CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.




Get it now !!
Send your Resume to 6000 Companies
Oracle Apps Security Interview Questions & Answers - Learning Mode
COOLINTERVIEW.COM ORACLE APPS INTERVIEW QUESTIONS ORACLE APPS SECURITY INTERVIEW QUESTIONS QUESTIONS & ANSWERS - LEARNING MODE

Oracle Apps Security Interview Questions & Answers - Learning Mode

A responsibility is a level of authority in Oracle Applications that lets users access only those Oracle Applications functions and data appropriate to their roles in an organization. Each responsibility allows access to a specific application or applications, a set of books, a restricted list of windows, a restricted list of functions, and reports in a specific application.

Try Oracle Apps Security Interview Questions & Answers - Exam Mode

1

Sort By : Latest First | Oldest First | By Rating

Oracle Apps Security Interview Questions & Answers - Learning Mode
Try Oracle Apps Security Interview Questions & Answers - Exam Mode
Question: Can security rules be used to control the posting of journal entries?



Answer: Security rules apply only with regards to creation/modification of lines within a journal. They do not apply when the journal is posted.
Source: CoolInterview.com
Question: Is there a way to assign different security rules to a responsibility based on the User ID?



Answer: You cannot apply different security rules to the same responsibility for different users based on the user ID. You will have to create a new responsibility and define its own security rules. Then you can assign the new responsibility to one of the users. Source: CoolInterview.com
Question: Can Security Rules prevent users in one organization in the same set of books from adding Cross Validation Rules to another organization?



Answer: There is not a way in the same set of books, to prevent users from one operating unit via security rules, from changing cross validation rules for another operating unit. The only way to do this would to be create a separate set of books for each operating unit. Since security rules prevent users from either viewing data or entering data in general, they do not pertain to set up issues such as creating cross validation rules. Therefore, the only other way to prevent one user from one organizati Source: CoolInterview.com
Question: In General Ledger,a security rule of a parent with children, was setup to include the parent and assigned to a responsibility however, it is not functioning properly.



Answer: System allows the account the customer wanted but doesn't disallow the ones that are children of the parent values excluded. Source: CoolInterview.com
Question: Every Country has a Global Manager or User Responsibility to access Global SOB but it is supposed to limit users to their own Legal Entities. However, an Argentian journal can be posted by the Chilian user. How is this possible?



Answer: This is working as intended. Security rules will prohibit a responsibility from being able to enter in certain values as well as prohibit the viewing of those values as well. However security rules will not prohibit the actions above because they are in the same set of books. The system does not determine if a journal has values in it that are blocked by security rules. If it did that, then the journal would appear as unbalanced. There would have to be an incredible amount of logic involved, whi Source: CoolInterview.com
Question: Forgot to check the security enabled flag for each segment and it is not updatable. How do I correct this?



Answer: Check your Accounting Flexfield Structure possibly it is frozen. Unfreeze the Structure and then you should be able to enable Security for the Segment. Source: CoolInterview.com
Question: Security rules don't seem to work on all forms when performing a query.



Answer: Flexfield Value Security gives you the capability to restrict the set of values a user can use during data entry. With easy-to-define security rules and responsibility level control, you can quickly set up data entry security on your flexfield segments and report parameters. Flexfield Value Security lets you determine who can use flexfield segment values and report parameter values. Based on your responsibility and access rules that you define, Flexfield Value Security limits what values you can Source: CoolInterview.com
Question: I have defined a security rule and assigned it to my responsibilty, but is still does not work, why?



Answer: Make sure that you have run the "Security List Maintainance" Process.

Source: CoolInterview.com
Question: Is it feasible to delete an Exclude statement in order to resolve a Security Rule issue?



Answer: The Security rule should not be modified by deleting an exclude or include as it may corrupt the rule. One should try to delete all rule lines (include and excludes) save and redefine the include and exclude the way that it should work and save. If the rule still doesn't work, it may be necessary to create a new rule and assign it to the responsibilities in place of the original rule. Source: CoolInterview.com
Question: Is it feasible to delete an Exclude statement in order to resolve a Security Rule issue? Example of issue: A user in Argentina Entered a Journal Entry. Another User from Chile Posted the Argentina Entry in Global SOB. And later reversed it as well.



Answer: yes, we can remove the Exclude statement as these were never used before for a particular responsibility. The journals entered/reversed for Argentina will not have these Excluded values before, hence this should work.
Source: CoolInterview.com
Question: My security rules don't work for the Account Analysis and General Ledger reports in Release 11.0.3.



Answer: This functionality is available starting in Release 11i. In Releases 11 and lower, one cannot set security for standard reports. Security Rules will only limit users from a few functions (e.g. Account Inquiry, Budgets, Journal Entries, and FSGs). In addition, in Release 11i there is limited use of the security rule functionality for running standard reports. It appears that you're the goal to restrict users from submitting reports for a particular company cannot be accomplished using securit Source: CoolInterview.com
Question: In Rel 11i with the intercompany segment being used, is it possible to have a security rule on the balancing segment (company) without it affecting the intercompany segment, since they share the same value set?



Answer: Yes it is possible. You would enable security on the value set, but then on the flexfield segment (intercompany) you would not enable security. Source: CoolInterview.com

1



India News Network
Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
Cache = 0.046875 Seconds