Configurable Security Fundamentals Flashcards
Which report would you use to see which security policy the Print Payslip task is secured to?
A. View Security for Securable Item
B. Security Analysis for Securable Item and Account
C. Domain Security Policies for Functional Area
D. Payment Printing business process security policy
A. View Security for Securable Item
True or false? You can change which delivered items are in a given domain.
False
True or false? You can only send a business process approval step to security groups permitted for approvals in the business process security policy.
True
How can you find which security groups are permitted to initiate a given business process? (e.g., Hire, Accounting Journal Event)
A. Run the Functional Areas report.
B. View the business process definition initiation step.
C. View the business process security policy - Who Can Start section.
D. All users, by default, can initiate a business process.
C. View the business process security policy - Who Can Start section.
True or False? A domain security policy can inherit permissions from a parent domain or override parent permissions and have its own permissions.
True
True or false? If there are three delivered reports in a given domain, you can configure access so that a security group can only access one of the three reports.
False
Which report would you use to see a hierarchical view of all the domains in a given functional area?
A. Functional Areas
B. Maintain Functional Areas
C. Domain Security Policies for Functional Area
D. Business Process Security Policies for Functional Area
C. Domain Security Policies for Functional Area
Which security groups are Workday-owned (i.e., Workday-assigned)? (Select two correct answers.)
A. HR Administrator
B. IT Workers
C. Employee As Self
D. All Employees
C. Employee As Self
D. All Employees
True or false? Workday determines the tasks that employees can perform “as self” and they cannot be changed.
False
True or false? A Security Administrator can manually remove all security groups from a user’s Workday account.
False
Which reports can be used to view the security access of a user? (Select two correct answers.)
A. View Security for Securable Item
B. View Security Groups for User
C. Security Analysis for Workday Account
D. Action Summary for Security Group
B. View Security Groups for User
C. Security Analysis for Workday Account
True or false? Workday-assigned security groups like All Users and All Employees typically provide access to public items that should be visible to everyone.
True
True or False? The Activate Pending Security Policy Changes task activates all pending domain or business process policy changes in the tenant since last activation.
True
True or False? When you change the membership in security groups, you must run the Activate Pending Security Policy Changes task.
False
The Activate Previous Security Timestamp task initiates which type of change?
A. Security group membership reverts to a prior point in time.
B. Security group definitions revert to a prior point in time.
C. Security policy permissions revert to a prior point in time.
D. All security related changes (membership, definitions, permissions) revert to a prior point in time.
C. Security policy permissions revert to a prior point in time.