New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Refer to the following scenario to answer the question below.

You need to configure a Core Connector: Candidate Outbound integration for your vendor. The connector requires the data initialization service (DIS).

The vendor needs the file to only include candidates that undergo a candidate assessment event in Workday.

How do you accomplish this?

A.

Configure the integration services to only include candidates with assessments.

B.

Set the integration transaction log to subscribe to specific transaction types.

C.

Make the Candidate Assessment field required in integration field attributes.

D.

Create an integration map to output values for candidates with assessments.

What is the task used to upload a new XSLT file for a pre-existing document transformation integration system?

A.

Edit Integration Attachment

B.

Edit Integration Attachment Service

C.

Edit XSLT Attachment Transformation

D.

Edit Integration Service Attachment

Refer to the scenario. You are configuring a Core Connector: Worker integration with the Data Initialization Service (DIS) enabled. The integration must extract worker contact details and job information, including a calculated field override that determines phone allowance eligibility.

While testing, the output contains no records, and the Messages tab shows exception logs stating you don't have access to the Exempt field. You note this is the same field being used for Population Eligibility in the integration.

What must you configure to resolve this security issue?

A.

Assign the ISSG to a row with Modify access in the domain security policy securing the Web Service.

B.

Assign the ISSG to a row with View access in the domain security policy securing the Web Service.

C.

Assign the ISSG to a row with Modify access in the domain security policy securing the Population Eligibility field.

D.

Assign the ISSG to a row with View access in the domain security policy securing the Population Eligibility field.

Refer to the following XML data source to answer the question below.

You need the integration file to format the ps:Position_ID field to 10 characters, truncate the value if it exceeds, and align everything to the left.

How will you start your template match on ps:Position to use Document Transformation (DT) to do the transformation using XTT?

A.

B.

C.

D.

Refer to the following scenario to answer the question below.

You need to configure a Core Connector: Candidate Outbound integration for your vendor. The connector requires the data initialization service (DIS).

The vendor requests additional formatting of the candidate Country field. For example, if a candidate's country is the United States of America, the output should show USA.

What steps do you follow to meet this request?

A.

Use an Evaluated Expression calculation and add it to the integration's report data source.

B.

Use the integration related action Configure Integration Population Eligibility.

C.

Use the integration services to only output shortened country codes.

D.

Use the integration related action Configure Integration Maps.

Refer to the scenario. You are configuring a Core Connector: Worker integration with the Data Initialization Service (DIS) enabled. The integration must extract worker contact details and job information, including a calculated field override that determines phone allowance eligibility.

When testing, you run the Test Security Related Action from the Configure Integration Field Override step. Several field overrides display “No” in the Available by User column.

To ensure the ISSG has access to these field overrides and that “Yes” is displayed in the Test Security step, what configuration should you review?

A.

Provide the ISSG View permissions to the domain security policies securing each overridden field.

B.

Assign the ISSG to the domain security policies that govern the web service operations with Get access.

C.

Grant View permissions to the ISSG for the domain security policies that secure the web service operations.

D.

Identify the domain security policies securing the field overrides and grant Modify permissions.

A vendor needs an EIB that uses a custom report to output a list of new hires and their child dependent(s). You have been asked to create a calculated field that will be used to add only child dependent(s).

Which calculated field functions do you need to accomplish this?

A.

Text Constant, True/False Condition, Evaluate Expression

B.

True/False Condition, Evaluate Expression

C.

Text Constant, True/False Condition, Extract Multi-Instance

D.

True/False Condition, Extract Multi-Instance

Refer to the scenario. You are configuring a Core Connector: Worker integration to extract worker demographic and contact information. The integration uses the Data Initialization Service (DIS) and must include worker fields such as name, address, and a calculated field identifying workers eligible for a phone allowance.

During a Full File test run, the output file is missing all address-related information, even though the Address Line Data, Municipality, Region, and Postal Code fields were configured in the Configure Integration Field Attributes step. You also confirmed that the Worker Personal Data Section is marked as Include in Output.

What should you do to resolve this issue?

A.

Mark each address field in the Address Data subfolder as Required in Configure Integration Field Attributes.

B.

Enable the Address Data subfolder in Configure Integration Field Attributes and then reselect the address fields.

C.

Enable the Worker Personal Data Section Fields integration service within the Configure Integration Services step.

D.

Within the Configure Integration Services task, select the Enable All Services checkbox.

How does an XSLT processor identify the specific nodes in an XML document to which a particular transformation rule should be applied?

A.

The processor matches nodes using XPath expressions within templates.

B.

The stylesheet element directs the processor to specific XML sections.

C.

Named templates explicitly call processing for designated elements.

D.

The processor targets nodes based on declared namespace prefixes.

You have successfully configured an ISU and an ISSG with the correct security policies and have assigned them to an EIB.

What task do you need to run before you can launch the EIB?

A.

Activate Pending Security Policy Changes

B.

View Security for Securable Item

C.

Assign the ISSG to only one security policy

D.

Maintain Integration Security Policies