Question 1. Explain About Openpages?
OpenPages GRC Platform V7.2 is an integrated governance, risk, and compliance platform that enables companies to manage risk and regulatory challenges across the enterprise. It provides a set of core services and functional components that span risk and compliance domains, which include operational risk, policy and compliance, financial controls management, IT governance, and internal audit.
Question 2. What Are The New Features Included In Openpages?
OpenPages GRC Platform improves overall usability and efficiency with a new set of features that are designed to increase overall productivity and enterprise-wide security. This release also introduces a model risk governance and regulatory compliance management capability. New features include:
- Questionnaire-based assessment programs that enable you to engage with subject matter experts across the enterprise.
- Easily accessible single purpose applications that are focused on infrequent users. Updated OpenPages API, the most comprehensive set of APIs, that enable customers to extend and more easily adapt the functionality of their existing solutions.
- Improved usability for users by building new capabilities and enhancing existing capabilities in the application.
- Global cross-object search capability.
- Technical foundation upgrades.
- Integrated Model Risk Governance and regulatory compliance management capability.
Question 3. What Are The Capabilities Of Openpages?
OpenPages GRC Platform V7.2 capabilities include: Central platform for integrated reporting, workflow, and policies Patented, adaptable framework that enables easy configuration Interactive dashboards and ad hoc reports for decision support Powerful workflow for automating business processes
Question 4. Explain About Openpages Operational Risk Management?
OpenPages Operational Risk Management : Helps to automate the process of identifying, measuring, and monitoring operational risk. It combines all risk data, which includes risk and control self assessments, loss events, scenario analysis, external losses, and key risk indicators, into a single integrated module.
Key features include:
- Risk and control self assessments, which include the following activities:
- Identification, measurement, and mitigation of risks
- Testing and documentation of internal controls
Loss events, which include the following activities:
- Tracking, assessing, and managing both internal and external events that could result in operational loss
- Managing multiple impact events and recoveries that are associated with operational losses
- External loss events that provide the ability to import loss data from IBM Algo®, ORX, and ORIC loss databases into OpenPages Operational Risk Management for scenario analysis, benchmarking, and reports generation. You can also export loss data to analytic tools or capital allocation applications.
- Key risk indicators, which can track performance metrics to potentially show the presence or state of a risk condition or trend.
- Scenario analysis, which is an assessment technique that is used to identify and measure specific kinds of risks, in particular, low-frequency, high-severity events.
- Reporting, monitoring, and analytics.
- Ability to access integrated capital modeling capabilities.
Question 5. Explain About Openpages Policy And Compliance Management ?
OpenPages Policy and Compliance Management enables you to consolidate policy and compliance management, as well as manage regulatory change and regulator interaction. This software helps reduce the complexity and expense of complying with industry, ethics, privacy, and government regulatory mandates.
OpenPages Policy and Compliance Management can be used to automate the policy management lifecycle to help you to achieve compliance, mitigate risks, and adhere to corporate policies and procedures.
Key features include:
- Integrated solution for managing policy and regulatory compliance
- Compliance assessment at the business unit, process, or local level.
- Regulatory change management to track regulatory alerts and proactively communicate to help drive the change management process
- Flexible integrated policy management that supports full lifecycle of policies that include the Microsoft Word import capability for document-centric-policy, editing workflows
- Support for the regulatory certification and audit process that includes regulatory management
- Business benefits include the ability to:
- Standardize compliance across regulatory requirements to help reduce cost and deliver a holistic understanding of all compliance risk.
- Help assure compliance is achieved. Risks are mitigated. Corporate policies and procedures are enforced.
- Deliver programmatic, regulatory change management and consistent regulator management.
Question 6. Explain Openpages Financial Controls Management?
OpenPages Financial Controls Management :
OpenPages Financial Controls Management combines powerful document and process management with rich, interactive reporting capabilities in a flexible, adaptable, easy-to-use environment. They enable CEOs, CFOs, managers, independent auditors, and audit committees to perform all the necessary activities for complying with Sarbanes-Oxley and similar financial reporting regulations in a simple and efficient manner.
