with multiple alias tables on the Web? (CHOOSE TWO)

A. Aliases are displayed on Form Preview.
B. Whether alias names can be displayed on a form is based on how the form is designed.
C. Web users need to set the alias table to use in their user preferences.
D. The alias table setting is reset to the default table between user sessions.

Answer: B, C
 



Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for 312-50 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "312-50" Exam

Ethical Hacker Certified

 Question 1.
What is the essential difference between an 'Ethical Hacker' and a 'Cracker'?

A. The ethical hacker does not use the same techniques or skills as a cracker.
B. The ethical hacker does it strictly for financial motives unlike a cracker.
C. The ethical hacker has authorization from the owner of the target.
D. The ethical hacker is just a cracker who is getting paid.

Answer: C

Explanation: 
The ethical hacker uses the same techniques and skills as a cracker and the motive is to find the security breaches before a cracker does. There is nothing that says that a cracker does not get paid for the work he does, a ethical hacker has the owners authorization and will get paid even if he does not succeed to penetrate the target.

Question 2.
What does the term "Ethical Hacking" mean?

A. Someone who is hacking for ethical reasons.
B. Someone who is using his/her skills for ethical reasons.
C. Someone who is using his/her skills for defensive purposes.
D. Someone who is using his/her skills for offensive purposes.

Answer: C

Explanation: 
Ethical hacking is only about defending your self or your employer against malicious persons by using the same techniques and skills.

Question 3.
Who is an Ethical Hacker?

A. A person whohacksfor ethical reasons
B. A person whohacksfor an ethical cause
C. A person whohacksfor defensive purposes
D. A person whohacksfor offensive purposes

Answer: C

Explanation: 
The Ethical hacker is a security professional who applies his hacking skills for defensive purposes.

Question 4.
What is "Hacktivism"?

A. Hacking for a cause
B. Hacking ruthlessly
C. An association which groups activists
D. None of the above

Answer: A

Explanation: 
The term was coined by author/critic Jason Logan Bill Sack in an article about media artist Shu Lea Cheang. Acts of hacktivism are carried out in the belief that proper use of code will have leveraged effects similar to regular activism or civil disobedience.

Question 5.
Where should a security tester be looking for information that could be used by an attacker against an organization? (Select all that apply)

A. CHAT rooms
B. WHOIS database
C. News groups
D. Web sites
E. Search engines
F. Organization's own web site

Answer: A, B, C, D, E, F

Explanation: 
A Security tester should search for information everywhere that he/she can access. You never know where you find that small piece of information that could penetrate a strong defense.

Question 6.
What are the two basic types of attacks?(Choose two.

A. DoS
B. Passive
C. Sniffing
D. Active
E. Cracking

Answer: B, D

Explanation: 
Passive and active attacks are the two basic types of attacks.

Question 7:
You are footprinting Acme.com to gather competitive intelligence. You visit the acme.com websire for contact information and telephone number numbers but do  not find it listed there. You know that they had the entire staff directory listed ontheir website 12 months ago but now it is not there. 

How would it be possible for you to retrieve information from the website that is outdated?

A. Visit google search engine and view the cached copy.
B. Visit Archive.org site to retrieve the Internet archive of the acme website.
C. Crawl the entire website and store them into your computer.
D. Visit the company's partners and customers website for this information.

Answer: B

Explanation: 
The Internet Archive (IA) is a non-profit organization dedicated to maintaining an archive of Web and multimedia resources. Located at the Presidio in San Francisco, California, this archive  includes "snapshots of the World Wide Web" (archived copies of pages, taken at various points in time), software, movies, books, and audio recordings (including recordings of live concerts from bands that allow it). This site is found at  www.archive.org.

Question 8.
User which Federal Statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?

A. 18 U.S.C 1029 Possession of Access Devices
B. 18 U.S.C 1030 Fraud and related activity in connection with computers
C. 18 U.S.C 1343 Fraud by wire, radio or television
D. 18 U.S.C 1361 Injury to Government Property
E. 18 U.S.C 1362 Government communication systems
F. 18 U.S.C 1831 Economic Espionage Act
G. 18 U.S.C 1832 Trade Secrets Act

Answer: B

Explanation:
http://www.law.cornell.edu/uscode/html/uscode18/usc_sec_18_00001030----000-.html

Question 9.
Which of the following activities will NOT be considered as passive footprinting?

A. Go through the rubbish to find out any information that might have been discarded.
B. Search on financial site such as Yahoo Financial to identify assets.
C. Scan the range of IP address found in the target DNS database.
D. Perform multiples queries using a search engine.

Answer: C

Explanation:
Passive footprinting is a method in which the attacker never makes contact with the target systems. Scanning the range of IP addresses found in the target DNS is considered making contact to the systems behind the IP addresses that is targeted by the scan.

Question 10.
Which one of the following is defined as the process of distributing incorrect Internet Protocol (IP) addresses/names with the intent of diverting traffic?

A. Network aliasing
B. Domain Name Server (DNS) poisoning
C. Reverse Address Resolution Protocol (ARP)
D. Port scanning

Answer: B

Explanation:
This reference is close to the one listed DNS poisoning is the correct answer. This is how DNS DOS attack can occur. If the actual DNS records are unattainable to the attacker for him to alter in this fashion, which they should be, the attacker can insert this data into the cache of there server instead of replacing the actual records, which is referred to as cache poisoning.


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.