Configurable Security Maintenance Flashcards
True or False?
You can change which delivered items are in a given domain.
Chapter 1
False
True or False?
You can only send a business process approval step to security groups permitted for approvals in the business process security policy.
Chapter 1
True
True or False?
If there are three delivered reports in a given domain, you can configure access so that a security group can only access one of the reports
Chapter 1
False
If a domain contains six delivered reports and four tasks, which of the following is true? (Select two correct answers.)
A. Security groups with View only permissions can only access the six delivered reports. B. Security groups with View only permissions can access all 10 items, but cannot modify data using the tasks. C. Security groups with Modify permissions can only access the four tasks. D. Security groups with Modify permissions can access all 10 items.
Chapter 1
Security groups with View only permissions can only access the six delivered reports.
Security groups with Modify permissions can access all 10 items.
True or False?
Workday determines the tasks that employees can perform “as self” and they cannot be changed.
Chapter 1
False
True or False?
A Security Administrator can manually remove all security groups from a user’s Workday account.
Chapter 1
False
True or False?
When you change the membership in security groups, you must run the Activate Pending Security Policy Changes task.
False
True or False?
When you change the membership in security groups, you must run the Activate Pending Security Policy Changes task.
Chapter 1
False
True or False?
If a worker changes jobs, their user-based security group assignments will remain on their account unless manually removed.
Chapter 1
True
If you want to remove someone as a member of a role-based security group, you must:
A. Manually remove them from the role-based security group. B. Manually remove them from the role-based security group and activate pending security policy changes. C. Remove the role assignment for the assignable role used in the role-based security group. D. Remove the role assignment for the assignable role used in the role-based security group and activate pending security policy changes.
Chapter 1
Remove the role assignment for the assignable role used in the role-based security group.
True or False?
The type of security group you use not only determines the members, but also their target constraints.
Chapter 2
True
True or False?
User-based security groups are assigned at the Workday account level and follow the user
Chapter 2
True
When should you use constrained proxy?
A. To share responsibility for tasks and reports B. To temporarily assign initiating tasks and Inbox items C. To permanently remove responsibility for a task from a user and assign it to another D. To allow certain users to act as others for testing purposes
Chapter 2
To share responsibility for tasks and reports
True or False?
Before inactivating an organization, you must move all workers and positions out of the organization.
Chapter 2
True
Which option for configuring constrained role-based security groups is typically used in business process steps?
A. Current Organization Only (COO) B. Current Organization and Unassigned Subordinates (COUS) C. Current Organization and All Subordinates (COAS) D. Current Organization and Subordinates to Level
Chapter 2
Current Organization and Unassigned Subordinates (COUS)