Answers 100% Correct
You want to set up benefit partners to only see and support workers in a
specific location in hierarchies. What security group type allows you to
identify the benefits partners as members and allow you to constrain their
access defined location hierarchies? - ANSWER-Role-based constrained
How are user based security groups assigned to a worker? - ANSWER-They
are assigned based on role assignment
Which security group types use other security groups to determine
membership? - ANSWER-Role- based unconstrained and organization
membership
What report identifies the security policy securing a given item such as a
given task or delivered report? - ANSWER-View security for securable item
In order to access domain
, items, what must a user be? - ANSWER-A member of at least one security
groups permitted in the domain security policy.
How do workers become members of a role-based security group? -
ANSWER-Through role assignment
What happens when you activate pending security policy changes - ANSWER-
You are activating all pending security policies in the tenant
What settings for the access rights to organizations allows members to only
access targets in the role assigned organization, and any subordinate
organizations - ANSWER-Applies to current organization and unassigned
subordinates
A user is a member of both a constrained and unconstraned security group
and both security groups have a domain security policy. What is the users
resulting access for the domain items? - ANSWER-The user's domain items
access will be constrained.
Who can assign roles? - ANSWER-The worker HR partner. And role maintainer