OpenPages Financial Controls Management provides transparency into the state of financial controls and helps ensure that compliance demands are addressed.
Key features include:
- Single data repository
- Business intelligence and decision support
- Risk and compliance automation
- Configurable and interoperable with other systems
Question 7. Explain About Openpages It Governance?
OpenPages IT Governance : Helps to align IT operations management with corporate business initiatives, strategy, and regulatory requirements. This software allows you to sustain compliance across best-practice frameworks and regulations while managing internal IT control and risk according to the business processes they support.
OpenPages IT Governance lets you build a sustainable risk and compliance approach to address sensitive data, management of technology assets and regulatory requirements. Key features include:
- IT Regulatory and Policy Compliance
- IT Asset Assessment
- IT Incident Management
- Out of the box connection to QRadar®
- Risk and control assessments
- Control testing and issue remediation
- IT resource management
- Incident tracking
- Key performance and key risk indicators
- Reporting, monitoring, and analytics
Question 8. Explain About Openpages Internal Audit Management?
OpenPages Internal Audit Management : Helps to automate internal auditing procedures and adds new efficiencies and standardization to the assessment of risk and compliance performance, which are designed to improve the efficiency and effectiveness of internal audit processes, while it helps you maintain independence and objectivity.
OpenPages Internal Audit Management enables auditors to automate and manage internal audits, and conduct broader risk and compliance management activities.
Key features include:
- Allows you to automate frequently performed calculations and assessment metrics.
- Facilitates creation and maintenance of audit scope and objectives, resource scheduling and allocation, and the audit work program.
- Promotes definition of the anticipated scope, risk assessment, procedures and schedule for each audit.
- Can be configured to support many audit methodologies.
- Designed to streamline review and approval processes to drive down costs and increase efficiency.
- Facilitates collaborative workpaper authoring and management, designed to result in higher quality and consistency
Time and expense reporting
- Helps you manage audit programs, and identifies opportunities for improvement.
- Enables insight into operational effectiveness, and promotes fieldwork efficiency.
Audit report and wrap up that allows you to:
- Automate audit close processes.
- Deliver capabilities to facilitate the reporting and escalation of issues and findings.
Question 9. Explain Openpages Capital Modeling?
OpenPages Capital Modeling : OpenPages Operational Risk Capital Modeling application is an integrated tool that provides a set of tools to analyze, simulate, and quantify operational risk capital by using a variety of methods.
The tool offers three different approaches to calculate operational risk capital, the Basic Indicator Approach (BIA), the Standardized Approach (TSA), and also the Advanced Measurement Approach, which provides an actuarial-based, bottom-up method for aggregating loss calculations by developing best-fit frequency and severity estimates. The application can estimate capital by using multiple data sources, which include internal loss data, external loss data, and structured scenario data. It also provides advanced modeling features, such as copula based correlation.
The application is also integrated with the OpenPages Operational Risk Management module, which allows you to simultaneously collect, model, and report on operational risk data and capital. You can apply the robust OpenPages platform framework to capital models, such as role based security and audit trail and create cross-functional, capital modeling reports by using IBM Cognos®. By providing a one stop shop for operational risk management and measurement, OpenPages Operational Risk Capital Modeling application allows you to accurately measure and mitigate your operational risk.
Key feature include:
- Integration with OpenPages Operational Risk Management module
- Monte Carlo simulation engine to calculate capital at multiple confidence interval levels
- Simulation of distributions for internal loss data, external loss data and scenario data by using IBM SPSS® Statistics
- Enhanced loss data analysis
- Numerous frequency and severity distribution choices
- Copula-based correlation
- Fully integrated curve fitting tool
- Audit trail
- Cross functional reporting
Question 10. Explain Openpages Regulatory Compliance Management?
OpenPages Regulatory Compliance Management : OpenPages Regulatory Compliance Management enables organizations to break down regulations into requirements, evaluate its impact to the business, and create actionable tasks.
Key features include the ability to:
- Define regulatory scope.
- Create a library of regulatory areas that impact the organization.
- Benchmark client controls against regulatory requirements.
