Integration Security Flashcards
What is the most common Integration tool used for inbound data loads and simple outbound extracts?
A. Document Transformation
B. EIB
C. Connector
D. Workday Studio
EIB
Which integration tool provides vendor-specific packaged integrations to external systems?
A. EIB
B. Workday Studio
C. Document Transformation
D. Connector
Chapter 1
Connector
True or False?
Get permissions to a domain also grant Put access.
Chapter 1
False
Modify permission to which domain allows users to create an integration system?
A. Integration Configure B. Integration Build C. Integration Event D. Integration Security
Chapter 1
Integration Build
True or False?
Users with View permission to the Integration Event domain can launch an integration.
Chapter 1
False
Running integration reports through the UI requires which type of permission to the Integration Reports domain?
A. View B. Modify C. Get D. Put
Chapter 1
View
True or False?
A segment-based security group can contain multiple segments.
Chapter 2
True
One selection criterion option for integration system security segments is:
A. EIB B. Template C. Packaged integrations D. Financial integrations
Chapter 2
Template
For the integration event domain, if a user has modify permission via both a segment-based and a user-based security group, which integrations can they launch?
A. All integrations B. The integrations included in the segment C. No integrations D. The user will not have access to that task.
Chapter 2
All Integrations
One benefit of the integration system user model is:
A. Preventing missing data by providing the integration with more permissions than required. B. Using security of the business user launching the integration. C. Limiting the integration's access to only the required security policies.
Chapter 3
Limiting the integration’s access to only the required security policies.
Where should an ISU be assigned?
A. On the integration system B. On the integration system security group C. On the integration system and integration system security group D. On the segment-based security group
Chapter 3
On the integration system and integration system security group
True or False?
An integration can be both initiated by and ran as an ISU.
Chapter 3
True
Which report or task is used to transfer ownership of an integration schedule?
A. Transfer Integration Schedule Ownership task B. Launch / Schedule Integration task C. Integrations Events reports D. Scheduled Future Processes report
Chapter 3
Scheduled Future Processes report
What access is required for an ISU to own an integration schedule?
A. Access to Launch / Schedule Integration task B. Access to the Scheduled Future Processes report C. Permission to initiate the Integration Process Event business process
Chapter 3
Access to Launch / Schedule Integration task
What are the two most common data sources for Workday integration systems?
A. Custom Report (RaaS) and Data Initialization Service (DIS) B. Data Initialization Service (DIS) and WWS C. Custom Report (RaaS) and WWS D. Business processes and external files
Chapter 4
Custom Report (RaaS) and WWS
Which type of permission will grant access to a web service operation within an integration system?
A. Initiating Action on a business process security policy B. Get on a domain security policy C. Put on a domain security policy D. A, B, and C depending on the web service operation
Chapter 4
A, B, and C depending on the web service operation
For each item below, state whether it is needed for an ISU to own a custom report, a business user to run it, or both.
A. Modify access for custom report creation B. View access to report data source and all fields C. Be an authorized user or group
Chapter 4
A. An ISU to own
B. Both
C. Business user to run
Which integration type allows you to determine additional data points using the Configure Field Overrides > Test Security related action.
A. Inbound EIB B. Outbound EIB C. Document Transformation D. Connector
Chapter 5
Connector
Which type of integration exclusively uses the output of a connector as the data source and does not have unique security requirements?
A. Inbound EIB B. Outbound EIB C. Document Transformation D. Workday Studio
Chapter 5
Document Transformation
Which type of integration is not scheduled?
A. Connector B. Inbound EIB C. Outbound EIB D. Workday Studio
Chapter 5
Inbound EIB
Which type of integration uses the security of the business user running the integration and does not use an ISU?
A. Inbound EIB B. Outbound EIB C. Document Transformation D. Workday Studio
Chapter 5
Inbound EIB
What should developers provide to security administrators configuring integration security?
A list of requirements:
Web services called
All fields and other data points
Business process
Which task is used to configure password expiration exemption for an ISU?
A. Edit Workday Account B. Maintain Password Rules C. Maintain Payment Card Industry Password Rules D. Generate Spreadsheet Template
Chapter 6
Maintain Password Rules
What should you do if your auditor will not allow ISUs to keep the same passwords indefinitely?
A. Use the Maintain Password Rules task to configure a password expiration exemption. B. Use the Edit Workday Account task to disallow UI sessions for the ISUs. C. Use the Put Integration System User web service to update multiple passwords at once
Use the Put Integration System User web service to update multiple passwords at once