New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1z0-1058-23 Questions and Answers

Question # 6

Which three statements are true about the purpose of perspectives? (Choose three.)

A.

Perspectives can be used to define user privileges.

B.

Perspectives can be used for categorizing Financial Reporting Compliance objects.

C.

Perspectives can be used to represent regional hierarchies.

D.

Perspectives are used to enable data security on Financial Reporting Compliance objects.

E.

Perspectives enable functional security in Financial Reporting Compliance.

Full Access
Question # 7

You have defined an initial Perspective Hierarchy for your client in the Advanced Controls module. After refining their business requirements, your client wants to expand the existing hierarchy to include 150 perspective items in various levels. For efficient processing, you decide to use the GRC data migration feature to import the new items.

Which three are valid processing steps required to define the export file? (Choose three.)

A.

Navigate to Risk Management Tools > Setup and Administration > Data Migration, and select Advanced Controls.

B.

Generate Template as Without Data.

C.

Navigate to Manage Module Perspectives.

D.

Generate Template as Without Data – Perspectives Only.

E.

Click the Create Import Template button.V

Full Access
Question # 8

You are building a transaction model to identify invoices with USD amounts that are greater than the supplier’s average invoice amount. The order of the filters is important.

1. Add an “Average” Function filter grouping by “Supplier ID” where “Invoice Amount” is greater than 0.

2. Add a standard filter where “Invoice Currency” equals “USD.”

3. Add a standard filter where the delivered “Average Value” attribute is less than “Invoice Amount.”

What is the correct order of the filters for this transaction model?

A.

1, 3, 2

B.

1, 2, 3

C.

2, 3, 1

D.

3, 2, 1

E.

2, 1, 3

Full Access
Question # 9

A Control Manager has changed the status of an issue to “In Remediation” and has submitted it.

What will be the state of the Issue if there is no issue validator, reviewer, or approver configured?

A.

In Review

B.

Active

C.

Reported

D.

Approved

E.

In Edit

Full Access
Question # 10

You have five business units in our company, BU1 through BU5. You want to build a transaction model to identify suppliers who have been paid more than $100,000 USD across all business units except BU5.

Which two filters must be combined? (Choose two.)

A.

Add a standard filter where the “Payment” object’s “Organization ID” equals BU1, BU2, BU3, BU4.

B.

Add a function filter grouping by “Supplier ID” where the sum of “Payment Amount” is greater than 100,000.

C.

Add a function filter grouping by “Organization ID” where the sum of “Payment Amount” is greater than 100,000.

D.

Add a standard filter where the “Payment” object’s “Organization ID” equals BU5, and advanced option “Exclude” is checked.

E.

Add a standard filter where the “Payment” object’s “Organization ID” is equal to itself.

Full Access
Question # 11

Which two steps are required to set up two levels of approval for new controls, which are added after the initial import? (Choose two.)

A.

On the Controls tab of the Import template, set the control state to NEW for each control record.

B.

Identify the organizations or business units for which users will perform review or approval.

C.

Identify users who will perform control review and approval.

D.

Identify the other roles to be provided for control managers.

Full Access
Question # 12

You are advising your client on design and configuration related to how access incident results will be viewed and managed. The client has provided a list of business requirements:

  • Incident results can be viewed by Department
  • Groups of investigators receive assigned incidents based on Department
  • Must ensure systematically that no incident is unassigned to an investigator

Which three must be configured to support these requirements? (Choose three.)

A.

Worklist assignment Result Investigator should be set to specific users.

B.

Custom perspective for Department linked to the Results object with Required set to “No”

C.

Custom perspective for Department linked to the Results object with Required set to “Yes”

D.

Investigators are assigned job roles with custom Department perspective data roles attached. Other incident users receive job roles which only allow viewing of incidents.

E.

Investigators are assigned job roles with custom Department perspective data roles attached for managing incidents. Other incident users are assigned job roles with custom Department perspective data roles attached for viewing only.

F.

Worklist assignment Result Investigator should be set to “All Eligible Users”

Full Access
Question # 13

Your client needs to perform Design Review and Certification assessment for all their controls. Identify two options that show how this requirement can be met. (Choose two.)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

E.

Option E

Full Access
Question # 14

Which two would need to happen in order for Advanced Access Controls (AAC) to automatically assign a status of “Closed” to an access incident? (Choose two.)

