Which three steps can be performed by using the Configure Module Objects pages? (Choose three.)
A. Choose display (or hide) configurable options for: results, events, consequences and treatments.
B. Set "object-perspective" association.
C. Create object data import templates.
D. Edit the assessment activity question and guidance text for all assessment types.
E. View assessment response details for all assessment types.
Which three are true about implementing a best practice solution for Financial Reporting Compliance? (Choose three.)
A. Large scope of project requires high effort for maintenance and administration.
B. It promotes rapid implementation and go-live.
C. It promotes go-live with minimal acceptance testing and user training.
D. It provides maximum return on investment with minimum project risk.
E. It promotes successful adoption and minimizes on-going cost of operation.
You are implementing Advanced Access Controls and there is a requirement for a control to monitor user
access to specific, client-defined access points which give users the ability to both initiate a purchase order
and approve payments on that purchase order.
Which is a valid option to implement the control?
A. From the "Access Entitlements" page create two entitlements containing the respective client- defined access points. Create an access model from the "Models" tab of Advanced Controls, based on the entitlements you created.
B. Select Actions > Create Access Control from the "Controls" tab of Advanced Controls.
C. Create an access model from the "Models" tab of Advanced Controls, and then define an access point filter for each individual client-defined access point.
D. From the "Access Entitlements" page create two entitlements containing the respective client- defined access points. Create an access model from the "Models" tab of Advanced Controls, based on the entitlements you created. Finally, deploy an access control in the "Controls" tab of Advanced Controls, and select the access model you created.
E. Create an access entitlement from the "Access Entitlements" page, then select Actions > Create Access Control from the "Controls" tab of Advanced Controls, and select the entitlement you created.
Which two would need to happen in order for Advanced Access Controls (AAC) to automatically assign a status of "Closed" to an access incident? (Choose two.)
A. The incident is resolved in Fusion Cloud and a subsequent evaluation of controls finds that the incident no longer exists.
B. A global condition was added that resolves the conflict and a subsequent evaluation of controls finds that the incident no longer exists.
C. A user sets the State of the incident to "Remediate".
D. The incident is resolved using simulation in AAC and a subsequent evaluation of controls finds that the incident no longer exists.
E. A user sets the Status of the incident to "Resolved".
Which two steps are required to set up two levels of approval for new controls, which are added after the initial import? (Choose two.)
A. On the Controls tab of the Import template, set the control state to NEW for each control record.
B. Identify the organizations or business units for which users will perform review or approval.
C. Identify users who will perform control review and approval.
D. Identify the other roles to be provided for control managers.
What would happen to an access incident in Advanced Access Controls (AAC) that has been remediated and has a status of "Closed," but poses a conflict again during a subsequent evaluation of controls?
A. The incident is deferred.
B. The incident remains in "Closed" status and additional remedial action cannot be taken.
C. The incident remains in "Closed" status and assigned users receive a notification that additional access incidents have been identified.
D. The incident is copied and a new incident is created based on the original incident.
E. The incident status changes to "Assigned."
After adding a new control in Financial Reporting Compliance, the control owner clicks Submit. Users with
the Control Reviewer and Control Approver roles exist.
What is the expected outcome?
A. The control goes into the "Waiting for Approval" state.
B. The control goes into the "New" state.
C. The control goes into the "Approved" state.
D. The control goes into the "In Review" state.
Which two options can be assigned to a duty role? (Choose two.)
A. Functional Security Policy
B. Abstract Role
C. Data Security Policy
D. Job Role
During implementation, you created a Financial Reporting Compliance superuser and assigned this user
the following roles:
Enterprise Risk and Control Manager
IT Security Manager
Employee
The superuser logs in to Financial Reporting Compliance but is not able to create new Data Security
Policies.
What is wrong?
A. The superuser's account is inactive and his or her account needs to be activated.
B. The application will not allow a user to both create users and assign them roles.
C. The superuser's account is created but the synchronization jobs have not been run.
D. The superuser's account is not yet approved by his or her supervisor in Financial Reporting Compliance.
You are validating your customer's import template before import. The customer requires that all controls be set up so they are noted to be used for the Audit Test assessment type. How do you verify that this has been done?
A. The Assessment Flag and the Audit Testing Flag are both set to "Y."
B. The Control has a related process.
C. The Control status filed is set to "Audit Test."
D. The Control comment filed has a notation for "Audit Test."