Configurable Security Fundamentals Flashcards
Which report would you use to see which security policy the Print Pay slip task is secured to?
a. View security for Securable Item b. Security Analysis for Securable Item and Account c. Domain Security Policies for Functional Area d. Payment printing business process security policy
Chapter 1
View security for Securable Item
True or False? You can change which delivered items are in a given domain.
Chapter 1
False
True or False?
You can only send a business process approval step to security groups permitted for approvals in the business process security policy
Chapter 1
True
How can you find which security groups are permitted to initiate a given business process? (e.g., Hire, Account Journal Event)
a. Run the Functional Area Report b. View the business process definition initiation step. c. View the business process security policy - Who Can Start section d. All user, by default, can initiate a business process
Chapter 1
View the business process security policy - Who Can Start section
True or False?
A domain security policy can inherit permissions from a parent domain or override parent permissions and have its own permissions.
Chapter 1
True
True or False?
If there are three delivered reports in a given domain, you can configure access so that a security group can only access one of the three reports.
Chapter 1
False
Which report would you use to see a hierarchical view of all the domain in a given functional area?
a. Functionals Areas b. Maintain Functional Areas c. Domain Security Policies for Functional Area d. Business Process Security Policies for Functional Area
Chapter 1
Domain Security Policies for Functional Area
Which security groups are Workday owned? (Select two correct answers)
a. HR Administrator b. IT Workers c. Employees as Self d. All Employees
Chapter 2
Employees as Self
All Employees
True or False?
Workday determines the tasks that employees can perform “as self” and they cannot be changed.
Chapter 2
False
True or False?
A Security Administrator can manually remove all security groups from a user’s Workday account.
Chapter 2
False
Which reports can be used to view the security access of a user? (Select two correct answers.)
A. View Security for Securable Item
B. View Security Groups for user
C. Security Analysis for Workday Account
D. Action Summary for Security Group
Chapter 2
View Security Groups for user
Security Analysis for Workday Account
True or False?
Automatically-assigned security groups like All Users and All Employees typically provide access to public items that should be visible to everyone.
Chapter 2
True
Ture or False?
The Activate Pending Security Policy Changes task activates all pending domain or business process policy changes in a tenant since last activation.
Chapter 3
True
True or False?
When you change the membership in security groups you must run the Activate Pending Security Policy Changes task.
Chapter 3
False
The activate Previous Security Timestamp task initiates which type of change?
a. Security group membership reverts to a prior point in time b. Security group definitions revert to a prior point in time c. Security policy permissions revert to a prior point in time
Chapter 3
Security policy permissions revert to a prior point in time
Which domain allows users to edit domain and business process security policies?
a. Security Configuration b. Security Activation c. Security Administration d. All Workday Accounts
Chapter 3
Security Configuration