Answers
Where do you enable permissions to allow security
Business Process Security Policy
groups to participate in a business process?
What can you configure to stop an approval chain at a
Exit Condition
certain number of counts?
What is the benefit of a consolidated approval? It combines multiple approvals into one step.
What triggers are available for notification? (Select Two) D. Both A & B
What task will allow you to exclude certain individuals in
Maintain Advanced Routing
the business process based on the context of the event?
How can you ensure that data is entered correctly when
Validation Condition
initiating a business process event?
Which step types have validation rules? D. Both B & C
What is the function of a critical validation message? Prevent users from completing a task incorrectly
True or False? Termination reasons are delivered by Work-
False
day and cannot be specific to customer needs.
What subprocess should be included in the Termination
process to address the terminated worker's roles and Assign Roles
security group assignments?
What action step should be included in the Termination
process to reassign My Tasks items for terminated em- Manage Business Process for Worker
ployees
True or False? Workday delivers a service that can disable
True
Workday accounts?
True or False? The Termination business process type uses
False
a template, but customers can remove it if desired
How can a customer or consultant determine which busi-
View Business Process Template report
ness process types utilize templates?
, True or False? The Change Job business process type uses
True
a guided editor.
True or False? The Change Job business process type
consolidates templates from other subprocesses, such as
False
Change Organization Assignments and Propose Compen-
sation Hire.
How does the Change Job business process determine
where to send a step for a specific member of a security Routing Modifiers
group?
In order to meet customer needs, what are the options for
Default, Organization Based, and Role-based
configuring business processes?
Which security group type can you use to limit self-service
access for a population associated with a specific group of Rule-Based
locations?
Which security group type can you use to identify workers
Job-based
who are all in the same job profile?
Which security group type can you use to identify workers
Organization-based
who are all in the same company?
Which security group type can you use to give only specific
Segment-based
users access to relevant documents?
Which security group types can you use to give access to
D. Both A & C
a non-worker? (Select two correct answers.)
What is the single biggest factor in report performance? Data Source
True or False? Indexed Data Sources enhance the perfor-
True
mance of a report.
When can you schedule a report to run? (Select two cor-
A. Both C & D
rect answers.)
When you apply a filter, which logic executes first? Subfilter
2/7