Configurable Security Maintenance Flashcards
True or False? You can change which delivered items are in a given domain.
False
True or False? You can only send a business process approval step to security groups permitted for approvals in the business process security policy.
True
True or False? If there are three delivered reports in a given domain, you can configure access so that a security group can only access one of the reports.
False
If a domain contains six delivered reports and four tasks, which of the following is true? (Select two correct answers.)
A. Security groups with View only permissions can only access the six delivered reports.
B. Security groups with View only permissions can access all 10 items, but cannot modify data using the tasks.
C. Security groups with Modify permissions can only access the four tasks.
D. Security groups with Modify permissions can access all 10 items.
A. Security groups with View only permissions can only access the six delivered reports.
D. Security groups with Modify permissions can access all 10 items.
True or False? Workday determines the tasks that employees can perform “as self” and they cannot be changed.
False
True or False? A Security Administrator can manually remove all security groups from a user’s Workday account.
False
True or False? When you change the membership in security groups, you must run the Activate Pending Security Policy Changes task.
False
The Activate Previous Security Timestamp task initiates which type of change?
A. Security group membership reverts to a prior point in time.
B. Security group definitions revert to a prior point in time.
C. Security policy permissions revert to a prior point in time.
D. All security-related changes (membership, definitions, permissions) revert to a prior point in time.
C. Security policy permissions revert to a prior point in time.
True or False? If a worker changes jobs, their user-based security group assignments will remain on their account unless manually removed.
True
If you want to remove someone as a member of a role-based security group, you must:
A. Manually remove them from the role-based security group.
B. Manually remove them from the role-based security group and activate pending security policy changes.
C. Remove the role assignment for the assignable role used in the role-based security group.
D. Remove the role assignment for the assignable role used in the role-based security group and activate pending security policy changes.
C. Remove the role assignment for the assignable role used in the role-based security group.
True or False? The type of security group you use not only determines the members, but also their target constraints.
True
True or False? User-based security groups are assigned at the Workday account level and follow the user.
True
When should you use constrained proxy?
A. To share responsibility for tasks and reports
B. To temporarily assign initiating tasks and Inbox items
C. To permanently remove responsibility for a task from a user and assign it to another
D. To allow certain users to act as others for testing purposes
A. To share responsibility for tasks and reports
True or False? Before inactivating an organization, you must move all workers and positions out of the organization.
True
Which option for configuring constrained role-based security groups is typically used in business process steps?
A. Current Organization Only (COO)
B. Current Organization and Unassigned Subordinates (COUS)
C. Current Organization and All Subordinates (COAS)
D. Current Organization and Subordinates to Level
Configurable
B. Current Organization and Unassigned Subordinates (COUS)