11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

1z0-1058-23 Exam Dumps - Oracle Risk Management Cloud 2023 Implementation Professional

Question # 4

How do you associate a risk to a control?

A.

On the Related Controls tab of risk definition, add the control.

B.

To associate a control to a risk, the control needs to be in the Review state.

C.

In the related object section of process definition, add the control to the risk.

D.

On the Related Objects tab of control definition, add the risk.

E.

The only way to create risk-control associations is through data import.

Full Access
Question # 5

An organization has a list of companies with which they no longer wish to do business. The list is not stored in their ERP Could but is stored in a file.

Which transaction model will identify payments made to these companies?

A.

Create an Imported business object that can be used in conjunction with Oracle’s pre-built “Payment” object. One both objects are in your model, add this standard filter: the “Payment” object’s “Remit to Supplier Name” is similar to the custom object’s “Company Name” by 95%.

B.

Add a configurable attribute “Company Name” to Oracle’s pre-built “Payment” object. Then add this standard filter: “Remit to Supplier Name” equals “Company Name”.

C.

You cannot define this model because imported objects from a file cannot be used with delivered objects.

D.

Create an Imported business object that can be used in conjunction with Oracle’s pre-built “Payables Invoice” object. Once both objects are in your model, add this standard filter: the “Payables Invoice” object’s “Supplier Name” equals the custom object’s “Company Name”.

Full Access
Question # 6

Your client is configuring their Test pod (which has no data) and has created their initial import template with controls, test plans, perspectives, and perspective-control mappings. They have used custom list of values for Control Frequency.

Which three tasks must be completed before performing the data import? (Choose three.)

A.

Validate that all nods on the Perspective Item tab are covered on the Perspective Hierarchy tab.

B.

Validate that the control-perspective relationship has been created in Manage Module Perspectives.

C.

Validate that new lookup values are created for any custom list of values.

D.

Validate that there are no duplicate worksheet IDs within the same worksheet.

E.

Validate that the System ID column is populated correctly.

Full Access
Question # 7

You have completed the data import process with no errors. You created process, risks, controls, and one perspective. Controls were related to perspectives. You have provided the customer with the Control Manager security role. When the customer logs in to Financials Risk Compliance (FRC), the customer cannot see any controls.

Which step was missed during the import process?

A.

Data security policies for Controls were not created.

B.

The Controls were not related to any risk objects.

C.

The parent process was never approved.

D.

The Control Method was not set to a valid value.

Full Access
Question # 8

You are helping your client identify and define their controls. You have determined that your client requires two perspectives: Business Units and Regulatory Standards.

The controls are going to be secured by the business unit, and you want to ensure that when the client defines new controls, it is mandatory to assign a Business Units perspective to the control. You are going to set the “Required” field to “yes” for the Control-Business Units association.

Where do you do this in the product?

A.

The Create Control screen

B.

The Manage Object Perspectives screen

C.

The Import template

D.

The Create Perspectives screen

E.

The Manage Module Perspectives screen

Full Access
Question # 9

Your customer needs to conduct monthly Operational Effectiveness assessments for controls across two organizations (North America and EMEA). Your customer requires that assessment results for North America be accessible only to users in North America and likewise for EMEA. Additionally, the Chief Risk Officer reviews the assessment results by Business Process every week.

How should you design perspectives to achieve this?

A.

Use the Region hierarchy for security and the Business Process hierarchy for reporting of controls.

B.

Use the Region hierarchy initially, and later use both Region and Business Process hierarchies for security.

C.

Use both Region and Business Process hierarchies solely for reporting purposes.

D.

Use the Business Process hierarchy for security and the Region hierarchy for reporting of controls.

Full Access
Question # 10

Which three steps can be performed by using the Configure Module Objects pages? (Choose three.)

A.

Choose display (or hide) configurable options for: results, events, consequences and treatments.

B.

Set “object-perspective” association.

C.

Create object data import templates.

D.

Edit the assessment activity question and guidance text for all assessment types.

E.

View assessment response details for all assessment types.

Full Access
Question # 11

You want to identify Controls with the most Incidents, with the condition that the identified Controls should have 80% of all Incidents. To do this, you have imported a custom object that contains the number of incidents associated with each control, and have added that object to a transaction model.

Which pattern filter must you now apply?

A.

Anomaly Detection

B.

Mean

C.

Pareto

D.

Absolute Deviation

E.

Clustering

Full Access
Question # 12

Which two should you determine to ensure that your client can successfully maintain and administer Perspectives post go-live? (Choose two.)

A.

Identify if your client wants to review and/or approve new perspectives or changes made to existing perspectives.

B.

Identify lookup values that need to be created for Control, Risk, and Issue Type fields.

C.

Identify users who will be responsible for creating and maintaining perspectives, both for security as well as reporting.

D.

Identify users who will be responsible for creating and maintaining controls and/or risks.

Full Access
Question # 13

A Control Manager has changed the status of an issue to “In Remediation” and has submitted it.

What will be the state of the Issue if there is no issue validator, reviewer, or approver configured?

A.

In Review

B.

Active

C.

Reported

D.

