Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

1z0-1058-23 Exam Dumps - Oracle Risk Management Cloud 2023 Implementation Professional

Go to page:
Question # 9

Your customer needs to conduct monthly Operational Effectiveness assessments for controls across two organizations (North America and EMEA). Your customer requires that assessment results for North America be accessible only to users in North America and likewise for EMEA. Additionally, the Chief Risk Officer reviews the assessment results by Business Process every week.

How should you design perspectives to achieve this?

A.

Use the Region hierarchy for security and the Business Process hierarchy for reporting of controls.

B.

Use the Region hierarchy initially, and later use both Region and Business Process hierarchies for security.

C.

Use both Region and Business Process hierarchies solely for reporting purposes.

D.

Use the Business Process hierarchy for security and the Region hierarchy for reporting of controls.

Full Access
Question # 10

Which three steps can be performed by using the Configure Module Objects pages? (Choose three.)

A.

Choose display (or hide) configurable options for: results, events, consequences and treatments.

B.

Set “object-perspective” association.

C.

Create object data import templates.

D.

Edit the assessment activity question and guidance text for all assessment types.

E.

View assessment response details for all assessment types.

Full Access
Question # 11

You want to identify Controls with the most Incidents, with the condition that the identified Controls should have 80% of all Incidents. To do this, you have imported a custom object that contains the number of incidents associated with each control, and have added that object to a transaction model.

Which pattern filter must you now apply?

A.

Anomaly Detection

B.

Mean

C.

Pareto

D.

Absolute Deviation

E.

Clustering

Full Access
Question # 12

Which two should you determine to ensure that your client can successfully maintain and administer Perspectives post go-live? (Choose two.)

A.

Identify if your client wants to review and/or approve new perspectives or changes made to existing perspectives.

B.

Identify lookup values that need to be created for Control, Risk, and Issue Type fields.

C.

Identify users who will be responsible for creating and maintaining perspectives, both for security as well as reporting.

D.

Identify users who will be responsible for creating and maintaining controls and/or risks.

Full Access
Question # 13

A Control Manager has changed the status of an issue to “In Remediation” and has submitted it.

What will be the state of the Issue if there is no issue validator, reviewer, or approver configured?

A.

In Review

B.

Active

C.

Reported

D.

Approved

E.

In Edit

Full Access
Question # 14

You are remediating access incidents in Advanced Access Controls (AAC), and have just completed the remediation of a segregation of duties conflict for users in Fusion Security by removing the conflicting access from the users.

What status do you set for the incident in AAC?

A.

Resolved

B.

Remediation

C.

Remedy

D.

Authorized

E.

Accepted

Full Access
Question # 15

Your client has configured separate roles for control assessor and control assessment reviewer. The control assessor has submitted his or her assessment. The control assessor realizes later that he or she has forgotten to attach a critical test evidence document to the assessment and needs to attach it now.

How can this be accomplished?

A.

The assessor can request the reviewer to attach the document during the review.

B.

On the Assessment tab in the Control definition, the assessor can select the assessment and click the Complete Assessment button. He or she can attach the document and resubmit the assessment.

C.

The assessor can request the reviewer to reject the assessment. After the assessment is rejected, the assessor can then attach the document and resubmit the assessment.

D.

On the Manage Assessments page, the assessor can select the assessment and click the Reopen button. He or she can then attach the document and resubmit the assessment.

Full Access
Question # 16

During implementation, you created a Financial Reporting Compliance superuser and assigned this user the following roles:

  • Enterprise Risk and Control Manager
  • IT Security Manager
  • Employee

The superuser logs in to Financial Reporting Compliance but is not able to create new Data Security Policies.

What is wrong?

A.

The superuser’s account is inactive and his or her account needs to be activated.

B.

The application will not allow a user to both create users and assign them roles.

C.

The superuser’s account is created but the synchronization jobs have not been run.

D.

The superuser’s account is not yet approved by his or her supervisor in Financial Reporting Compliance.

Full Access
Go to page: