Integration Security Flashcards

1
Q

What is the most common integration tool, used for inbound data loads and simple outbound extracts?

A

EIB - Enterprise Interface Builder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which integration tool provides vendor-specific packaged integrations to external systems?

A

Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Does Get permissions to a domain also grant Put access?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Modify permission to which domain allows users to create an integration system?

A

Integration Build

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Can Users with View permission to the integration Event domain launch an integration?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Running integration reports through the UI requires which type of permission to the Integration Reports domain?

A

View

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A segment-based security group can contain multiple segments?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One selection criterion option for integration system security segments is:

A

Template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is one benefit of the integration system user model?

A

Limiting the integration’s access to only the required security policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where should an ISU be assigned?

A

On the integration system and integration system security group (ISSG).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An integration can be both initiated by and ran as an ISU.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which report or task is used to transfer ownership of an integration schedule?

A

Scheduled Future Processes Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What access is required for an ISU to own an integration schedule?

A

Access to the “Launch / Schedule integration task”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two most common data sources for Workday integration systems?

A

WWS and Custom Report (RaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which integration type allows you to determine additional data points using the Configure Field Overrides > Test Security related actions.

A

Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of integration exclusively uses the output of a connector as the data source and does not have unique security requirements?

A

Document Transformation

17
Q

Which type of integration is not scheduled?

A

Inbound EIB (Enterprise Interface Builder)

18
Q

Which type of integration uses the security of the business user running the integration and does not use an ISU?

A

Inbound EIB

19
Q

What should developers provide to security administrators configuring integration security?

A

A list of web service calls and fields used.

20
Q

Which task is used to configure password expiration exemption for an ISU?

A

Maintain Password Rules

21
Q

What should you do if your auditor will not allow ISUs to keep the same passwords indefinitely?

A

Use the Put Integration System User web service to update multiple passwords at once

22
Q

Which permission is needed to launch an integration system using web services?

A

Get and Put for “Integration Event”

23
Q

The Signons and Attempted Signons report displays login attempts via web service for a user that does not have the correct permissions.

A

False

24
Q

A service center should be created for which scenarios?

A

An external agency needs to manage benefits integrations via the UI.

25
Q

Integration Report: Integration Template Catalog

A

Report used to list the templates available in the tenant. Each template can be used to create an integration system.

26
Q

Integration Report: View Integration System

A

Use this report to view the configuration of an integration system, including it’s Workday Account.

27
Q

Integration Report: Integration Events

A

Use this report to monitor and review the result of integrations events. Click the link in the integration Event column to view the background process. This page shows the details of the event, including who initiated the event and who the integration ran as.

28
Q

Integration Report: Scheduled Future Processes

A

After scheduling an integration, use this report to view the details of scheduled integrations, including the run frequency, start and end date, and who owns the schedule.

29
Q

Security: Security Analysis for Action?

A

Use to see which security group provides a specific user access to a specific task.

30
Q

Security: View Security for Securable Item

A

Use to determine which domain a specific item is in.

31
Q

Security: Domain Security Policies for Functional Area

A

Use to view all the domains in a functional area.

32
Q

Security: Secured Items in Multiple Domains

A

Use this report to see which items are secured to more than one domain.

33
Q

Security: Business Process Security Policies for Functional Area

A

Displays the business process’ available actions and the security groups permitted for each.