Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

1z0-591 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

1z0-591 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: Oracle Business Intelligence Foundation Suite 11g Essentials
  • Last Update: Sep 12, 2025
  • Questions and Answers: 120
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

1z0-591 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

1z0-591 Practice Exam Questions with Answers Oracle Business Intelligence Foundation Suite 11g Essentials Certification

Question # 6

Which variable does not use initialization blocks to initialize its values?

A.

Static Repository Variable

B.

Dynamic Repository Variable

C.

System Variable

D.

Non System Variable

Full Access
Question # 7

What are the two types of Session Variables?

A.

System

B.

Non System

C.

Static

D.

Dynamic

Full Access
Question # 8

Which analysis features could be applied to provide interactive controls for end users? (Choose Two)

A.

Column Selector

B.

Action Links

C.

Conditional Formatting

D.

Narrative View

E.

Greenbar Styling

Full Access
Question # 9

One of the initial phases in OBIEE implementation is the Discovery phase where the project team focuses on a few activities. Which option is not one of them?

A.

Business Requirements Definition

B.

Technical Requirements Definition

C.

Data Quality Assessment

D.

Dashboard Testing

Full Access
Question # 10

If Security attributes conflict, what happens?

A.

The user or application role is granted the minimum security attribute

B.

The user or application role is granted the maximum security attribute

C.

The user or application role is granted No security attribute

D.

The user or application role is granted the Fully Restrictive security attribute

Full Access
Question # 11

What is the first step when creating an Aggregate table in the OBI repository?

A.

Test the Aggregate table by using Analysis

B.

Specify the Fact table that you want to aggregate

C.

Use Job Manager to run the Aggregate script

D.

Create a dedicated Connection Pool

Full Access
Question # 12

The three metadata layers are an important concept of the BI Server. Which statement is incorrect?

A.

The physical layer defines the objects and relationships that the Oracle BI Server needs to write native queries against each physical data source.

B.

Separating the logical of the application from the physical model provides the ability to federate multiple physical sources to the same logical object.

C.

The model and mapping layer define the business or logical model of the data. This layer determines the analytic behavior seen by users.

D.

The presentation layer defines the relationship that is needed to create the DML.

Full Access
Question # 13

Identify the two types of storage for Essbase.

A.

Aggregate Storage Option and Block Storage Option

B.

Aggregate Storage and Cell Storage

C.

OLAP Storage and Cell Storage

D.

Aggregate Storage and Hybrid Columnar Compression

Full Access
Question # 14

Which OBIEE capability enables developers to build Aggregate tables?

A.

Aggregate Persistence Wizard

B.

Expression Builder

C.

Table Builder

D.

Query Analyzer

Full Access
Question # 15

Which option describes how OBIEE natively integrates with HFM?

A.

Through EPM Analytic Data Model (ADM) connectivity

B.

Direct relational database access

C.

Through Essbase connectivity

D.

OBIEE does not support HFM integration

Full Access
Question # 16

How do Dynamic Repository Variables differ from Static Repository Variables?

A.

Dynamic Repository Variables are not initialized by the Initialization Block.

B.

Dynamic Repository Variables cannot be used in the Expression Builder.

C.

Dynamic Repository Variables can be changed by data that is returned from queries.

D.

Dynamic Repository Variables cannot be used in a CASE statement.

Full Access
Question # 17

Which option describes how OBIEE Integrates with Planning?

A.

OBIEE primarily accesses Planning using standard Essbase integration techniques.

B.

OBIEE provides complete access to all Planning data through the Analytic Data Model (ADM) layer.

C.

Planning is not a supported OBIEE source.

D.

OBIEE integrates with Planning directly through relational database access.

Full Access
Question # 18

Use of the Enterprise Install option is recommended for which three options?

A.

Multiple instances on a single computer

B.

Scale out for High Availability and Failover

C.

Support for high security requirements

D.

Evaluation of end user functionality

E.

Single users working on a single computer

Full Access
Question # 19

What must be purchased when integrating Oracle map with Oracle BI?

A.

Oracle Mapviewer

B.

Oracle Business Intelligence Enterprise Edition

C.

Spatial Option with Database

D.

OLAP option

Full Access
Question # 20

One of the most common uses of Dynamic Repository Variables is to setup filters for use in reporting. Which variable below is a valid example of a Dynamic Repository Variable?

