Unit 2- Lesson 5- IBM curam SPM administration-done Flashcards

1
Q

What is Curam administration

A

Curam administation allows you to manage and define all areas of the curam application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is security administration divided into

A

Autentication- ensures that only valid users can access the application by requiring them to provide a valid user name and password
Authorization- secures the application once a valid user is successfully logged in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a security identifier

A

A security identifier (SID) represents a protected resource. Every secured element in Cúram is given a unique SID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a security group?

A

A security group is the grouping of security identifiers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a security role

A

A user has only one security role. A security role might consist of multiple security groups, which specify the SIDs that a user can access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a location

A

Locations are the workplaces of the users. all locations have an address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is sensitivity security

A

curam enables you to assign a sensitivity level to certain objects for example participants, user. The range from 1-5,5 being the highest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are user skills

A

Each member of an organisation has a set of skills and competencies that can be graded according to experience and performance e.g. counseling, computing, language skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the reporting hierarchy?

A

The reporting hierarchy is the chain of command tat determines the supervisors in the organisation structure and the users that report to them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are batch processes

A

Batch processes are executable files or mini-programs that process many records according to set parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which organisation structure element (organisation unit, position, job and user) is used to determine who a person reports to?

A

Position

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are rate tables used for?

A

To store values that change over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or false: you can clone an organisation structure

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many organisation structures can be active at one time? How many root units are allowed in an organisation structure

A

One, one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What administration component is used to record payment exclusion date? List the five types of this component

A

Answer- organisation calendar

Banks, Bank accounts, exchange rates, financial processing calendar and insurance return periods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or false: in the curam data model, jobs are directly linked to users?

A

false

17
Q

Sensitivity security is applied to which four areas

A

Users, participants, notes and work queues

18
Q

True or false: locations represent the workplaces of the agencys clients

A

false

19
Q

What must you be sure to do in order to see or use change made to code table values

A

Publish the changes made to the code table

20
Q

List the two types of communication templates

A

Extensible style language (XSL) and microsoft word

21
Q

List two resources types that can be assigned a security identifier

A

Business processes and organisation units

22
Q

Mary and Kevin are caseworkers assigned to different locations within the organisation. When mary performs a search for one of kevins clients she can see that the client is registered in the system but she cannot see the clients address date of birth or any other information about the client. In this scenario what is the location data security setting for the system

A

Restricted view

23
Q

What are application properties

A

Application properties are variables used to configure the system to suit the organisation’s needs