- Enable users to evaluate controls based on operating and design effectiveness.
- Focus on critical regulatory compliance issues and assess impact of new regulations through visualization.
Question 11. Explain About Openpages Model Risk Governance?
OpenPages Model Risk Governance : OpenPages Model Risk Governance helps banks and financial institutions address this risk that arises from the inaccuracy or misuse of models. Featuring dynamic dashboards for clear, concise reporting, this customizable platform enables firms to create and maintain a comprehensive model inventory for enhanced collaboration and regulatory compliance across multiple regions and geographies.
Enabling organizations to demonstrate strong controls throughout the model lifecycle, IBM Enterprise Model Risk Governance provides management with the reporting, tools and decision support necessary to help ensure model data quality, regulatory compliance and overall financial risk governance.
Key features include the ability to:
- Support model risk regulatory compliance.
- Create and maintain a comprehensive model inventory.
- Help document and track issues and metrics associated with models.
- Provide dynamic dashboards for reporting on model inventory management.
- Assign appropriate roles and responsibilities for model ownership.
- Enhance overall financial risk governance.
Question 12. Define Trigger?
A trigger is a piece of code that can be added before or after the execution of an operation is performed on the OpenPages platform. This piece of code can perform anything that is written in Java.
A trigger consists of the following two parts:
A rule – this is a condition that applies to the operation being executed and the parameters involved in the operation. For example,
- The operation being executed
- Type of object
- Condition on a property of the object(s) in context
One or more event handlers – an event handler is executed if the current operation satisfies the rule defined for the trigger. These actions can perform any business logic. For example,
- Throw a validation error.
- Create a new object.
- Delete an existing object.
- Reset or modify properties of an object.
- Modify properties of a related object.
- Execute a report or program.
- Kick off a workflow.
Question 13. What Are The Characteristics Of A Trigger?
Triggers have the following characteristics:
- Are only available for specific platform operations.
- Triggers must be written in Java.
- Can invoke any program or module that can be called from Java.
- Can be used with all functionality that is supported by the OpenPages GRC Platform API.
- Have access to the current user’s OpenPages session.
- Are executed within the existing transaction boundary of the original operation.
- Can be configured to execute before or after the original operation execution.
- When a user performs an operation that may have triggers, the framework determines which triggers are applicable and invokes them.
Question 14. Explain About Business Process Visualizations?
By visualizing the business process, which can include the subproceses, activites, risks, and controls, you can sped the risk management proces and data analysis.Some of the visualizations that you can ad to your proceses are Busines Entiy Organization charts and proces diagrams.
The busines proces visualizations provide users with the folowing benefits:
- Users can go from the proces flow to the details page of the GRC object or
- to the Activity View in OpenPages GRC Platform.
- Data is displayed graphicaly for easier interpretation and analysis.
- To understand the context in which models are shown, suporting information is provided.
Question 15. By Using Visualizations,what Goals Can Users Can Achieve?
By using visualizations, users can achieve the folowing goals:
- Proactively ases risks that afect he organization.
- Analyze materialized risks, such as loses or violations.
- Identify and track actions in response to risks.
- Identify problems or trouble areas.
- Conduct a risk and control self-asesment o identify mising risks.
- Determine whether the organization has the necesary controls on the risks, and evaluate those controls.
- Capture changes to laws and regulations, and provide visibilty into policies, incidences, and isues, and ultimately provide the status of regulatory compliance.
- Report on the data.
Question 16. What Are The Types Of Visualizations?
Built-in visualizations are provided as a starting point for designing new process diagrams or viewing the organizational chart for a Business Entity.
By default, the following visualization templates are installed on all IBM® OpenPages® GRC Platform systems:
- Business Process Flow visualization
- Business Entity Organizational Charts
Business process flow visualization :
Risk professionals can use the process flow visualization to make sure that the documented flow accurately reflects the business process and its sub-processes, data inputs and outputs, risks and controls. Users can also update in real time to reflect any changes.
A process flow visualization is a child object of the Process. You can use the following major elements to build your process flow diagram.
