Object Security controls access to Subject Areas, Tables, and Columns in OBIEE and can be implemented by using which method? A. Single Sign-On (SSO) B. Database Authentication C. Business Logic Object Security D. External Table Authentication E. LDAP Authentication

An integrated BI tools business case can be built around which three options? A. Scalability B. Fault tolerance C. Cost Savings D. Development efficiency

Use of the Enterprise Install option is recommended for which three options? A. Multiple instances on a single computer B. Scale out for High Availability and Failover C. Support for high security requirements D. Evaluation of end user functionality E.…

Selecting the Manage Map Data link allows one to do which three of the following? A. Associate map layers to columns defined in the OBIEE metadata B. Create a new map layer C. Set the zoom level of an imported…

Permissions for Presentation layer objects and Business layer objects that restrict users is configured in which software component? A. Oracle Enterprise Manager B. Oracle HTTP Server C. WebLogic Server Administration Component D. BI Administration Tool