Labour Day Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

Oracle 1z0-344 JD Edwards EnterpriseOne Configurable Network Computing 9.2 Implementation Essentials Exam Practice Test

Page: 1 / 9
Total 88 questions

JD Edwards EnterpriseOne Configurable Network Computing 9.2 Implementation Essentials Questions and Answers

Question 1

Which two statements are correct about Role Sequence and Hierarchy (is set to true)?

Options:

A.

Security information from multiple roles can be merge into a single role by using the Role Relationship (P95921) application.

B.

The sequence number for a role cannot be changed manually after the role is created.

C.

Windows clients and web client are identical in how they use role sequence to determine which security record is applied.

D.

If a security records conflict arises, JDE security will choose the role with highest sequence number and apply security only for that role.

E.

Changing roles after sign- on impacts object security, menu filtering, and display of menu information.

Question 2

What does the following security record found in Security Workbench (P00950) enforce?

Question # 2

Options:

A.

The Remove Role button is not shown for all users in the Work with role relationships application on a fat Client machine.

B.

The Remove Role button is not shown for all users in the Work Role Relationships application on a Web client.

C.

The Remove Role button is for all users in the work role Relationships application on both the Web and fat machines.

D.

The Remove Role button is not shown for all users in the Work Role Relationships application on both the Web and fat client machines.

E.

The error message “Not Authorized” is displayed when a user click the Remove Role button.

Question 3

The ACME company wants to upgrade the development environment from E19.1 and decides to run a Data-Only upgrade.

Which two conversions are not required during the execution of Data-Only upgrade

plan?

Options:

A.

Object librarian copy

B.

Specifications merge

C.

Media object conversion

D.

table and index generation

E.

security table conversion

Question 4

Identify the correct list of requirements when enabling Long Passwords in EnterpriseOne.

Options:

A.

*EnterpriseOne Tools 9.2 must be installed and configured on each Enterprise server.

*Long User IDS are not required before Long passwords are implemented.

.*The application that is used to manage user password will change from P980WSEC to P98LPSEC.

B.

*EnterpriseOne Tools 9.2 must be installed and configured on each Enterprise Server.

*Long User IDs must be enabled before Long passwords are implemented.

.*The application that is used to manage user passwords will remain P980WSEC.

C.

*EnterpriseOne Tools 9.1 must be installed and configured on each Enterprise Server.

*Long User IDS must be enable before Long passwords are implemented.

*The application that is used to manage user passwords will remain P980WSEC.

D.

*EnterpriseOne Tools 9.0 must be installed and configured on each Enterprise Server.

*Long User JDs are not required before Long passwords are implemented.

*The application that is used to manage user password s will remain P980WSEC.

E.

*EnterpriseOne Tools 9.0must be installed and configured on each Enterprise server.

*Long User IDs must be Enabled before Long passwords are implemented.

*The application that is used to manage user passwords will change from P980WSEC to P98LPSEC.

F.

*EnterpriseOne Tools 9.01 must be installed and configured on each Enterprise Server.

*Long User IDs are not required before Long passwords are implemented.

*The application that is used to manage user passwords will change from P980WSEC to P98LPSEC.

Question 5

A JDE user has two roles assigned : Role 1(FINUSR) with sequence number 25 and role ( FINSUP) with sequence number 35. When the User signs with the *All role, what is the hierarchy that records read when user attempts any operation?

Options:

A.

*PUBLIC > User > Role1 > Role 2

B.

*PUBLIC > Role1> Role2 > User

C.

PUBLIC > Role 1 > Role2 > *PUBLIC

D.

User > Role1 > Role2 >* PUBLIC

E.

User > Role2 > Role > Role1 > * PUBLIC

Question 6

What is the correct sequence to install French Language on your JDE system?

Options:

A.

Install French Language on deployment server > Create Typical installation plan > Build and deploy language packages.

B.

Create language only installation plan > run Workbench > install French Language on deployment server > Build and deploy language packages.

C.

Install French Language on deployment server > Create language only installation plan > run Workbench > Build and deploy language packages.

D.

Create Language only installation plan > install French Language on deployment server > Run Workbench > Build and language packages.

E.

Install French Language on deployment server > Create add on Server plan > Run Workbench > Build and deployment language packages.

Question 7

Which package Assembly from must you use to add registry setting to a package?

Options:

A.

Language Component from

B.

Features Component from

C.

Database Component from

D.

Foundation Component from

E.

Object Component from

Question 8

Which two statements are true about deploying JDE on OPC by using JDE One-Click provisioning tools?

Options:

A.

after provisioning, CNC needs to run install plan and Workbench to up the provisioning JDE servers.

B.

Web server clustering is only by using Oracle Traffic Director and Oracle HTTP Server.

C.

Deploying the JDE web Servers on Java Cloud Server (JCS) is not supported.

D.

Deploying the JDE database on top of a database server that is running in Compute Cloud service is not supported.

E.

Deploying the JDE database on Database Cloud Service (DBCS) is supported.

Question 9

Which two steps are required for a multitier deployment?

Options:

A.

Deploy packages by using the Multitier Package application.

B.

Define Deployment Server definitions for each remote location.

C.

Define deployment locations.

D.

Define named users.

E.

Schedule packages by using the Multitier Package application.

Question 10

There are three BSSV servers: BSSV1 and BSSV2 on Machine M1 and BSSV3 on Machine M2. How would you cluster these servers to attain high availability?

Options:

A.

vertical clustering within all three servers.

B.

vertical clustering within BSSV2 and BSSV3, and then horizontal clustering in BSSV1.

C.

vertical clustering within BSSV1 and BSSV3, and then horizontal clustering in BSSV2

D.

horizontal clustering within all three servers

E.

vertical clustering within BSSV1 and BSSV2, and then horizontal clustering in BSSV3

Question 11

Using Tools Release 9.2.0.x, you have built a full server package called DV920FUIL for the DV920 pathcode. You find that several business functions (BSFN) built with errors on the R9621S pdf. Which two are correct about troubleshooting BSFN errors for the server package?

Options:

A.

BSFN build errors are found in files in the following folder on Deployment Server: DV920\PACKAGE\DV920FULL\work.

B.

NER generation errors are found in files in the following folder on Enterprise Server: packages\DV920FULL\GenerateNER_logs

C.

BSFN and NER build errors are found in files in the following folder on Enterprise Server: packages\DV920FULL\work.

D.

NER build errors are found in files in the following folder on Deployment Server: DV920\PACKAGE\DV920FULL\GENNER.

E.

BSFN build errors are found in files In the following folder on Enterprise Server: Packages\DV920FULL\compileLogs Name].

Question 12

A JDE user has two roles (ROLE1 and ROLE2) assigned. The role sequence and security for the two roles are defined as follows:

Question # 12

What happens when the user logs in to JDE as *All and tries to access the Address Book (P01012) application from fastpath?

Options:

A.

The user is able to access the address Book (P01012) application both from Fat and web clients.

B.

The user is not able to access the address Book (P01012) application and “Not authorized” message.

C.

The user is able to access the address Book (P01012) application and can modify or view any address Book record.

D.

The user is able to access the address Book (P01012) application and can view all records but is restricted from performing any ADD/Modify/ Delete/Copy action.

E.

The user is not able to access the address Book (P01012) application from the Fat client but can access it from the web client

Question 13

Before Tools 9.2.1.0, which three object types had components stored on the deployment server’s patch code check-In location?

Options:

A.

Tables

B.

BSSV Business Functions

C.

Data Dictionary

D.

C Business Functions

E.

Tasks

Page: 1 / 9
Total 88 questions