3 Months Free Update
3 Months Free Update
3 Months Free Update
Which part of the security structure cannot be created or viewed from the Security Console, when configuring security for Financial Reporting Compliance?
The GRC Business owner responsible for reviewing and investigating access incidents related to the “Order to Cash” perspective does not see any worklists for the generated results. You have validated that:
1. Other business owners are able to view their assigned worklists without any problem
2. Incidents have been generated for the controls related to Order to Cash
3. The business owner’s assigned roles contain the correct functional privileges and data access to the correct perspective values
What is the reason the business owner cannot see any worklists for the generated incidents?
You are building a transaction model to identify invoices with USD amounts that are greater than the supplier’s average invoice amount. The order of the filters is important.
1. Add an “Average” Function filter grouping by “Supplier ID” where “Invoice Amount” is greater than 0.
2. Add a standard filter where “Invoice Currency” equals “USD.”
3. Add a standard filter where the delivered “Average Value” attribute is less than “Invoice Amount.”
What is the correct order of the filters for this transaction model?
You are implementing Advanced Access Controls for a client who wants to limit the seeded job role “Application Access Auditor”. This job role should NOT include system configuration duties, but allows the user to monitor jobs schedules for Advanced Controls.
After the seeded job role is copied, that two duty roles should be removed to comply with the access restrictions? (Choose two.)
After generating an XML file export of Advanced Controls perspectives, you receive a message that the export job has been generated.
What are the three steps you need to perform in order to download and review the formatted export file? (Choose three.)
Which three statements are true about the purpose of perspectives? (Choose three.)
You are validating your customer’s import template before import. The customer requires that all controls be set up so they are noted to be used for the Audit Test assessment type. How do you verify that this has been done?
During implementation, you created a Financial Reporting Compliance superuser and assigned this user the following roles:
The superuser logs in to Financial Reporting Compliance but is not able to create new Data Security Policies.
What is wrong?
During an assessment, an issue was created. Your job as the Issue Manager is to review the issues and validate them. If it is determined that they are not valid issues, you need to close them. You have found an issue that is not valid and with Status: Open and State: Reported.
Identify the correct step to close this issue.
Which three steps can be performed by using the Configure Module Objects pages? (Choose three.)
You are implementing Advanced Access Controls for a client. You need to create a model that returns users who have been assigned a specified access point but excludes a specific operating unit.
Which business object(s) do you need to add to your model to accomplish this objective?
Which controls can user A manage for the following Control Manager role Configuration? See details of perspective trees and control-perspective association below.
Your client has asked you to define a transaction model to identify duplicate invoices based on Invoice Numbers and Invoice Amounts.
Which two standard filters can be combined to accomplish this? (Choose two.)
You have five business units in our company, BU1 through BU5. You want to build a transaction model to identify suppliers who have been paid more than $100,000 USD across all business units except BU5.
Which two filters must be combined? (Choose two.)
Which three tasks should be completed before starting the Financial Reporting Compliance implementation? (Choose three.)
When validating imported data, the control manager at your client has identified an incorrect Risk-Control mapping; that is, Control A was mapped incorrectly to Risk B instead of Risk A. What needs to be done to fix the mapping?
You are configuring security and you do not want the risks to go through the review and approve process each time they are updated. How will you meet this requirement?