Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Oracle 1Z0-206 Exam -

Free 1Z0-206 Sample Questions:

Which three statements are true about Grants in Oracle Applications? (Choose three.)
A. Grants that deal with business objects are part of Data Security.
B. Grants define the access given to users through responsibilities.
C. Grants that deal with business objects are part of Function Security.
D. Grant is defined as an approval to perform an operation on an object.
E. Grants that deal with a set of an application's functionality are part of Data Security.
F. Grants that deal with a set of an application's functionality are part of FunctionSecurity
Answer: A,D,F
Explanation: A grant authorizes a particular role to perform a specified action or actions (set of functions) on a specified object instance (or object instance set).
Note that where you are creating a data security policy for an object by creating a grant, you need to include that object in your grant definition. Other than in this specific type of case, you do not need to specify an object in your definition.
Reference: Oracle E-Business Suite System Administrator's Guide - Security Oracle Application Object Library Security

Which three statements are true about the background Workflow Engines that are set up as a required component while setting up Oracle Workflow? (Choose three.)
A. It handles stuck processes.
B. It handles deferred activities.
C. It handles timed outnotifications.
D. It cleans up the WF_CONTROLqueue.
E. Ithandles listeners forlocal outbound agents.
Answer: A,B,C
Explanation: A:Abackground engine must be set up to handle stuck processes. A process is identified as stuck when it has a status of ACTIVE, but cannot progress any further.
B: When the Workflow Engine initiates and performs a process, it completes all necessary activities before continuing to the next eligible activity. In some cases, an activity can require a large amount of processing resource or time to complete. Oracle Workflow lets you manage the load on the Workflow Engine by setting up supplemental engines to run these costly activities as background tasks. In these cases, the costly activity is deferred by the Workflow Engine and run later by a background engine. The main Workflow Engine can then continue to the next available activity, which may occur on some other parallel branch of the process. A workflow process can also include a Wait activity, which defers the continuation of a process until a later time. This type of deferred activity is also completed by a background engine.
C:A background engine must also be set up to handle timed out notification activities.
Reference: Setting Up Background Workflow Engines

Which three statements are true about the Delegated Administration in R12 Oracle Applications? (Choose three.)
A. It helps to separate Navigation menus and security functions.
B. It differs from Role Based Access Control (RBAC) system on the privilege model.
C. It determines the users, roles, and information that local administrators can manage.
D. It provides organizations with the ability to assign the required access rights forgroupsand user accounts.
E. It could be used to assign selected administrative tasks to local administrators after therolesand role inheritance have been configured.
Answer: C,D,E
Explanation: Delegated administration is an important feature of the Oracle Identity Management infrastructure. It enables you to store all data for users, groups, and services in a central directory, while distributing the administration of that data to various administrators and end users. It does this in a way that respects the various security requirements in your environment.
Oracle Delegated Administration Services is a set of pre-defined, Web-based units for performing directory operations on behalf of a user. It frees directory administrators from the more routine directory management tasks by enabling them to delegate specific functions to other
administrators and to end users. It provides most of the functionality that directory enabled applications require, such as creating a user entry, creating a group entry, searching for entries, and changing user passwords.
Reference: Oracle Identity Management Guide to Delegated Administration Oracle Delegated Administration Services

One of the integration architects is attempting to standardize the path locations for inbound and outbound feeds for the applications.
Currently they are providing the full path name of the file on the file system when they submit the request to load the feeds. They would like to soft code the path of the file name by server to shorten the parameter entry and retime key errors when submitting the interfaces.
Currently all of the feeds, both inbound and outbound, are being kept in a single directory. They would like to separate the files into directories by application, and have a separate inbound outbound feed directory.
This is a global implementation with middle-tier services strategically placed around the world.
North American services are all from the data center in New York. The European services are being provided from the European data center in England, and the Asia-Pacific services are hosted in a data center in India.
The architect's plan is to create two profile options: one for inbound path and one for outbound path. All the utl_file directories used by the integration programs would be standardized for use.
His plan is to set them at the application and server level to soft code the directory path for all of the integration points.
He would also like to provide users with the ability to change the path for their user, or for a development-centric responsibility only to support individual testing efforts on non-production servers.
He would also prefer to prevent anyone from setting the value of the profile option at the operating unit level. Indentify the flaw in the architect’s proposed solution.
A. Interfaces do not run under a specific responsibility.
B. Profile options cannot be controlled by the operating unit.
C. A profile option can only be assigned to one hierarchy type.
D. The value of the profile option cannot be controlled by the server.
E. The interfaceswould not be able to read the value of the profile option at the server level
Answer: C
Explanation: Note:
A profile option can be set at one or more levels, depending on its hierarchy type. Most profile options use the Security hierarchy type, meaning that they can potentially be set at the four levels:
Site (lowest level) , Application, Responsibility, and User (highest level).
Hierarchy types enable system administrators to group and set profile options according to their business needs or the needs of the installation.
There are several hierarchy types: Security, Organization, Server, and Server+Responsibility.
Reference: Oracle E-Business Suite System Administrator's Guide – Maintenance:
Reference: User Profiles

