(100% CORRECT ANSWERS) A+ GRADED | ALREADY
PASSED!!
Terms in this set (72)
You want to set up benefit Role-based constrained
partners to only see and
support workers in a specific
location in hierarchies. What
security group type allows you
to identify the benefits
partners as members and
allow you to constrain their
access defined location
hierarchies?
How are user based security They are assigned based on role assignment
groups assigned to a worker?
Which security group types use Role- based unconstrained and organization membership
other security groups to
determine membership?
What report identifies the View security for securable item
security policy securing a given
item such as a given task or
delivered report?
In order to access domain A member of at least one security groups permitted in the domain
items, what must a user be? security policy.
How do workers become Through role assignment
members of a role-based
security group?
What happens when you activate You are activating all pending security policies in the tenant
pending security policy changes
, What settings for the Applies to current organization and unassigned subordinates
access rights to
organizations allows
members to only access
targets in the role assigned
organization, and any subordinate
organizations
What security configuration Editing a business process security policy to remove a security
requires you to run the activate group feom an approve action
pending security policy
changes task for it to take
affect
Which of the following are It is manually assigned and it follows the user
characteristics of the
membership in a user base
security group?
Which report can you use to View security groups for user. Security analysis for worker account.
view the security access of a
user?
A user is a member of both a The user's domain items access will be constrained.
constrained
and unconstraned security group
and both security groups have a
domain security
policy. What is the users
resulting access for the
domain items?
Who can assign roles? The worker HR partner. And role maintainer
How is sensitive data in workday You can sucure access to domain items. You can secure access to
msecured? the business processes in security policy comfigurations.
What does it mean when a Members' target access is limited.
security group is constrained
such as role-based, constrain,
security group?
Employees have access to the add Remove employee as self feom the add certification initiating
certification initiating action for action of the business process security policy.
the manage certifications