Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

When hiring employees, you want Company 1000 to be the default, and you want Company 1000 to be the only company that can be selected.

How do you configure Company 1000 to accomplish this?

A.

Configure it as the default organization.

B.

Configure it as the default and allowed organization.

C.

Configure it as the superior and subordinate organization.

D.

Configure it as the allowed organization.

A customer requires an additional month of pay to be provided due to country-specific legislative requirements.

How do you configure this in Workday?

A.

Create a period salary plan with a multiplier of one month.

B.

Create a percent-based merit plan.

C.

Create an amount-based allowance plan with plan profiles for each month.

D.

Create a one-time payment plan.

You need to trigger compensation eligibility for a newly hired worker. What step type should you use?

A.

Complete Questionnaire

B.

Service

C.

To Do

D.

Action

You want a report's results to display only workers located in Toronto and Montreal. What report configuration accomplishes this?

A.

Share

B.

Filter

C.

Sub Level Sort

D.

Sort

A consultant is configuring plan eligibility using organizational membership and job family as inclusive qualifying factors.

    5 employees meet the job family criterion

    50 employees meet the organization criterion

Rules must be executed with optimal performance.

How does this requirement impact the design of the rule?

A.

Organizational membership will precede job family.

B.

The consultant will remove the job family criterion.

C.

Eligibility is sequenced automatically.

D.

Job family will precede organizational membership.

You created a Role-Based (Unconstrained) security group and a User-Based security group. Both security groups have access to the domain that secures the Staffing tab of a supervisory organization.

What access will members of each group have?

A.

Role-Based (Unconstrained) can view the Staffing tab of supervisory organizations they are assigned to support. User-Based can view the Staffing tab of all supervisory organizations.

B.

Role-Based (Unconstrained) can view the Staffing tab of all supervisory organizations. User-Based can view the Staffing tab of supervisory organizations they are assigned to support.

C.

Both security groups can view the Staffing tab of all supervisory organizations.

D.

Both security groups can view the Staffing tab of supervisory organizations they are assigned to support.

What prevents a user from running a Workday Standard Reports report?

A.

The user is not assigned to the Report Administrator security group.

B.

The user is not assigned to the Report Writer security group.

C.

The user does not have access to the appropriate business process.

D.

The user does not have access to the appropriate domain.

Which staffing models are available for supervisory organizations? (Select two correct answers.)

A.

Headcount Management

B.

Customer Defined Staffing Model

C.

Position Management

D.

Job Management

An employee is transferring to a new location using the Change Job business process. Prior to the transfer, they were intentionally assigned an allowance plan with no eligibility criteria, and they must retain this plan after the transfer.

The compensation partner is responsible for ensuring the plan assignment remains unchanged.

What should the compensation partner do?

A.

Set up a Plan Adjustment using a default target.

B.

Add the removed plan using the Request Compensation Change task.

C.

Assign the plan using the Roll Out Compensation Plans to Employees task.

D.

Restore the removed plan using the Propose Compensation Change task.

A worker can run the Compensation Package report but cannot access the Create Compensation Package task.

What type of security permissions does the worker have?

A.

Initiate on a business process security policy.

B.

View and Modify on a domain security policy.

C.

View All on a business process security policy.

D.

View on a domain security policy.