Which two steps are included in the procedure for defining a value set? (Choose two.)
A. defining a list of values if appropriate
B. using existing value sets when possible
C. defining flexfield segments and structures
D. defining security and cross-validation rules
Answer: A,C
Explanation: Before defining your values and value sets, perform the following prerequisite steps:
* Plan your flexfield structures and segments.
* Thoroughly plan your values and value sets.
Note: Oracle Application Object Library uses values, value sets and validation tables as important components of key flexfields, descriptive flexfields, and Standard Request Submission.
When you first define your flexfields, you choose how many segments you want to use and what order you want them to appear. You also choose how you want to validate each of your segments.
The decisions you make affect how you define your value sets and your values.
You define your value sets first, either before or while you define your flexfield segment structures.
You typically define your individual values only after your flexfield has been completely defined (and frozen and compiled). (C) Depending on what type of value set you use, you may not need to predefine individual values at all before you can use your flexfield.
You can share value sets among segments in different flexfields, segments in different structures of the same flexfield, and even segments within the same flexfield structure. You can share value sets across key and descriptive flexfields. You can also use value sets for report parameters for your reports that use the Standard Request Submission feature.
Reference:Oracle E-Business Suite Flexfields Guide, Values and Value Sets

Your company is using Oracle Application Manager (OAM).
Your manager asked you to set up an alert, which should trigger whenever "Forms Runaway Processes" on the system.
Which are the three thresholds that you need to configure, so that whenever a form session exceeds these thresholds, the system would post an alert? (Choose three.)
A. maximum duration
B. maximumCPU percent
C. maximum memory size
D. maximum number of users
E. maximum number of transactions
F. maximum number of form sessions
Answer: A,B,C
Explanation: Forms Runaway Processes
Navigation: Site Map > Monitoring (subtab) > Current Activity (heading) > Forms Runaway
Processes (link) Overview
Running Oracle E-Business Suite requires the creation of many system-level processes. On occasion, processes can behave incorrectly and have a negative impact on system performance.
In Oracle Applications Manager, you can configure thresholds (maximum memory size (c), maximum CPU percent (B), maximum duration in minutes (A)) for tracking runaway processes.
These settings take immediate effect as soon as you click Apply. These settings are used to raise system alerts on the Applications Dashboard.
Reference: Oracle E-Business Suite System Administrator's Guide – Maintenance,Monitoring Oracle E-Business Suite

The Receivable Super User responsibility is based on the Receivable Super menu. A custom function "Receivables Summary" is added to the Receivable Super menu.
Assume that if the user is in the Receivable Super User responsibility, the user has to that possibility to Receivable Super User. When is the function available to the user?
A. Immediatelyafterthe systemcache is refreshed
B. Immediatelyafter savingthe function in the menu window
C. Immediately afterenteringthe function row in the menu window
D. Immediately afterthe successfulcompletion of the compilesecurity program
Answer: D
Explanation: The security program must compile successfully.

Identify the profile options belonging to the Flexfields, profile category that controls the behavior of Flexfield processing. (Choose all that apply.)
A. Activate
B. Autoskip
C. PositiveFormat
D. ShorthandEntry
E. Validate on Server
F. LOV WarningLimit
Answer: D,E
Explanation: D: Shorthand Flexfield Entry is enabled and the Flexfields:Shorthand Entry profile option is set to an appropriate value, the shorthand window allows you to enter an alias before the flexfield window opens. The combination or partial combination you defined for your alias is entered into your flexfield window.
E: If you are using flexfields server-side validation, you cannot use form field references (:block.field). You must either remove your field references or turn off flexfields server-side validation using the profile option Flexfields:Validate on Server.
Reference: Oracle E-Business Suite Flexfields Guide

© 2014, All Rights Reserved