WORKDAY PRO EXAM QUESTIONS AND
ANSWERS latest 2024
You want to set up benefit partners to only see and support
workers in a specific location in hierarchies. What security
group type allows you to identify the benefits partners as
members and allow you to constrain their access defined
location hierarchies? - ANSWER>>Role-based constrained
How are user based security groups assigned to a worker? -
ANSWER>>They are assigned based on role assignment
Which security group types use other security groups to
determine membership? - ANSWER>>Role- based
unconstrained and organization membership
What report identifies the security policy securing a given
item such as a given task or delivered report? -
ANSWER>>View security for securable item
In order to access domain
items, what must a user be? - ANSWER>>A member of at
least one security groups permitted in the domain security
policy.
How do workers become members of a role-based security
group? - ANSWER>>Through role assignment
, What happens when you activate pending security policy
changes - ANSWER>>You are activating all pending security
policies in the tenant
What settings for the access rights to organizations allows
members to only access targets in the role assigned
organization, and any subordinate organizations -
ANSWER>>Applies to current organization and unassigned
subordinates
What security configuration requires you to run the activate
pending security policy changes task for it to take affect -
ANSWER>>Editing a business process security policy to
remove a security group feom an approve action
Which of the following are characteristics of the membership
in a user base security group? - ANSWER>>It is manually
assigned and it follows the user
Which report can you use to view the security access of a
user? - ANSWER>>View security groups for user. Security
analysis for worker account.
A user is a member of both a constrained and unconstraned
security group and both security groups have a domain
security policy. What is the users resulting access for the
domain items? - ANSWER>>The user's domain items access
will be constrained.
ANSWERS latest 2024
You want to set up benefit partners to only see and support
workers in a specific location in hierarchies. What security
group type allows you to identify the benefits partners as
members and allow you to constrain their access defined
location hierarchies? - ANSWER>>Role-based constrained
How are user based security groups assigned to a worker? -
ANSWER>>They are assigned based on role assignment
Which security group types use other security groups to
determine membership? - ANSWER>>Role- based
unconstrained and organization membership
What report identifies the security policy securing a given
item such as a given task or delivered report? -
ANSWER>>View security for securable item
In order to access domain
items, what must a user be? - ANSWER>>A member of at
least one security groups permitted in the domain security
policy.
How do workers become members of a role-based security
group? - ANSWER>>Through role assignment
, What happens when you activate pending security policy
changes - ANSWER>>You are activating all pending security
policies in the tenant
What settings for the access rights to organizations allows
members to only access targets in the role assigned
organization, and any subordinate organizations -
ANSWER>>Applies to current organization and unassigned
subordinates
What security configuration requires you to run the activate
pending security policy changes task for it to take affect -
ANSWER>>Editing a business process security policy to
remove a security group feom an approve action
Which of the following are characteristics of the membership
in a user base security group? - ANSWER>>It is manually
assigned and it follows the user
Which report can you use to view the security access of a
user? - ANSWER>>View security groups for user. Security
analysis for worker account.
A user is a member of both a constrained and unconstraned
security group and both security groups have a domain
security policy. What is the users resulting access for the
domain items? - ANSWER>>The user's domain items access
will be constrained.