Process Object : Process object types represent the major end-to-end business activities within a business entity that are subject to risk. Process objects are typically used in areas such as financial reporting, compliance, and information security. Depending on the diagram, the process object is not explicitly shown; however, it exists to provide context.
Subprocesses (or Activities) : A Subprocess object type is a component of a Process object. It is used to break down processes into smaller granular units for assessment purposes.
Risks : Risk object types represent potential liabilities. Risk objects can be associated with, for example, business processes, business entities, or compliance with a particular mandate. Each Risk object has one or more Control objects that are associated with it that provide safeguards against the risk and help mitigate any consequences that might result from the risk.
The process flow is visually optimal when risks for each process are fewer than five.
Controls : Control object types typically represent policies and procedures to help ensure that risk mitigation responses are carried out. After you identify the risks in your practices, you can then establish controls (such as approvals, authorizations, and verifications) that remove, limit, or transfer these potential risks.
A process flow is visually optimal when you have one to two Controls per Risk.
Data Input and Data Output objects : Data Input objects and Data Output objects are child objects of the Process and can have associations only to existing Risks. They represent elements of a flow to depict an Input into the Business Flow or an Output from various activities within a process, such as running a report or updating a CRM system or getting an external data source feed.
The flow of the process is represented by connectors that link the activities, inputs and outputs, and decision-branching points. You can specify labels for the decision connections.
All elements and relationships of the Business Process visualizations are stored as data in the OpenPages GRC Platform repository on the OpenPages GRC Platform server. The element types are shown or hidden in the Application Object Views that are based on Profiles. You can have multiple diagrams per process. For example, some diagrams can be at different stages of the process, such as those diagrams that are published or are being revised or approved.
Business Entity organization charts :
The Hierarchy diagram provides contextual and aggregate views of the Business Entity data model. The organizational structure of a company is captured as Business Entity objects in the OpenPages GRC Platform GRC repository, which can be visualized as an organizational chart.
This type of structure is useful for infrequent users who must understand the complex model quickly and who have business entities with risk assessments. Color codes indicate the status that is based on aggregation.
Question 17. Explain About Users, Groups, And Domains?
Users and groups are organized under the following top-level groups:
Entity Group icon Security Domains – this group is a container for the security domain groups that are automatically created by the system when a business entity or sub-entity is added. You can use security domains to distribute your users and organizational groups so they can be administered by delegated administrators. For an overview of security domains, see Security domains.
Group icon Workflow, Reporting and Others – this group is a container for organizational groups that are used system-wide. Administrators often create organizational groups to organize users and other groups. You can define all your users and groups under the Workflow, Reporting and Others group, and later associate them to different security domains. For upgrade customers, this top-level group also includes the groups that existed in prior releases of OpenPages GRC Platform.
To create and administer users and groups, you must have administrative privileges. For information about delegating and assigning administrator permissions, see The Super Administrator.
When a user or group is disassociated from an organizational or security domain group, and that user or group is not a direct or indirect member of any other group, the system makes that user or group a member of a special group called Standalone Users and Groups. Only the Super Administrator has administrative access to this group.
- Accessing users, groups, and domains
- Rules for user names and passwords
- The Super Administrator
- Delegate administrator permissions
- Creating user accounts
- Associating users with a group
- Disassociating users from a group
- Modifying user accounts
- Disabling and enabling user accounts
- Creating an organizational group
- Associating and disassociating a group
- Defining application permissions
- Group application permissions
- Application permissions
- Application permissions not contained under the SOX heading
- Configure password requirements
Question 18. How To Enable And Disable System Administration Mode?
Enabling and disabling System Administration Mode : You must have the System Administration Mode application permission set on your account to view the System Administration Mode link and the System Administration Mode menu item from the Administration menu.
Settings for System Administration Mode :
If Link… If icon… Use to…
Enabled Enable enter System Administration Mode
Disabled Disable exit and terminate System Administration Mode
- The link switches between Enabled and Disabled, and the icon switches between Enable and Disable depending on which mode it is in.
- If the system is processing operations that require System Administration Mode, you will have to wait until processing is complete before you can disable System Admin Mode.
