Administration Flashcards

1
Q

What two functions does authentication perform?

A
  1. Establishes that a user is authentic based on a valid username and password.
  2. Verifies that the user’s account is enabled.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which organization structure element (organization unit, position, job, or user) is used to determine who a caseworker reports to?

A

Position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are rate tables used for?

A

Rate tables store values that can vary over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: You can clone an organization structure.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many organization structures can be active at one time? How many root units are allowed in an organization structure?

A

One, One.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Administration component is used to record payment exclusion dates? List the five types of this component

A

Financial processing calendar.

Cash, check, EFT, voucher, and invoice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: In the Cúram data model, Jobs are directly linked to Users.

A

False (Jobs are directly linked to positions, not users.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sensitivity security is applied to which four areas?

A

Work queues, participants, users, and notes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Locations represent the workplaces of the agency’s clients

A

False (They represent the workplaces of the users, not clients.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What must you do to ensure that new code table items appear in their drop-down lists?

A

Publish the changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

List the two types of communication templates

A

Extensible Style Language (XSL), Microsoft Word.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

List two resource types that can be assigned a security identifier (SID).

A

A security identifier (SID) represents a protected resource. Every secured element in Cúram is given a unique SID.

SIDs can be assigned to business processes, specific fields on a screen, organization units, locations, case audits, and products that are offered by the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Mary and Kevin are caseworkers assigned to different locations within the organization.
When Mary performs a search for one of Kevin’s clients, she can see that the client is
registered in the system, but she cannot see the client’s address, date of birth, or any
other information about the client. In this scenario, what is the Location Data Security
setting for the system?

A

Restricted view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are application properties?

A

They are variables that configure the system to suit the organization’s needs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Working Pattern covers how many days?

A

14 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The most common type of SID and what it is used for?

A

The most common type of SID is the functional SID, also known as a function identifier (FID). FIDs are used to secure business processes. An example of a FID is the FID assigned to the Register Person business process

17
Q

What is the hierarchy of SID, Security Roles & Groups and what do they do?

A

Security Role -> Group -> SID
Role: A user has only one security role. A security role might consist of multiple security groups.

Group: A security group is the grouping of security identifiers.

SID: A security identifier (SID) represents a protected resource.