Wednesday 13 February 2013

OBIEE11g Security Interview Questions Part1



1) In Oracle Business Intelligence a 32-character hexadecimal string that is system-generated to form a unique identifier for an object. Is used to refer to individual users and groups.  This unique identifier is known as a:
Ans) Globally Unique Identifier (GUID)
Note: A GUID is typically a 32-character hexadecimal string that is system-generated to form a unique identifier for an object. In Oracle Business Intelligence a GUID is used to refer to individual users and groups. 
 
2) Groups are organized hierarchically, and inherit privileges from parent groups. In other words, the BI Administrators group automatically inherits privileges from the BI Authors and BI Consumers groups. Oracle recommends that you do not change this hierarchy.

3) Oracle does not recommend using Web Logic Embedded LDAP Server in an environment with more than __1000___ users.
      To authenticate proxy users, which two session variables must be created?
  • PROXY — Use this variable to store the name of the proxy user.
Use the initialization block named Proxy Block and includes code such as the following:
Select targetIdfrom Proxies where ‘VALUEOF (NQ_SESSION.RUNAS)'=targetId and ': USER’=proxy ID
  • PROXYLEVEL — Use this optional variable to store the proxy level, either Restricted or Full. If you do not create the PROXYLEVEL variable, then the restricted level is assumed.
4) Use the initialization block named Proxy Level and includes code such as the following:
Select proxyLevel from Proxies where 'VALUEOF(NQ_SESSION.RUNAS)'=targetId and ':USER'=proxyId
Impersonation is a feature used by Oracle Business Intelligence components to establish a session on behalf of a user without employing the user's password



5) The default security groups in OBIEE 11g are named:
a) BIConsumers
b) BIAuthors
c) BI Administrators

6) During installation an Oracle Web Logic Server domain is created and Oracle Business Intelligence is installed into that domain. The domain is named _________ (in Simple or Enterprise installations), and is found under the Web Logic Domain folder in the Fusion Middleware Control navigation pane.
               Ans) bifoundation_domain

6) A placeholder for an Application Role definition can be created in the Administration Tool to facilitate offline repository development. But this is just a placeholder visible in the Administration Tool and is not an actual application role. You cannot create an actual application role in the Administration Tool. You can create an application role only in the policy store, using the administrative interface available for managing the policy store.

7) Knows how to access information about the users and groups accessible to Oracle Business Intelligence and is responsible for authenticating users.
       An authentication provider that knows how to access information about the users and groups accessible to Oracle Business Intelligence and is responsible for authenticating user
A policy store provider that provides access to application roles and application policies. which forms a core part of the security policy and determines what users can and cannot see and do in Oracle Business Intelligence.
A credential store provider that is responsible for storing and providing access to credentials required by Oracle Business Intelligence.
8) If you reconfigure Oracle Business Intelligence to use Oracle Internet Directory (OID), you can view and manage users and groups in Oracle Web Logic Server Administration Console
 Ans) False.

9) Oracle Business Intelligence Release 11g supports the use of SA System Subject Area, in combination with the BI Server initialization blocks, to access user, group and profile information stored in database tables.

10) True or False: In Oracle Business Intelligence Release 10g users and groups could be defined within a repository file using the Oracle BI Administration Tool. In Oracle Business Intelligence Release 11g users and groups can still be defined within a repository.
Ans) false

11) Oracle Business Intelligence 11g is tightly integrated with the________________ architecture and delegates core security functionality to components of that architecture.
Ans) Oracle Fusion Middle ware Security

12) When configuring a SQLAuthenticator, use this tab on the Settings dialog box to enter the SQL statements used to query, and authenticate against, your database tables.

13) In the Provider Specific tab you specify the SQL statements used to query, and authenticate against, your database tables.

14) If you want user Fred to be a Sales dashboard author, you might create a ______ called Sales Dashboard Author that has permissions to see Sales subject areas in the repository and edit Sales dashboards.
Ans) application role

15) A list of application roles that a user is a member of is available from the Roles and Groups tab in the ______ dialog in Presentation Services.
Ans) My Account

16) A (n)  _______ defines a subset of policies in the policy store. The Oracle Business Intelligence instance is named obi.
Ans) application stripe

17) Oracle Business Intelligence components communicate with each other using TCP/IP by default. Configuring ___ between the Oracle Business Intelligence components enables secured network communication.
Ans) SSL

18) After a user has been authenticated, the next critical aspect of security is ensuring that the user can do and see what they are authorized to do and see. Authorization for Oracle Business Intelligence Release 11g is controlled by a security policy defined in terms of application roles.

19) A method of authorization enabling a user to authenticate once and gain access to multiple software application during a single browser session is called:
Ans) Single Sign on (SSO) a method of authorization enabling a user to authenticate once and gain access to multiple software application during a single browser session.

20) Assigning an application role to be a member of a Presentation Services Catalog group is considered a best practice.
Ans) false

No comments:

Post a Comment