ANSWERS GUARANTEE A+
✔✔You need to create security rules. What domain must you have access to ? -
✔✔Security Administration
✔✔Which steps are required to configure rule-based security groups? - ✔✔Create a
security rule. Create a rule based security group. Identify baseline security group.
✔✔What is the purpose of Exclusion criteria in an intersection security group? - ✔✔Hide
targets that members would have otherwise seen.
✔✔You want third-party users to have access only to targets in specific organizations in
Workday. What type of security group should you configure? - ✔✔Service center
(constrained)
✔✔A user does not have access to a value in a security segment. Which of the
following scenarios can cause this issue? - ✔✔A user is not a member of the segment-
based security group with access to the value. The security segment containing the
value is not configured in a segment-based security group.
✔✔Which security groups types include other security groups to determine
membership? - ✔✔Aggregation security groups. Intersection security groups.
✔✔What integration tool may use a business process and can use data from web
services, connectors, custom reports, external data, field overrides, and custom fields? -
✔✔Workday studio.
✔✔For the same domain, a user has unconstrained access via a user-based security
group and segmented access via a segment-based security group. How much access
does the user have to the domain ? - ✔✔Unconstrained access
✔✔According to workday recommendations, who should own an integration schedule? -
✔✔The ISU listed as the workday account on the integration system.
✔✔Which permission types grant security groups access to Securable Integrations in a
domain security policy? - ✔✔Put, Get
✔✔When does workday recommend your team plan and test opt-in features that your
organization wishes to adopt - ✔✔After planning and testing for automatically available
features.
, ✔✔ You want to set up benefit partners to only see and support workers in a specific
location in hierarchies. What security group type allows you to identify the benefits
partners as members and allow you to constrain their access defined location
hierarchies? - ✔✔Role-based constrained
✔✔How are user based security groups assigned to a worker? - ✔✔They are assigned
based on role assignment
✔✔Which security group types use other security groups to determine membership? -
✔✔Role- based unconstrained and organization membership
✔✔What report identifies the security policy securing a given item such as a given task
or delivered report? - ✔✔View security for securable item
✔✔In order to access domain
items, what must a user be? - ✔✔A member of at least one security groups permitted in
the domain security policy.
✔✔How do workers become members of a role-based security group? - ✔✔Through
role assignment
✔✔What happens when you activate pending security policy changes - ✔✔You are
activating all pending security policies in the tenant
✔✔What settings for the access rights to organizations allows members to only access
targets in the role assigned organization, and any subordinate organizations -
✔✔Applies to current organization and unassigned subordinates
✔✔What security configuration requires you to run the activate pending security policy
changes task for it to take affect - ✔✔Editing a business process security policy to
remove a security group feom an approve action
✔✔Which of the following are characteristics of the membership in a user base security
group? - ✔✔It is manually assigned and it follows the user
✔✔Which report can you use to view the security access of a user? - ✔✔View security
groups for user. Security analysis for worker account.
✔✔A user is a member of both a constrained and unconstraned security group and both
security groups have a domain security policy. What is the users resulting access for
the domain items? - ✔✔The user's domain items access will be constrained.
✔✔Who can assign roles? - ✔✔The worker HR partner. And role maintainer