Black Friday Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which two activities can be performed using Financial Reporting Compliance? (Choose two.)

A.

Review and approve the accuracy and completeness of control descriptions.

B.

Gain real-time access to live financial data and proactively resolve issues.

C.

Continuously monitor financial transactions and role-based remediation of transaction incidents.

D.

Review control assessment results, along with any effectiveness issues found.

E.

Provide self-service access to reporting and analysis against financial transactions.

F.

Conduct intuitive audits of general ledger balances with journal details.

Full Access
Question # 5

At the last step of initiating assessments, the assessment manager sees who the assessment participants are (to complete, review, and approve the assessments). If the assessment manager wants to change the participant, who completes the assessment, what should he or she do?

A.

Modify the perspective hierarchy in the last step of initiating assessments.

B.

Modify the participant list in the last step of initiating assessments.

C.

Request the administrator to change the Perspective in Data Security Policy for the Control Manager’s job role.

D.

It is not possible to change the participants after Data Security Policies are assigned.

E.

Request the administrator to assign Data Security Policies with correct perspectives to the Assessor’s job role.

Full Access
Question # 6

You are implementing Advanced Financial Controls and you want to identify suspect transactions where the payment amount is less than $20 USD. However, you only want the results returned to be temporary.

What will you build in order to accomplish your objective?

A.

Template

B.

Control

C.

Model

D.

Filter

E.

Business object

Full Access
Question # 7

You are advising your client on design and configuration related to how access incident results will be viewed and managed. The client has provided a list of business requirements:

  • Incident results can be viewed by Department
  • Groups of investigators receive assigned incidents based on Department
  • Must ensure systematically that no incident is unassigned to an investigator

Which three must be configured to support these requirements? (Choose three.)

A.

Worklist assignment Result Investigator should be set to specific users.

B.

Custom perspective for Department linked to the Results object with Required set to “No”

C.

Custom perspective for Department linked to the Results object with Required set to “Yes”

D.

Investigators are assigned job roles with custom Department perspective data roles attached. Other incident users receive job roles which only allow viewing of incidents.

E.

Investigators are assigned job roles with custom Department perspective data roles attached for managing incidents. Other incident users are assigned job roles with custom Department perspective data roles attached for viewing only.

F.

Worklist assignment Result Investigator should be set to “All Eligible Users”

Full Access
Question # 8

Which two should you determine to ensure that your client can successfully maintain and administer Perspectives post go-live? (Choose two.)

A.

Identify if your client wants to review and/or approve new perspectives or changes made to existing perspectives.

B.

Identify lookup values that need to be created for Control, Risk, and Issue Type fields.

C.

Identify users who will be responsible for creating and maintaining perspectives, both for security as well as reporting.

D.

Identify users who will be responsible for creating and maintaining controls and/or risks.

Full Access
Question # 9

Your client has asked you to define a transaction model to identify duplicate invoices based on Invoice Numbers and Invoice Amounts.

Which two standard filters can be combined to accomplish this? (Choose two.)

A.

The “Payables Invoice” object’s “Supplier ID” does not equal itself.

B.

The “Payables Invoice” object’s “Invoice ID” is similar to the “Payables Invoice” object’s “Invoice Number”.

C.

The “Payables Invoice” object’s “Invoice Amount” is equal to itself.

D.

The “Payables Invoice” object’s “Invoice Number” is equal to the “Payables Invoice” object’s “Invoice ID.”

E.

The “Payables Invoice” object’s “Invoice Number” is equal to itself.

Full Access
Question # 10

During an assessment, an issue was created. Your job as the Issue Manager is to review the issues and validate them. If it is determined that they are not valid issues, you need to close them. You have found an issue that is not valid and with Status: Open and State: Reported.

Identify the correct step to close this issue.

A.

On the Manage Issues page, highlight the issue and click the Close button.

B.

The assessment associated to the issue must be completed before closing the issue. Only then can you close the issue.

C.

After you have completed the remediation plan, click the Close button on the Remediation Plan page.

D.

Ensure that the issue status is In Edit, and then from the Actions menu, select Close Issue.

Full Access
Question # 11

Which two options can be assigned to a duty role? (Choose two.)

A.

Functional Security Policy

B.

Abstract Role

C.

Data Security Policy

D.

