You can relate objects in Financial Reporting Compliance. Which statement is true about editing or creating related objects in the Related Objects section on the Risk Definition page?
Which part of the security structure cannot be created or viewed from the Security Console, when configuring security for Financial Reporting Compliance?
A Control Manager has changed the status of an issue to “In Remediation” and has submitted it.
What will be the state of the Issue if there is no issue validator, reviewer, or approver configured?
How do you associate a risk to a control?
The control manager needs to associate an existing test plan to an additional assessment type, Audit Test. The existing test plan is associated only with the Design Review assessment type.
How can this be accomplished?
Which three statements are true about the purpose of perspectives? (Choose three.)
Your client has asked you to define a transaction model to identify duplicate invoices based on Invoice Numbers and Invoice Amounts.
Which two standard filters can be combined to accomplish this? (Choose two.)
During implementation, you created a risk object and successfully mapped it to a control object. The client’s Risk Owner is able to access the risk but not the control.
Why did this happen?
You are configuring security and you do not want the risks to go through the review and approve process each time they are updated. How will you meet this requirement?
You are validating your customer’s import template before import. The customer requires that all controls be set up so they are noted to be used for the Audit Test assessment type. How do you verify that this has been done?
Your client is configuring their Test pod (which has no data) and has created their initial import template with controls, test plans, perspectives, and perspective-control mappings. They have used custom list of values for Control Frequency.
Which three tasks must be completed before performing the data import? (Choose three.)
You are designing data for data import. The customer decided that they want to secure controls based on their company organization.
Which three worksheets of the import template are required to accomplish this requirement? (Choose three.)
Which two would need to happen in order for Advanced Access Controls (AAC) to automatically assign a status of “Closed” to an access incident? (Choose two.)
Which two activities can be performed using Financial Reporting Compliance? (Choose two.)
How do you add values to a Risk Type list of values?
You want to identify Controls with the most Incidents, with the condition that the identified Controls should have 80% of all Incidents. To do this, you have imported a custom object that contains the number of incidents associated with each control, and have added that object to a transaction model.
Which pattern filter must you now apply?
You are gathering requirements on how your client performs control assessments. Which three tasks should you complete to set up assessments in Financial Reporting Compliance? (Choose three.)
During an assessment, an issue was created. Your job as the Issue Manager is to review the issues and validate them. If it is determined that they are not valid issues, you need to close them. You have found an issue that is not valid and with Status: Open and State: Reported.
Identify the correct step to close this issue.
You are helping your client identify and define their controls. You have determined that your client requires two perspectives: Business Units and Regulatory Standards.
The controls are going to be secured by the business unit, and you want to ensure that when the client defines new controls, it is mandatory to assign a Business Units perspective to the control. You are going to set the “Required” field to “yes” for the Control-Business Units association.
Where do you do this in the product?
An organization has a list of companies with which they no longer wish to do business. The list is not stored in their ERP Could but is stored in a file.
Which transaction model will identify payments made to these companies?
You are implementing Advanced Access Controls and there is a requirement for a control to monitor user access to specific, client-defined access points which give users the ability to both initiate a purchase order and approve payments on that purchase order.
Which is a valid option to implement the control?
Your customer has a requirement to define an IT Compliance Manager job role with privileges to manage risks and controls, and the issues related to the risks and controls.
What are the duty roles that must be included in this job role to achieve this requirement?