|GUARANTEED ACCURATE
ANSWERS
You want to set up benefit partners to only see and support workers in a
specific location in hierarchies. What security group type allows you to
identify the benefits partners as members and allow you to constrain
their access defined location hierarchies? - ACCURATE ANSWERS✔✔
Role-based constrained
How are user based security groups assigned to a worker? - ACCURATE
ANSWERS✔✔ They are assigned based on role assignment
Which security group types use other security groups to determine
membership? - ACCURATE ANSWERS✔✔ Role- based unconstrained
and organization membership
What report identifies the security policy securing a given item such as a
given task or delivered report? - ACCURATE ANSWERS✔✔ View
security for securable item
In order to access domain
items, what must a user be? - ACCURATE ANSWERS✔✔ A member of
at least one security groups permitted in the domain security policy.
, How do workers become members of a role-based security group? -
ACCURATE ANSWERS✔✔ Through role assignment
What happens when you activate pending security policy changes -
ACCURATE ANSWERS✔✔ You are activating all pending security
policies in the tenant
What settings for the access rights to organizations allows members to
only access targets in the role assigned organization, and any
subordinate organizations - ACCURATE ANSWERS✔✔ Applies to
current organization and unassigned subordinates
What security configuration requires you to run the activate pending
security policy changes task for it to take affect - ACCURATE
ANSWERS✔✔ Editing a business process security policy to remove a
security group feom an approve action
Which of the following are characteristics of the membership in a user
base security group? - ACCURATE ANSWERS✔✔ It is manually
assigned and it follows the user
Which report can you use to view the security access of a user? -
ACCURATE ANSWERS✔✔ View security groups for user. Security
analysis for worker account.