Job Role

Full Access
Question # 12

Your customer needs to conduct monthly Operational Effectiveness assessments for controls across two organizations (North America and EMEA). Your customer requires that assessment results for North America be accessible only to users in North America and likewise for EMEA. Additionally, the Chief Risk Officer reviews the assessment results by Business Process every week.

How should you design perspectives to achieve this?

A.

Use the Region hierarchy for security and the Business Process hierarchy for reporting of controls.

B.

Use the Region hierarchy initially, and later use both Region and Business Process hierarchies for security.

C.

Use both Region and Business Process hierarchies solely for reporting purposes.

D.

Use the Business Process hierarchy for security and the Region hierarchy for reporting of controls.

Full Access
Question # 13

Which three statements are true about the purpose of perspectives? (Choose three.)

A.

Perspectives can be used to define user privileges.

B.

Perspectives can be used for categorizing Financial Reporting Compliance objects.

C.

Perspectives can be used to represent regional hierarchies.

D.

Perspectives are used to enable data security on Financial Reporting Compliance objects.

E.

Perspectives enable functional security in Financial Reporting Compliance.

Full Access
Question # 14

You are designing data for data import. The customer decided that they want to secure controls based on their company organization.

Which three worksheets of the import template are required to accomplish this requirement? (Choose three.)

A.

Perspective Items

B.

Controls

C.

Control Test Plans

D.

Perspective-Control

Full Access
Question # 15

Select three fields that are required to create an impromptu assessment. (Choose three.)

A.

Due Date

B.

Template

C.

Name

D.

Reviewer

E.

Perspectives

F.

Activity

Full Access
Question # 16

Which two steps are required to set up two levels of approval for new controls, which are added after the initial import? (Choose two.)

A.

On the Controls tab of the Import template, set the control state to NEW for each control record.

B.

Identify the organizations or business units for which users will perform review or approval.

C.

Identify users who will perform control review and approval.

D.

Identify the other roles to be provided for control managers.

Full Access
Question # 17

You have five business units in our company, BU1 through BU5. You want to build a transaction model to identify suppliers who have been paid more than $100,000 USD across all business units except BU5.

Which two filters must be combined? (Choose two.)

A.

Add a standard filter where the “Payment” object’s “Organization ID” equals BU1, BU2, BU3, BU4.

B.

Add a function filter grouping by “Supplier ID” where the sum of “Payment Amount” is greater than 100,000.

C.

Add a function filter grouping by “Organization ID” where the sum of “Payment Amount” is greater than 100,000.

D.

Add a standard filter where the “Payment” object’s “Organization ID” equals BU5, and advanced option “Exclude” is checked.

E.

Add a standard filter where the “Payment” object’s “Organization ID” is equal to itself.

Full Access
Question # 18

You build an access model with two entitlements. Each entitlement has four access points. The entitlements do not have any access points in common.

How many access point combinations will be analyzed?

A.

20

B.

16

C.

8

D.

4

E.

25

Full Access
Question # 19

Which three objects can be related to issues when creating an issue on the Manage Issues page? (Choose three.)

A.

Test Plans

B.

Assessments

C.

Processes

D.

Perspectives

E.

Risks

F.

Controls

Full Access
Question # 20

The internal auditor advised the Control Owner of North America to perform assessment for two P2P controls.

Which three steps can the Control Owner perform to kick-off assessments for only those two controls? (Choose three.)

A.

Initiate a planned assessment that includes all controls assigned to perspective P2P.

B.

Perform impromptu assessments for the two controls.

C.

Enable impromptu assessments during configuration of module objects.

D.

Initiate a planned assessment and include the two controls as part of the same assessment.

E.

Initiate two planned assessments, one for each control.

Full Access
Question # 21

How do you identify Financial Reporting Compliance Cloud’s key stakeholders?

A.

Identify users who need to create and submit expense reports easily.

B.

Identify users who will create customer invoices, and receive and apply customer payments.

C.

Identify executives who need to certify internal controls for SOX or similar mandates.

D.

Identify executives who will manage customer balances and recognize revenue.

Full Access
Question # 22

You are implementing Advanced Access Controls for a client who wants to limit the seeded job role “Application Access Auditor”. This job role should NOT include system configuration duties, but allows the user to monitor jobs schedules for Advanced Controls.

After the seeded job role is copied, that two duty roles should be removed to comply with the access restrictions? (Choose two.)

A.

Access Control Manager

B.

Advanced Control System Administrator

C.

Access incident Results Manager

D.

Application Data Source Manager

E.

Access Model Manager

Full Access