Integration Security Flashcards

1
Q

What is the most common integration tool used for inbound data loads and simple outbound extracts?

A. Document Transformation
B. EIB
C. Connector
D. Workday Studio

A

B. EIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which integration tool provides vendor-specific packaged integrations to external systems?

A. EIB
B. Workday Studio
C. Document Transformation
D. Connector

A

D. Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Modify permission to which domain allows users to create an integration system?

A. Integration Configure
B. Integration Build
C. Integration Event
D. Integration Security

A

B. Integration Build

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False? Users with View permission to the Integration Event domain can launch an integration.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Running integration reports through the UI requires which type of permission to the Integration Reports domain?

A. View
B. Modify
C. Get
D. Put

A

A. View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False? A segment-based security group can contain multiple segments.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

One selection criterion option for integration system security segments is:

A. EIB
B. Template
C. Packaged integrations
D. Financial integrations

A

B. Template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

For the integration event domain, if a user has modify permission via both a segment-based and a user-based security group, which integrations can they launch?

A. The user will have access to all integrations.
B. The user will have access to the integrations included in the segment.
C. The user will not have access to any integrations.
D. The user will not have access to that task.

A

A. The user will have access to all integrations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two most common data sources for Workday integration systems?

A. Custom Report (RaaS) and Data Initialization Service (DIS)
B. Data Initialization Service (DIS) and WWS
C. Custom Report (RaaS) and WWS
D. Business processes and external files

A

C. Custom Report (RaaS) and WWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of permission will grant access to a web service operation within an integration system?

A. Initiating Action on a business process security policy
B. Get permissions on a domain security policy
C. Put permissions on a domain security policy
D. A, B, and C depending on the web service operation

A

D. A, B, and C depending on the web service operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which integration type allows you to determine additional data points using the Configure Field Overrides > Test Security related action.

A. Inbound EIB
B. Outbound EIB
C. Document Transformation
D. Connector

A

D. Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which type of integration exclusively uses the output of a connector as the data source and does not have unique security requirements?

A. Inbound EIB
B. Outbound EIB
C. Document Transformation
D. Workday Studio

A

C. Document Transformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of integration is rarely scheduled?

A. Connector
B. Inbound EIB
C. Outbound EIB
D. Workday Studio

A

B. Inbound EIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of integration uses the security of the business user running the integration and does not use an ISU?

A. Inbound EIB
B. Outbound EIB
C. Document Transformation
D. Workday Studio

A

A. Inbound EIB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What should developers provide to security administrators configuring integration security?

A
  1. What is the data source? Grant domain access.
  2. Are there other data points? Grant domain access.
  3. Does it use a business process? Grant business process access.
  4. Is there a schedule? Grant Modify access to the Integration Event.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which task is used to configure password expiration exemption for an ISU?

A. Edit Workday Account
B. Maintain Password Rules
C. Maintain Payment Card Industry Password Rules
D. Generate Spreadsheet Template

A

B. Maintain Password Rules

17
Q

What should you do if your auditor will not allow ISUs to keep the same passwords indefinitely?

A. Use the Maintain Password Rules task to configure a password expiration exemption.
B. Use the Edit Workday Account task to disallow UI sessions for the ISUs.
C. Use the Put Integration System User web service to update multiple passwords at once.

A

C. Use the Put Integration System User web service to update multiple passwords at once.