Log on to the IBM->OpenPages->GRC Platform user interface as a user with the System Administration Mode permissions.
Do one of the following:
- Click the System Administration Mode Enabled or Disabled link.
- From the menu bar, select Administration and click System Administration Mode and click Enable or Disable.
Question 19. What Are The Rules For User Names And Passwords?
- When you create user names and passwords, certain rules apply.
- User names are case sensitive. For example, MyName and myname would be two unique users.
- User names can be up to 256 characters.
- User names can contain alphanumeric characters and any of the following special characters:
@ – ! . _ / : * ” # % ? < >
- Passwords can contain up to 32 characters.
- Passwords cannot contain spaces.
Question 20. Explain About The Super Administrator?
The Super Administrator (specified during the install or upgrade process) is a user who has complete access to all objects, folders, Role Templates, and groups in the system.
In a new installation, the Super Administrator is the only user in the system. In an upgrade installation, you can enter a new user or select one of the existing users (such as SOXAdministrator or OpenPagesAdministrator) as a Super Administrator during the upgrade process.
A Super Administrator can create users, groups, other system administrators, and assign roles. A Super Administrator can decentralize and delegate administration activities by assigning roles to users through the use of Role Templates (for more information see Role templates) and group administrator permissions (for more information, see Delegate administrator permissions).
A Super Administrator can also assign an administrator to a security domain or organizational group without making the administrator a member of that group.
Some examples of the types of administrators a Super Administrator could create are:
A Regional or Group Administrator – this would be a user with at least one security management permission assigned to perform administrative activities for a security domain or organizational group.
A Delegated Administrator – this would be a group administrator with certain security management permissions who could, in turn, assign new administrators to the same group or to any of the child groups, granting them the same security management permissions.
Decentralized Administrators – each group (security domain or organizational) could have an administrator who would have one or more administrators responsible for creating and associating users to that group as well as for enable/disable, lock/unlock, assign roles and reset password operations. A decentralized administrator would be able to perform these operations on all child groups associated to their group but not on other groups in the system.
If you change the logon user name and/or password of the Super Administrator account after installation (using the application interface), you must manually make corresponding changes to the Cognos Framework Generator property file so the reporting framework will update properly.
Question 21. Explain Delegate Administrator Permissions?
Delegate administrator permissions : By assigning specific security management permissions to an administrator’s user account, you can delegate various security management activities to that administrator. For example, you could set up an administrator for a security domain group (such as a regional or local office) who would only have the ability to reset passwords for that group.
If there are child groups under a parent group, the administrator can delegate an administrator for each child group as well.
Administrators do not have to be members of groups for which they perform administrative tasks. By default, only the Super Administrator has Read and Write access to objects in the system. Delegating administration responsibilities to a user on a security domain, does not automatically grant Read and Write access to objects under the corresponding entity.
You can only assign those permissions that you have to other administrators.
If you disassociate an administrator from a security domain or organizational group, all user management privileges (such as manage users, lock/unlock users, reset passwords, enable/disable users, assign roles) are retained by that administrator and are not revoked.
You want to designate Mary Smith as an administrator who can reset passwords for any users in the Boston Sales Office. You would navigate to the Boston Sales Office entity group detail page and assign the Reset Password permission to Mary Smith’s user account.
If there are multiple child groups under the Boston Sales Office entity group, Mary Smith could delegate an administrator for each child group. She would only be able to assign the Reset Password permission to another administrator.
Question 22. How To Create User Account?
Creating user accounts : When creating a new user in IBM® OpenPages® GRC Platform, you must first select the group to which the user will belong. Then, enter information about the user and user account.
If you have not created an appropriate group for the new user, you can add the user to the top-level Security Domains group or Workflow, Reporting and Others group. In addition, you can create an “Everyone” or “All_Users” group under the top-level Workflow, Reporting and Others group and add all the users to this group. At a later time, you can then associate these users to the required security domains. In this way, there is one group that lists all users. See Creating an organizational group for details.