Approved

E.

In Edit

Full Access
Question # 14

You are remediating access incidents in Advanced Access Controls (AAC), and have just completed the remediation of a segregation of duties conflict for users in Fusion Security by removing the conflicting access from the users.

What status do you set for the incident in AAC?

A.

Resolved

B.

Remediation

C.

Remedy

D.

Authorized

E.

Accepted

Full Access
Question # 15

Your client has configured separate roles for control assessor and control assessment reviewer. The control assessor has submitted his or her assessment. The control assessor realizes later that he or she has forgotten to attach a critical test evidence document to the assessment and needs to attach it now.

How can this be accomplished?

A.

The assessor can request the reviewer to attach the document during the review.

B.

On the Assessment tab in the Control definition, the assessor can select the assessment and click the Complete Assessment button. He or she can attach the document and resubmit the assessment.

C.

The assessor can request the reviewer to reject the assessment. After the assessment is rejected, the assessor can then attach the document and resubmit the assessment.

D.

On the Manage Assessments page, the assessor can select the assessment and click the Reopen button. He or she can then attach the document and resubmit the assessment.

Full Access
Question # 16

During implementation, you created a Financial Reporting Compliance superuser and assigned this user the following roles:

  • Enterprise Risk and Control Manager
  • IT Security Manager
  • Employee

The superuser logs in to Financial Reporting Compliance but is not able to create new Data Security Policies.

What is wrong?

A.

The superuser’s account is inactive and his or her account needs to be activated.

B.

The application will not allow a user to both create users and assign them roles.

C.

The superuser’s account is created but the synchronization jobs have not been run.

D.

The superuser’s account is not yet approved by his or her supervisor in Financial Reporting Compliance.

Full Access
Question # 17

Which two steps are required to set up two levels of approval for new controls, which are added after the initial import? (Choose two.)

A.

On the Controls tab of the Import template, set the control state to NEW for each control record.

B.

Identify the organizations or business units for which users will perform review or approval.

C.

Identify users who will perform control review and approval.

D.

Identify the other roles to be provided for control managers.

Full Access
Question # 18

You have imported risks in Financial Reporting Compliance using data migration. Your client is asking if you can add controls for these risks.

Which two statements are true? (Choose two.)

A.

To relate controls to risks, the risks must be in “approved” state.

B.

You cannot use the Data Migration tool to add control records to map to existing risks.

C.

You can use the Data Migration tool to add control records for the existing risks.

D.

To relate controls, risks must be assigned to the same perspective that is assigned to the control you want to map it to.

E.

You can manually add control definitions and relate them to the risks in Financial Reporting Compliance.

Full Access
Question # 19

Which two would need to happen in order for Advanced Access Controls (AAC) to automatically assign a status of “Closed” to an access incident? (Choose two.)

A.

The incident is resolved in Fusion Cloud and a subsequent evaluation of controls finds that the incident no longer exists.

B.

A global condition was added that resolves the conflict and a subsequent evaluation of controls finds that the incident no longer exists.

C.

A user sets the State of the incident to “Remediate”.

D.

The incident is resolved using simulation in AAC and a subsequent evaluation of controls finds that the incident no longer exists.

E.

A user sets the Status of the incident to “Resolved”.

Full Access
Question # 20

You have two segregation of duties requirements:

1) a user can access either the supplier creation pages or the invoice pages, but not both.

2) a user can access either the invoice creation pages or the payment creation pages, but not both.

How must these requirements be met in Advanced Access Controls?

A.

Construct one model with three condition filters where the Function Name Equals “Create Supplier”, “Create Invoice” and “Create Payment”

B.

Construct two models, and create controls based on the models: “Create Supplier & Create Invoice”, “Create Invoice & Create Payment”

C.

Construct three controls, and create controls based on the models: “Create Supplier & Create Invoice”, “Create Invoice & Create Payment”, “Create Supplier & Create Payment”

D.

Construct one model: “Create Supplier & Create Invoice & Create Payment”

E.

Construct one entitlement: “Create Supplier & Create Invoice & Create Payment”

Full Access
Question # 21

Which three objects can be related to issues when creating an issue on the Manage Issues page? (Choose three.)

A.

Test Plans

B.

Assessments

C.

Processes

D.

Perspectives

E.

Risks

F.

Controls

Full Access
Question # 22

You have built a transaction model to identify possible duplicate charges between invoicing and expense credit cards. The model logic already includes two standard filters that identify amounts and suppliers that are the same or similar, as shown:

Which additional date filter will further refine the set of duplicate charges found?

A.

The “Payables Invoice” object’s “Invoice Date” attribute is greater than the “Expense Report Credit Card Transaction” object’s “Transaction Date” attribute.

B.

The “Expense Report Credit Card Transaction” object’s “Last Updated Date” attribute is greater than the “Relative Value” of 3 months.

C.

The “Expense Report Credit Card Transaction” object’s “Transaction Date” attribute is not blank.

D.

The “Payables Invoice” object’s “Invoice Date” attribute is similar to the “Expense Report Credit Card Transaction” object’s “Transaction Date” attribute within +/- 10 days.

Full Access