Workday Pro HCM Core Administrators
exam questions with correct answers
A Workday user wants to locate the Change My Home Contact Information task. What search
techniques can the user use to locate the task most efficiently in the search bar? (Select three
CORRECT ANSWERs)
A. Enter the full task name
B. Enter the partial task name
C. Select the Global Navigation Menu
D. Select the Worker Profile
E. Enter an abbreviated task name - CORRECT ANSWER-✔✔✅A. Enter the full task name
B. Enter the partial task name
E. Enter an abbreviated task name
An end-user is viewing data in Workday but wants to learn more about it. What action will the user
take to learn more about the data? - CORRECT ANSWER-✔✔✅Select the data or view the Related
Actions.
Create and/or run a report
What tool can you use to understand the data flow and configuration relationships between the
various Workday solutions?
A. Functional Areas report
B. Workday Touchpoints Kit
C. Workday Community
D. Business process security policies - CORRECT ANSWER-✔✔✅B. Workday Touchpoints Kit
What is the name of the report that displays Work-day delivered reports?
, A. Workday Standard Reports
B. Workday Delivered Reports
C. Workday Customer Reports
D. All Custom Reports - CORRECT ANSWER-✔✔✅A. Workday Standard Reports
What are the two security policy types (Select two CORRECT ANSWERs)
A. Organization security policy
B. Business security policy
C. Domain security policy
D. Reporting security policy - CORRECT ANSWER-✔✔✅B. Business security policy
C. Domain security policy
A Workday user is made a member of a security group automatically when they are hired. They can
access self-service tasks and public items with this security access. To which security group type would
this user belong?
A. Workday-assigned
B. User-based
C. Role-based
D. Job-based - CORRECT ANSWER-✔✔✅A. Workday-assigned
What task activates domain and business process security policy changes?
A. View All Security Timestamps
B. Activate Pending Security Policy Changes
C. Security Exception Audit
D. Security Analysis for Security Group - CORRECT ANSWER-✔✔✅B. Activate Pending Security Policy
Changes
exam questions with correct answers
A Workday user wants to locate the Change My Home Contact Information task. What search
techniques can the user use to locate the task most efficiently in the search bar? (Select three
CORRECT ANSWERs)
A. Enter the full task name
B. Enter the partial task name
C. Select the Global Navigation Menu
D. Select the Worker Profile
E. Enter an abbreviated task name - CORRECT ANSWER-✔✔✅A. Enter the full task name
B. Enter the partial task name
E. Enter an abbreviated task name
An end-user is viewing data in Workday but wants to learn more about it. What action will the user
take to learn more about the data? - CORRECT ANSWER-✔✔✅Select the data or view the Related
Actions.
Create and/or run a report
What tool can you use to understand the data flow and configuration relationships between the
various Workday solutions?
A. Functional Areas report
B. Workday Touchpoints Kit
C. Workday Community
D. Business process security policies - CORRECT ANSWER-✔✔✅B. Workday Touchpoints Kit
What is the name of the report that displays Work-day delivered reports?
, A. Workday Standard Reports
B. Workday Delivered Reports
C. Workday Customer Reports
D. All Custom Reports - CORRECT ANSWER-✔✔✅A. Workday Standard Reports
What are the two security policy types (Select two CORRECT ANSWERs)
A. Organization security policy
B. Business security policy
C. Domain security policy
D. Reporting security policy - CORRECT ANSWER-✔✔✅B. Business security policy
C. Domain security policy
A Workday user is made a member of a security group automatically when they are hired. They can
access self-service tasks and public items with this security access. To which security group type would
this user belong?
A. Workday-assigned
B. User-based
C. Role-based
D. Job-based - CORRECT ANSWER-✔✔✅A. Workday-assigned
What task activates domain and business process security policy changes?
A. View All Security Timestamps
B. Activate Pending Security Policy Changes
C. Security Exception Audit
D. Security Analysis for Security Group - CORRECT ANSWER-✔✔✅B. Activate Pending Security Policy
Changes