If a user is responsible for adding, editing, or removing folder-based access control (ACLs) using the Custom Security menu option on the Administration menu, the user should be associated with a group that has Access Control Lists application permission.
- Select Administration from the menu and click Users, Groups and Domains.
- Expand the list of groups and click the name of the group to display the detail page.
- On the Users tab, click Add New.
- Enter the necessary information for the new user account. It is best practice to include the first name and surname when you create a user.
- To assign a profile to the user, select the profile value from the Profile field.
- Select the Password never expires password behavior. If you select a different option, an Admin user must change the password when it expires.
- Click Create.
What to do next :
- If the new user account was created under an “Everyone” or “All_Users” group, go to Associating users with a group to give the user access to a business entity.
- If the new user account was created under a security domain group that corresponds to a particular business entity, go to Assigning a role to a user or group to assign the user access control permissions.
Question 23. How To Associate Users With A Group?
Associating users with a group : If a new user only belongs to an “Everyone” or “All_Users” group, you need to give the user access to the appropriate business entity or entities.
You do this by associating users to the security domain group that corresponds to the business entity for which they need access. For information about security domains, see Security domains.
- Select the Administration menu and click Users, Groups and Domains.
- Navigate to the group to which you want to associate an existing user.
- From the list of groups, click the name of the group you want.
- On the detail page of the selected group, on the Users tab, click the Associate icon.
- On the Associate Users with Group page, select the check box next to each user account you want to associate, and click Associate.
- To assign access control permissions to a user, see Assigning a role to a user or group.
Question 24. What Are The Requirements To Configure Password
IBM® OpenPages® GRC Platform supports the use of strong passwords (passwords that include letters, numbers, and symbols).
It also allows administrators to enforce mandatory password changes and other password behavior.
Configuring password policies : The IBM OpenPages GRC Platform allows administrators who can access the Settings administrative section to modify the password policies for the application.
Configuring password encryption : You can modify the encryption algorithm, and change the key that is used by the encryption algorithm to encrypt passwords in IBM OpenPages GRC Platform.
Modify password encryption : To modify password encryption, you use the Update Password Encryption Algorithm (UPEA) tool.
Using the UPEA tool : The UPEA tool defines the parameters of the password encryption algorithm.
Question 25. How To Create A Organizational Group?
To make it easy to find a specific user without browsing through multiple groups and subgroups, you can create a group named Everyone (you can use other name) as a sub-group of the Workflow, Reporting and Others group.
This is useful since normally you create users in the context of a group, and then add them to multiple groups directly. This means that in order to find an existing user, you need to know a group to which the user belongs. To help this process, follow the following suggestions.
As you create your list of users, add them directly to the Everyone group, as well as to the functional groups that the users need to belong to. In this manner, to find a specific user quickly, you can open the Everyone group and select the user directly.
If you want to deny a user access to the application by removing him or her from all groups, you need to remove the user from the Everyone group as well.
Users with the correct permissions can create groups using the User/Group interface. Groups can contain other groups and users, and inherit application permissions from the groups that they belong to.
- Select the Administration menu and click Users, Groups and Domains.
- Expand the list and click the name of the group to which the new group will belong. If there is no higher-level group for the new group, select the root Security Domains or Workflow, Reporting and Others group.
- On the detail page of the selected group, navigate to the Groups tab and click Add New.
- Fill in the required information for the new group and click Create. The parent group’s detail page is displayed with the new group listed in the Sub-Groups section.
- Click the name of the new group to view the detail page if you want to add users to the group or modify the group permissions.
IBM – RPG Interview Questions
IBM – RPG Tutorial
IBM DB2 Interview Questions
IBM DB2 Tutorial
IBM Mainframe Interview Questions
IBM WAS Administration Interview Questions
IBM Mainframe Tutorial
IBM Lotus Domino Interview Questions
IBM – RPG Interview Questions
IBM Cloud Computing Infrastructure Architect V1 Interview Questions
IBM AIX 7 Administration Interview Questions
IBM DB2 Interview Questions
IBM Websphere Application Server Interview Questions
IBM Tivoli Interview Questions
IBM Mainframe Interview Questions