New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free 1z0-416 Questions Attempt

Page: 3 / 4
Total 106 questions

PeopleSoft 9.2 Human Resources Essentials Questions and Answers

Question 9

With respect to Table Set Controls, identify four true statements about SetID, TableSet Sharing, and Business Units. (Choose four.)

Options:

A.

SetIDs are used to differentiate rows of data in a table.

B.

Using just SetIDs is sufficient to grant row-level security.

C.

SetID, TableSet, and TableSet Sharing are often used synonymously.

D.

By using record groups, you are limited to one SetID per Business Unit.

E.

When accessing a control table keyed by SetID, you can limit your view of the table.

F.

Sets of data can be shared across multiple Business Units through TableSet Sharing.

Question 10

You are helping an organization design its Human Resources table structure. This organization has two divisions in the human resources department. You need specific information on tax reporting. Which question is appropriate to help you design the human resources table structure regarding tax reporting and legal entities?

Options:

A.

Ask where most employees work.

B.

Ask how many different locations are in the U.S. and Canada.

C.

Ask how many establishments the organization plans to set up.

D.

Ask how the organization reports rollups on the Financial General Ledger.

E.

Ask how many legal entities the organization reports to the various government agencies.

Question 11

Which field value from the Job Code table is not used as a default on HRMS pages?

Options:

A.

Standard Hours from the Job Code Profile page

B.

Rate Code from the Default Compensation page

C.

Salary Plan from the Default Compensation page

D.

Comp Freq from the Default Compensation page

E.

Rate Code from the Non-base Compensation page

F.

Standard Work Period from the Job Code Profile page

Question 12

Using a Permission List associated with a user and identifying security sets and access types in the Security by Permission List component of PeopleSoft are known as _____.

Options:

A.

Role-based data permission security

B.

Tree-based data permission security

C.

Group-based data permission security

D.

Country-based data permission security

E.

PeopleCode-based data permission security

Page: 3 / 4
Total 106 questions