A.

Year

B.

Month

C.

Quarter

D.

CurrentMonth

Full Access
Question # 21

An integrated BI tools business case can be built around which three options?

A.

Scalability

B.

Fault tolerance

C.

Cost Savings

D.

Development efficiency

Full Access
Question # 22

What are the two methodologies that are followed within an OBIEE implementation?

A.

Do not use prototypes

B.

Use an iterative approach

C.

Start with a small model and then enhance the repository

D.

Start with a big repository and trim it down with the requirements

Full Access
Question # 23

When creating Aggregate tables in the OBI repository by using the Aggregate Persistence Wizard, which two statements are true?

A.

The analyst must first write DML (Data Manipulation Language) scripts to create the aggregate table.

B.

The Aggregate Persistence Wizard enables you to automate the creation of physical aggregate tables and their corresponding objects in the repository.

C.

Job Manager can be used to run the Aggregate Persistence script.

D.

The Extraction Transformation and Loading process creates the aggregate tables.

Full Access
Question # 24

To add multiple sources to on existing logical table dimension in the Business Model and Mapping layer, the source of the data must first exist in which option?

A.

Presentation Layer

B.

Business Aggregate Layer

C.

Physical Layer

D.

Web Catalog

Full Access
Question # 25

Which of the following characteristics pertain to a "ragged" hierarchy?

A.

It can only be stored in an XML structure.

B.

A branch of the hierarchy may have a different number of levels than other branches.

C.

All values can have a maximum of six levels.

D.

It creates multiple levels of hierarchy in the database table.

Full Access
Question # 26

When Exporting an Analysis from a Dashboard, which of the following is NOT an option?

A.

MS Excel

B.

MS Word

C.

PDF

D.

CSV

Full Access
Question # 27

When creating a Security Realm in the WebLogic Console, which object is created?

A.

Groups

B.

Row Level Filters

C.

Server Password

D.

Single Sign On

Full Access
Question # 28

How do System Session Variables obtain their values?

A.

They are entered by user input on a dashboard

B.

They are obtained from data fields in the Physical Layer

C.

They are obtained from the Presentation Layer

D.

They are obtained from the Initialization Block

Full Access
Question # 29

WLS Embedded LDAP Server is managed by the Admin Server Console and supports which three options?

A.

Creating and Maintaining Users

B.

Authentication and Authorization

C.

Basic Directory for storing user details

D.

Subject area and row-level security, connection pool passwords

E.

Application of Session Variables as Data Filters

Full Access
Question # 30

When creating a new dimensional hierarchy in the BI Administration tool, right click the dimension, then select "New Object" What must be selected next?

A.

Logical Key

B.

Parent Level

C.

Child Level

D.

Dynamic Key

Full Access
Question # 31

Which option is not an example of a level-based measure?

A.

Regional Revenue

B.

Sales

C.

Brand Cost

D.

Employee Salary

Full Access
Question # 32

The administration tool is the developer's interface to the repository file. It allows the development of and changes to the metadata repository file. Which statement is true?

A.

Changes to the repository can only be carried out in offline mode.

B.

Multiple developers can work on one repository at the same time. Results can be merged later on.

C.

All aspects of security are being held in the repository file.

D.

Opening the rpd.file in online mode results in performance Issues for the application user.

Full Access
Question # 33

Which two Oracle BI Components contain security information regarding permissions and privileges?

A.

The Web Catalog

B.

The Repository

C.

NQSConfig.ini File

D.

NQServer.ini File

E.

InstanceConfig.xml File

Full Access
Question # 34

Which task can be performed after the Administrator link has been reached through logging into OBIEE?

A.

Associate map layers to columns

B.

Manage access to Subject Areas

C.

SSO enablement

D.

Start or Stop BI Managed Servers

Full Access
Question # 35

Which component is responsible for determining the device that receives the alerts for a given user account?

A.

Dashboard

B.

iBot

C.

Alerts

D.

Delivery Profiles

Full Access
Question # 36

The ODBC DSN is never used for _______.

A.

Initial import of the physical layer metadata on a Windows server

B.

Query execution and data access on a Windows server

C.

Initial import of the physical layer metadata, query execution, and data access on a Windows Server

D.

Changing passwords

E.

Comparing RPDs

Full Access