Advanced Configurable Security Flashcards
True or False? You can create security rules based on any report field in Workday.
False
How many baseline security groups can you include in a rule-based security group?
A. 1
B. 2
C. 3
D. 5
E. Unlimited
A. 1
How many rule conditions can you specify on a security rule?
A. 1
B. 2
C. 5
D. Unlimited
C. 5
True or False? Workday limits the options you can select from the Security Field prompt based on your access rights.
True
When creating an intersection security group, which field would you configure to hide instances that members would have otherwise seen?
A. Security Groups to Include
B. Security Groups to Exclude
C. Exclude Target Position in Organization
D. Applies to Current Organization Only
C. Exclude Target Position in Organization
True or False? You can only intersect role-based constrained security groups.
False
True or False? You must include at least two security groups in an intersection security group.
False
When configuring an intersection security group that includes two role-based security groups, which of the following statements must be true for a worker to be a member of the intersection security group?
A. The worker must be assigned to at least one of the roles.
B. The worker must be assigned to both roles.
C. The worker must be assigned at the top of the organization hierarchy.
D. The worker must be in both organizations.
B. The worker must be assigned to both roles.
True or False? An intersection security group hides workers in a given organization using target exclusion criteria. If a worker changes jobs and is no longer in that excluded organization, they will no longer be hidden.
True
How would you ensure that when a user runs the Trial Balance report, they only see certain Ledger Account values?
A. Use a role-based constrained security group to constrain them to assigned ledger accounts.
B. Set up ledger account security segments and grant segment-based security groups permission to the Access Ledger Account (Segmented) domain.
C. The Trial Balance report can only be accessed via user-based unconstrained security groups.
D. You cannot secure access to Ledger Account values.
B. Set up ledger account security segments and grant segment-based security groups permission to the Access Ledger Account (Segmented) domain.
Which domain security policy would give users in a segment-based security group access to allowed spend category values?
A. Procurement Segmented Setup
B. Access Requisition Spend Category (Segmented)
C. Access Procurement Items (Segmented)
D. Requisition Spend Category Segmented Setup
B. Access Requisition Spend Category (Segmented)
How would you ensure that a given user only accesses integration events for certain integration systems?
A. Use a constrained integration system security group.
B. Set up integration system security segments and grant segment-based security groups permission to the Integration Events domain.
C. A given user can only see their own integration events when running the integration events report.
D. You cannot configure access to certain integration events.
B. Set up integration system security segments and grant segment-based security groups permission to the Integration Events domain.
True or False? After adding a security group to an aggregation security group that is already in use, you must activate pending security policy changes before testing.
False
An aggregation security group contains constrained service center security groups for different regions. If an approval step is routed to the aggregation group, who receives the action step?
A. All members of the aggregation security group.
B. Members in the intersection of included security groups.
C. Members with target access based on the context of the event.
D. No one-service center representatives cannot take actions in business processes.
C. Members with target access based on the context of the event.