At the last step of initiating assessments, the assessment manager sees who the assessment participants are (to complete, review, and approve the assessments). If the assessment manager wants to change the participant, who completes the assessment, what should he or she do?
You have created a risk definition R100 and have created a new control C100 for this risk. No user has been assigned the Risk or Control reviewer and approver roles. What will be the state of R100 and C100 after submitting?
You are helping your client identify and define their controls. You have determined that your client requires two perspectives: Business Units and Regulatory Standards.
The controls are going to be secured by the business unit, and you want to ensure that when the client defines new controls, it is mandatory to assign a Business Units perspective to the control. You are going to set the “Required” field to “yes” for the Control-Business Units association.
Where do you do this in the product?
You have scheduled quarterly assessments for a Control object at the beginning of the year with future dates. However, the test plans associated with the Control object were updated before the assessment could be started. Which statement is true about this scenario?
Select three fields that are required to create an impromptu assessment. (Choose three.)
When running Synchronize Transaction from the Data Sources page of Application Configurations, which statement is true when you have two models using invoice and payment business objects?
Your client has subscribed to Financial Reporting Compliance and would like to address risks using treatment plans.
Which option shows the settings that will help in achieving this configuration?
A Control Manager has changed the status of an issue to “In Remediation” and has submitted it.
What will be the state of the Issue if there is no issue validator, reviewer, or approver configured?
A user has created and submitted a new control and the state of the control is “In Review.” The user expected that the control state would change to “Approved.”
Why is the control not in the “Approved” state?
You can relate objects in Financial Reporting Compliance. Which statement is true about editing or creating related objects in the Related Objects section on the Risk Definition page?
Which two should you determine to ensure that your client can successfully maintain and administer Perspectives post go-live? (Choose two.)
Which two activities can be performed using Financial Reporting Compliance? (Choose two.)
You are implementing Advanced Access Controls and there is a requirement for a control to monitor user access to specific, client-defined access points which give users the ability to both initiate a purchase order and approve payments on that purchase order.
Which is a valid option to implement the control?
You are remediating access incidents in Advanced Access Controls (AAC), and have just completed the remediation of a segregation of duties conflict for users in Fusion Security by removing the conflicting access from the users.
What status do you set for the incident in AAC?
During implementation, you created a Financial Reporting Compliance superuser and assigned this user the following roles:
The superuser logs in to Financial Reporting Compliance but is not able to create new Data Security Policies.
What is wrong?
You are implementing Advanced Access Controls for a client. You need to create a model that returns users who have been assigned a specified access point but excludes a specific operating unit.
Which business object(s) do you need to add to your model to accomplish this objective?
When you view or edit a transaction incident, you may see extra columns that are not present in the business objects used in the control.
What three kinds of control logic or conditions can cause this? (Choose three.)
You build an access model with two entitlements. Each entitlement has four access points. The entitlements do not have any access points in common.
How many access point combinations will be analyzed?
You are advising your client on design and configuration related to how access incident results will be viewed and managed. The client has provided a list of business requirements:
Which three must be configured to support these requirements? (Choose three.)