Chapter 3: Security Flashcards

(28 cards)

1
Q

What field in Maintain Assignable Roles governs which user’s picture will display when viewing the organization chart?

A

Is Leader/Is Supporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the View Security for Securable Item report display?

A

The security groups required to run or view a task or report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You create a new role-based security group and assignable role. When viewing the assignable role, the For Security Groups section is empty. Which steps do you take to correct this?

A

Edit the new security group and update the assignable role field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the first step of creating a role-based security group?

A

Create assignable role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What task do you use to create an assignable role?

A

Maintain Assignable Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If you create an assignable role and the role isn’t a member of the security group, what might be going on?

A

Role isn’t attached to the security group, need to input new role in ‘Assignable Role’ under Edit Security Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define security configurator

A

Manipulates domain and bp security policies. Assign workers to security groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of security group would a security configurator be in?

A

User-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Security Admin and determine what type of security group it would be in

A

Manages all security related information regardless of organizations (i.e. creating Workday account, establish passwords, view security reports) - user-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the Maintain Functional Areas report do?

A

Report that has domains & bps for a functional area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What report would you run to see all the domains & bps for a functional area?

A

Maintain Functional Areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Give examples of Domains

A

Custom objects, data sources, instance sets, report fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What do domains control?

A

Views into data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a BP?

A

Work flow definition that are events or tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do BPs control?

A

What can I do in the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does View Security for Securable Item allow you to do?

A

View what security groups grant access to specified securable item

17
Q

Define role-based security groups

A

Commonly used to identify users in key support or leadership roles support different orgs

18
Q

Is role-based usually constrained or unconstrained?

A

Typically constrained

19
Q

Define user-based security group

A

Commonly used to give admin system-wide access to data

20
Q

Is user-based usually constrained or unconstrained?

A

Unconstrained

21
Q

What does copying a security group do?

A

Copies existing permissions & existing members

22
Q

What are the steps to creating a new security group?

A
  1. Create a role, 2. Create security group, 3. Assign Role, 4. Edit Security Policies, 5. Activate
23
Q

What is the Maintain Assignable Role task?

A

Gives access to all org roles and all types

24
Q

True or False: role name should match security name

25
What is the Maintain Permissions for Security Group task?
Copy security groups, mass change security groups
26
What needs to be completed before security changes are made?
Activate Pending Security Policy Changes
27
What report allows you to see all domain security policies for a specific functional area?
Domain Security Policies for Functional Area
28
What can you do in