Configurable Security Maintenance Flashcards

1
Q

True or False?

You can change which delivered items are in a given domain.

Chapter 1

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False?

You can only send a business process approval step to security groups permitted for approvals in the business process security policy.

Chapter 1

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False?

If there are three delivered reports in a given domain, you can configure access so that a security group can only access one of the reports

Chapter 1

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a domain contains six delivered reports and four tasks, which of the following is true? (Select two correct answers.)

A. Security groups with View only permissions can only access the six delivered reports.
B. Security groups with View only permissions can access all 10 items, but cannot modify data using the tasks.
C. Security groups with Modify permissions can only access the four tasks. 
D. Security groups with Modify permissions can access all 10 items.

Chapter 1

A

Security groups with View only permissions can only access the six delivered reports.

Security groups with Modify permissions can access all 10 items.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False?

Workday determines the tasks that employees can perform “as self” and they cannot be changed.

Chapter 1

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False?

A Security Administrator can manually remove all security groups from a user’s Workday account.

Chapter 1

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False?

When you change the membership in security groups, you must run the Activate Pending Security Policy Changes task.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False?

When you change the membership in security groups, you must run the Activate Pending Security Policy Changes task.

Chapter 1

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False?

If a worker changes jobs, their user-based security group assignments will remain on their account unless manually removed.

Chapter 1

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If you want to remove someone as a member of a role-based security group, you must:

A. Manually remove them from the role-based security group.
B. Manually remove them from the role-based security group and activate pending security policy changes.
C. Remove the role assignment for the assignable role used in the role-based security group.
D. Remove the role assignment for the assignable role used in the role-based security group and activate pending security policy changes.

Chapter 1

A

Remove the role assignment for the assignable role used in the role-based security group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False?

The type of security group you use not only determines the members, but also their target constraints.

Chapter 2

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False?

User-based security groups are assigned at the Workday account level and follow the user

Chapter 2

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When should you use constrained proxy?

A. To share responsibility for tasks and reports 
B. To temporarily assign initiating tasks and Inbox items
C. To permanently remove responsibility for a task from a user and assign it to another
D. To allow certain users to act as others for testing purposes

Chapter 2

A

To share responsibility for tasks and reports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False?

Before inactivating an organization, you must move all workers and positions out of the organization.

Chapter 2

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which option for configuring constrained role-based security groups is typically used in business process steps?

A. Current Organization Only (COO) 
B. Current Organization and Unassigned Subordinates (COUS) 
C. Current Organization and All Subordinates (COAS) 
D. Current Organization and Subordinates to Level

Chapter 2

A

Current Organization and Unassigned Subordinates (COUS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False?

At the end of the preview window, the feature release is delivered to all tenant types on the same date.

Chapter 3

A

True

17
Q

True or False?

Action is never required for weekly Service Updates. Action is only required for Feature Releases.

Chapter 3

A

Flase

18
Q

True or False?

We recommend your team plan and test all new features during the five-week release preview window, including any opt-in features your organization wishes to adopt.

Chapter 3

A

Flase

19
Q

True or False?

When you run the What’s New in Workday report, you only need to look at the System functional area since this will include the cross application-type changes, which security falls under.

Chapter 3

A

False

20
Q

True or False?

With new updates, there may be new security domains introduced. In such cases, you may need to set up and create the security policy and configure the needed permissions.

Chapter 3

A

True

21
Q

Which of these security changes require activation?

A. Adding a worker to a user-based security group. 
B. Adding a security group to a domain or business process security policy. 
C. Changing role assignments. 
D. Changing membership in security groups.

Chapter 4

A

Adding a security group to a domain or business process security policy.

22
Q

True or False?

Only changes that require activation have change control built into Workday.

Chapter 4

A

True

23
Q

True or False?

You can add a comment about who requested the change and why for all built-in change control, including audit trails.

Chapter 4

A

False

24
Q

True or False?

Too little governance may lead to higher risk and too much governance could limit productivity.