A.

The incident is resolved in Fusion Cloud and a subsequent evaluation of controls finds that the incident no longer exists.

B.

A global condition was added that resolves the conflict and a subsequent evaluation of controls finds that the incident no longer exists.

C.

A user sets the State of the incident to “Remediate”.

D.

The incident is resolved using simulation in AAC and a subsequent evaluation of controls finds that the incident no longer exists.

E.

A user sets the Status of the incident to “Resolved”.

Full Access
Question # 15

At the last step of initiating assessments, the assessment manager sees who the assessment participants are (to complete, review, and approve the assessments). If the assessment manager wants to change the participant, who completes the assessment, what should he or she do?

A.

Modify the perspective hierarchy in the last step of initiating assessments.

B.

Modify the participant list in the last step of initiating assessments.

C.

Request the administrator to change the Perspective in Data Security Policy for the Control Manager’s job role.

D.

It is not possible to change the participants after Data Security Policies are assigned.

E.

Request the administrator to assign Data Security Policies with correct perspectives to the Assessor’s job role.

Full Access
Question # 16

You are remediating access incidents in Advanced Access Controls (AAC), and have just completed the remediation of a segregation of duties conflict for users in Fusion Security by removing the conflicting access from the users.

What status do you set for the incident in AAC?

A.

Resolved

B.

Remediation

C.

Remedy

D.

Authorized

E.

Accepted

Full Access
Question # 17

You are implementing Advanced Financial Controls and you want to identify suspect transactions where the payment amount is less than $20 USD. However, you only want the results returned to be temporary.

What will you build in order to accomplish your objective?

A.

Template

B.

Control

C.

Model

D.

Filter

E.

Business object

Full Access
Question # 18

You have scheduled quarterly assessments for a Control object at the beginning of the year with future dates. However, the test plans associated with the Control object were updated before the assessment could be started. Which statement is true about this scenario?

A.

The user will have the option to select the older or newer versions of the test plans during the assessment process.

B.

The scheduled assessment process will end in error.

C.

The assessment will be associated with the version of the test plans from the time of assessment initiation.

D.

The updated test plans will become available during the assessment.

Full Access
Question # 19

Which part of the security structure cannot be created or viewed from the Security Console, when configuring security for Financial Reporting Compliance?

A.

Composite Duty Role

B.

Job Role Perspective Policy

C.

Data Security Policy

D.

Functional Security Policy

Full Access
Question # 20

You want to identify Controls with the most Incidents, with the condition that the identified Controls should have 80% of all Incidents. To do this, you have imported a custom object that contains the number of incidents associated with each control, and have added that object to a transaction model.

Which pattern filter must you now apply?

A.

Anomaly Detection

B.

Mean

C.

Pareto

D.

Absolute Deviation

E.

Clustering

Full Access
Question # 21

How do you add values to a Risk Type list of values?

A.

Populate the Import template with the new values in the Issue Severity column on the Controls tab.

B.

Add the lookup codes to the GRC_RISK_TYPE Lookup Type.

C.

Because you cannot add new values, update one of the existing lookup codes to what the client wants it to be.

D.

Add the lookup codes to the GRCM_RISK_TYPE Lookup Type.

E.

Use the default lookup codes because there is no way to update the existing ones.

Full Access
Question # 22

You have created security roles for the Procure-to-Pay (P2P) Control Manager for the EMEA region in your client’s organization. But, there are two problems with his or her security configuration.

Problem 1: This person should not receive notifications to complete control assessments, but currently he or she does.

Problem 2: Also, although he or she has access to controls associated with EMEA, he or she is unable to access controls created for individual regions within EMEA.

You have given him or her the following job role:

  • EMEA P2P Control Manager Job Role

Which two actions need to be taken to correct the problems? (Choose two.)

A.

Remove Control Certification Assessor Composite from the EMEA P2P Control Manager job role.

B.

Create EMEA P2P Control Certification Assessor Data Security Policy striped by both EMEA and P2P perspectives and assign to the job role.

C.

Add to the EMEA P2P Control Manager Data Security Policy the seeded Control Certification Assessor Data Security Policy.

D.

While defining data security policy, set the perspective value to EMEA including all child nodes of the EMEA region.

Full Access