Advanced Configurable Security Flashcards

1
Q

True or False? You can create security rules based on any report field in Workday.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many baseline security groups can you include in a rule-based security group?

A. 1
B. 2
C. 3
D. 5
E. Unlimited

A

A. 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How many rule conditions can you specify on a security rule?

A. 1
B. 2
C. 5
D. Unlimited

A

C. 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False? Workday limits the options you can select from the Security Field prompt based on your access rights.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When creating an intersection security group, which field would you configure to hide instances that members would have otherwise seen?

A. Security Groups to Include
B. Security Groups to Exclude
C. Exclude Target Position in Organization
D. Applies to Current Organization Only

A

C. Exclude Target Position in Organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False? You can only intersect role-based constrained security groups.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False? You must include at least two security groups in an intersection security group.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When configuring an intersection security group that includes two role-based security groups, which of the following statements must be true for a worker to be a member of the intersection security group?

A. The worker must be assigned to at least one of the roles.
B. The worker must be assigned to both roles.
C. The worker must be assigned at the top of the organization hierarchy.
D. The worker must be in both organizations.

A

B. The worker must be assigned to both roles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False? An intersection security group hides workers in a given organization using target exclusion criteria. If a worker changes jobs and is no longer in that excluded organization, they will no longer be hidden.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How would you ensure that when a user runs the Trial Balance report, they only see certain Ledger Account values?

A. Use a role-based constrained security group to constrain them to assigned ledger accounts.
B. Set up ledger account security segments and grant segment-based security groups permission to the Access Ledger Account (Segmented) domain.
C. The Trial Balance report can only be accessed via user-based unconstrained security groups.
D. You cannot secure access to Ledger Account values.

A

B. Set up ledger account security segments and grant segment-based security groups permission to the Access Ledger Account (Segmented) domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which domain security policy would give users in a segment-based security group access to allowed spend category values?

A. Procurement Segmented Setup
B. Access Requisition Spend Category (Segmented)
C. Access Procurement Items (Segmented)
D. Requisition Spend Category Segmented Setup

A

B. Access Requisition Spend Category (Segmented)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How would you ensure that a given user only accesses integration events for certain integration systems?

A. Use a constrained integration system security group.
B. Set up integration system security segments and grant segment-based security groups permission to the Integration Events domain.
C. A given user can only see their own integration events when running the integration events report.
D. You cannot configure access to certain integration events.

A

B. Set up integration system security segments and grant segment-based security groups permission to the Integration Events domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False? After adding a security group to an aggregation security group that is already in use, you must activate pending security policy changes before testing.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An aggregation security group contains constrained service center security groups for different regions. If an approval step is routed to the aggregation group, who receives the action step?

A. All members of the aggregation security group.
B. Members in the intersection of included security groups.
C. Members with target access based on the context of the event.
D. No one-service center representatives cannot take actions in business processes.

A

C. Members with target access based on the context of the event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly