COMPLETE QUESTIONS AND VERIFIED
ANSWERS
◉ How many baseline security groups can you include in a rule-
based security group?
a. 1
b. 2
c. 3
d. 5
e. Unlimited Answer: A. 1
◉ How many rule conditions can you specify on a security rule?
a. 1
b. 2
c. 5
d. Unlimited Answer: C. 5
◉ True or False? Workday limits the options you can select from the
Security Field prompt based on your access rights Answer: True
,◉ When creating an intersection security group, which field would
you configure to hide instances that members would have otherwise
seen?
a. Security Groups to Include
b. Security Groups to Exclude
c. Exclude Target Position in Organization
d. Applies to Current Organization Only Answer: C. Exclude Target
Position in Organization
◉ True or False? You can only intersect role-based constrained
security groups. Answer: False
◉ True or False? You must include at least two security groups in an
intersection security group. Answer: False
◉ When configuring an intersection security group that includes
two role-based security groups, which of the following statements
must be true for a worker to be a member of the intersection
security group?
a. The worker must be assigned to at least one of the roles.
b. The worker must be assigned to both roles
c. The worker must be assigned at the top of the organization
hierarchy.
, d. The worker must be in both organizations. Answer: B. The worker
must be assigned to both roles
◉ True or False? An intersection security group hides workers in a
given organization using target exclusion criteria. If a worker
changes jobs and is no longer in that excluded organization, they will
no longer be hidden. Answer: True
◉ How would you ensure that when a user runs the Trial Balance
report, they only see certain Ledger Account values?
a. Use a role-based constrained security group to constrain them to
assigned ledger accounts.
b. Set up ledger account security segments and grant segment-based
security groups permission to the Access Ledger Account
(Segmented) domain.
c. The Trial Balance report can only be accessed via user-based
unconstrained security groups.
d. You cannot secure access to Ledger Account values. Answer: B. Set
up ledger account security segments and grant segment-based
security groups permission to the Access Ledger Account
(Segmented) domain.
◉ Which domain security policy would give users in a segment-
based security group access to allowed spend category values?
a. Procurement Segmented Setup