Which three of the following are true of the oracle BI Security Capabilities?
A.
Authentication in Oracle BI is the process by which the oracle BI Server verifies that a user indeed the right person who has the right to log in
B.
Access to repository objects and some web catalog objects can be controlled but data that appear in dashboards and reports cannot be controlled
C.
You can bypass Oracle BI Security by setting AUTHENTICATION_TYPE in the NQSConfig.ini to BYPASS_NQS
D.
Administrators cannot set a limit on the time it takes the system to execute a query
E.
Administrator can control when users will be able to query the database by disabling query functionality.