Chapter 4

A

True

25
Q

True or False?

With the Request Framework, you can track who asked for the change, why the change was made, and who approved the change, as well as who completed the change and when - all within Workday.

Chapter 4

A

True

26
Q

Which of these models is the most common support team model among Workday customers?

A. Centralized 
B. Decentralized 
C. Shared Services 
D. Hybrid

Chapter 4

A

Centralized

27
Q

Which reports display when running the Workday Standard Reports report?

A. All Workday-delivered reports that you have access to. 
B. All Workday-delivered reports, regardless of access. 
C. All reports in the tenant.

Chapter 5

A

All Workday-delivered reports, regardless of access.

28
Q

True or False?

Multiple data sources can have the same primary business object.

Chapter 5

A

True

29
Q

When creating a custom report, which security domains do you not need access to?

A. The Custom Report Creation security domain. 
B. The security domain for the data source you want to use. 
C. The security domains for the report fields you want to add. 
D. Any unconstrained security group.

Chapter 5

A

Any unconstrained security group.

30
Q

Who is a custom report visible to by default?

A. Only its owner. 
B. Only its owner and to users who have access to manage all custom reports.
C. Only its owner and any users who belong to the same security groups as the report owner.
D. Custom reports are visible to all users by default.

Chapter 5

A

Only its owner and to users who have access to manage all custom reports.

31
Q

True or False?

Granting access to audit trail information can allow a user to see changes to instances for which the user may not have normal view access.

Chapter 6

A

True

32
Q

True or False?

The All Domains report provides a list of data sources that you can use for writing custom reports on your security configurations.

Chapter 6

A

False

33
Q

Which of these is the definition of Authentication?

A. The process of validating someone's identity. 
B. The tasks and data that a user can access in an application. 
C. The functionality that enables users to log in to one third-party web application. 
D. The feature that monitors what a user has done in the tenant.

Chapter 6

A

The process of validating someone’s identity.

34
Q

True or False?

It is best practice to remove the Implementers security group from any domain or business process security policies.

Chapter 6

A

False

35
Q

A user receives the following error message when running a report: “Attempt to run a report where you do not have access to one or more fields referenced in the report’s filter. Fields: Age. Filter.” What is the root cause of this issue?

A. The user does not belong to a security group that has access to a report field used in a filter.
B. The user does not belong to a security group that has access to a report field used as a column.
C. The user has designated a report field from a data source outside of the report as a filter.
D. The report data source is a tenant nonconfigurable domain. 

Chapter 7

A

The user does not belong to a security group that has access to a report field used in a filter.

36
Q

True or False?

The order of rules in a proxy access policy does not matter.

Chapter 7

A

False

37
Q

An HR partner runs an employee report that includes the Citizenship Status field. She can see the Citizenship Status for some employees on the report, but not all. Why is she unable to see this data for some employees? (Select two correct answers.)

A. The Citizenship Status data is missing for these employees. 
B. She has applied a filter to limit the instances returned. 
C. She only has constrained access to the Citizenship Status report field.
    D. The user does not belong to a security group that has access to a report field used as a column

Chapter 7

A

The Citizenship Status data is missing for these employees.

She only has constrained access to the Citizenship Status report field.

38
Q

A user has permissions to a business process step, but does not see some of the aspects she would expect to see. What is the likely reason?

A. Incorrect role assignment, missing role assignment, or incorrect membership in an unconstrained security group
B. Missing domain security 
C. Disabled account 
D. Missing role in the approval process

Chapter 7

A

Missing domain security

39
Q

A business process task has not been approved after some time. The initiating worker noticed that the approval step appears to be unassigned. What are the likely causes? (Select two correct answers.)

A. Disabled account
B. User delegated the task to another user to perform individual actions and initiate business processes on their 
         behalf for a set period.
C. The proxy access policy order is wrong 
D. Missing/unassigned role in the approval process

Chapter 7

A

Disabled account

Missing/unassigned role in the approval process