Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Choose the three valid features of Data Relationship Management (DRM).

A.

DRM generates financial restatements when charts of accounts change.

B.

DRM streamlines change management for dimensions and hierarchies.

C.

DRM provides immediate feedback to users about the constraints on hierarchies and data relationships.

D.

DRM has extract, translate, and load capabilities for hierarchy and fact data.

E.

DRM provides audit trail capabilities of data changes.

F.

DRM provides drill-through capabilities of data from upper-level nodes to lower level nodes.

Identity the three true statements about property categories assuming that you do not use node types.

A.

A System property category is automatically created out of the box.

B.

If enabled in the system preferences, the Oracle EPM property categories are created, out of thebox.

C.

If enabled in the system preferences, the Oracle EBS categories are created, out of the box.

D.

Property categories are unique to a version.

E.

Property categories are unique to a hierarchy.

F.

Node access groups are assigned to property categories.

G.

A property categories assigned to a user may be read or edit.

Select the four valid reasons why you would create a different version.

A.

To maintain monthly versions

B.

To maintain versions for major reorganization

C.

To apply security for different hierarchies

D.

To allow multiple people to simultaneously work on the same data

E.

For "What If" modeling for a hierarchy

F.

To create property categories that are specific to a version

G.

For historical comparisons

Which three types of mappings are managed via properties in DRM?

A.

One-to-one mapping

B.

Mapping nodes across versions

C.

Many-to-many mapping

D.

One-to-many mapping

E.

Validations for format of mapped nodes

What are the four valid functions available in the DRM Migration utility?

A.

Extract hierarchies and property values from one DRM version.

B.

Extract property definitions, property categories, validations, and queries from a DRM application to an XML file.

C.

Load hierarchies and property values to a DRM version.

D.

Load metadata from an XML file into a Data Relationship Management application.

E.

Compare metadata differences between two sources, such as a development DRM instance to a production DRM instance.

F.

Generate an HTML report from the results.

Identify the three true statements about External Connections.

A.

Defined connections for FTP or UNC file path representing a target or source for an import/export.

B.

They allow you to have multiple exports or books target the same network folder or database, sothat, if the folder changes, you can just update the External Connection, rather than all the individual exports.

C.

Only Administrators can configure or use External Connections.

D.

Passwords will display for connections.

E.

You must explicitly choose the allowed tables for external database connections; this preventsusers from exporting to the incorrect table.

Identify the three true statements.

A.

A version may contain multiple hierarchies.

B.

A version may contain a single hierarchy with shared nodes.

C.

A version may contain version-specific node types.

D.

A version may be assigned validations.

E.

A version may be assigned exports.

Identify two reasons to build validations using derived properties vs. validations using property queries?

A.

View the results of the validation logic as a property value.

B.

Validations do not support property queries for batch.

C.

Provides faster performance of validation process

D.

You can import the initial validation setting to the property.

E.

Formulas can be used to perform complex logic.

Which three statements are true about the stakeholders in a DRM implementation?

A.

Business users are initially brought into the project during the testing process.

B.

Source and target systems administrators have minimal involvement during the DRM implementation.

C.

The DRM administrator use both prebuilt and custom property definitions and property categories to create versions and hierarchies as dictated by requirements and design.

D.

The DRM administrator creates validations dictated by requirements and design.

E.

A data governance team defines overall standards for the DRM implementation.

Identify three ways to narrow the scope of the first phase of the DRM implementation.

A.

Design and build the DRM process for a single dimension.

B.

Design and build the DRM process for a single target and single source.

C.

Exclude workflow and automations from the DRM process.

D.

Exclude validations and verifications.

E.

Focus the design to a single version.