Oracle Financial Crime and Compliance Management 6 Functional Implementation Essentials v6.0 (1z0-444)

Page:    1 / 5   
Total 74 questions

During an infrastructure workshop, the customer wants to deploy the FCCM UI on a
JBOSS web container running on SUSE Linux. How would you respond? (Choose the best answer.)

  • A. This is not possible, because SUSE Linux is not supported.
  • B. This is not possible, JBOSS is supported only on Oracle Enterprise Linux.
  • C. This is not possible, because JBOSS is not supported.
  • D. This is fine.


Answer : B

The focal entity of an alert provides a way to ________. (Choose the best answer.)

  • A. filter transactions
  • B. address a business problem
  • C. score an alert
  • D. provide a central point to investigate an alert


Answer : A

Which set of steps must be completed to create a new threshold set? (Choose the best answer.)

  • A. 1. Create the Threshold Set by using the Scenario Manager. A corresponding Job ID and Job template ID will be created. 2. Run the Scenario
  • B. 1. Create the Threshold Set by using the Admin Tools Threshold Editor. A corresponding Job ID and Job template ID will be created. 2. Run the Scenario Job.
  • C. 1. Create the Threshold Set by using the Scenario Manager. A corresponding Job ID will be created. 2. Assign the Job ID to an existing Job Template ID and run the Scenario.
  • D. 1. Create the Threshold Set by using the Admin Tools Threshold Editor. A corresponding Job ID will be created. 2. Assign the Job ID to an existing Job Template ID and run the Scenario.


Answer : B

Which postprocessing sequence is correct? (Choose the best answer.)

  • A. Alert Creation; Match Scoring; Alert Scoring; Alert Assignment
  • B. Update Financial Data; Match Scoring; Alert Creation; Alert Scoring; Alert Assignment
  • C. Historical Data Copy; Match Scoring; Alert Creation; Alert Scoring; Alert Assignment
  • D. Match Scoring; Alert Creation; Alert Scoring; Alert Assignment; Historical Data Copy
  • E. Historical Data Copy; Update Financial Data; Alert Creation; Match Scoring; Alert Scoring; Alert Assignment


Answer : D

Which symbol denotes a threshold in a pattern? (Choose the best answer.)

  • A. &
  • B. $
  • C. @
  • D. %


Answer : D

Which information does FCCM Know Your Customer (KYC) use for risk assessments?
(Choose the best answer.)

  • A. Negative New Search (Factiva)
  • B. AML Cases
  • C. Public Profiles
  • D. Private Investigations


Answer : A

Reference:
https://docs.oracle.com/cd/E41197_01/books/ECM%206.2.3/kyc_rag_2.0_5ed.pdf

A batch named DLY is open with a business data of June 22, 2014. The inbox has the following DIS files in it:

Account_20140622_dly_09.dat -

Account_20140622_dly_05.dat -
On execution of the runDP.sh Account, the logs indicate that there were zero files for processing.
What is the reason for this? (Choose the best answer.)

  • A. The data format in the DIS file names is incorrect.
  • B. The numbering for the DIS file names must start at number 01.
  • C. There is no data map for the Account DIS file.
  • D. The batch name in the file names does not match the batch name that was started.


Answer : D

Which are three data streams of interest for the scenario High Risk Transactions: High Risk
Counter Party? (Choose three.)

  • A. Back Office Transaction
  • B. Correspondent Bank
  • C. Front Office Transaction
  • D. Watch list


Answer : A,C,D

Case Inheritance enables users to take ownership while _________. (Choose the best answer.)

  • A. selecting a Case from the Case List in OPEN status
  • B. taking a closing action on a Case in OPEN status
  • C. taking a Monitor Action on an Open Alert
  • D. selecting a Case in NEW status from the Case List page


Answer : A

How many parties can a wire transaction involve? (Choose the best answer.)

  • A. two
  • B. four
  • C. six
  • D. more than six


Answer : D

Reference:
https://www.google.com.pk/url?sa=t&rct=j&q=&esrc=s&source=web&cd=5&ved=0CC8QFj
AEahUKEwixnYz7iJjJAhVRCo4KHQMmDk8&url=http%3A%2F%2Fwww.rbnz.govt.nz%2Fr egulation_and_supervision%2Fanti- money_laundering%2Fguidance_and_publications%2F5409198.pdf&usg=AFQjCNEgkdc4 hiwcoaz2yhitTELTr2swEQ&cad=rja

Which user role can access the Threshold Editor? (Choose the best answer.)

  • A. SUPERVISOR
  • B. ADMIN
  • C. CASE SUPERVISOR
  • D. DATA MINER


Answer : D

Reference: https://docs.oracle.com/cd/E41197_01/books/FCCM_6.2.1/atug_6.2.1_1ed.pdf

During an infrastructure workshop it is stated that the client should procure the Enterprise
Edition of Oracle database server. (Choose the best answer.)
How do you respond?

  • A. This is fine because RHEL/Intel Itanium is a certified option.
  • B. This is not possible because Intel Itanium CPUs are not supported.
  • C. This is not possible because Red Hat Enterprise Linux is not supported.
  • D. This is not possible because the Oracle 11g client is not supported on this platform combination.


Answer : B

What is the consequence of setting the value of NLS_LENGTH_SEMANTICS =BYTE, when you are using multibyte languages? (Choose the best answer.)

  • A. INSERT operations on tables with columns of type VARCHAR fail.
  • B. Tables with columns of type VARCHAR suffer truncation during data load.
  • C. UPDATE operations on tables with columns of type VARCHAR fail.
  • D. SELECT operations on tables with columns of type VARCHAR fail.


Answer : B

Alert Information is transferred to Case Management when the alert is promoted to a case.
In which mode does the alert data transfer process occur? (Choose the best answer.)

  • A. Delta and Asynchronous
  • B. Delta and Full Refresh
  • C. Synchronous and Asynchronous
  • D. Full Refresh and Synchronous


Answer : C

Explanation: Transfer Alert Information can be handled in two ways: Synchronous and
Asynchronous mode.
Reference:
https://docs.oracle.com/cd/E41197_01/books/FCCM_6.2/amug_plat_6.2_2ed.pdf

Ingestion Manager processes trade related data, orders and executions, and trades through FDT. Which events must be completed prior to running FDT.sh? (Choose the best answer.)

  • A. runMDS.sh and runDL.sh
  • B. runDP.sh and runDL.sh
  • C. runMDS.sh
  • D. runMDS.sh and runDP.sh


Answer : D

Page:    1 / 5   
Total 74 questions