New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Workday Workday-Pro-Integrations Practice Exam with Questions & Answers | Set: 2

Questions 11

What is the workflow to chain a Document Transformation system to a Connector integration for the purpose of transforming the output?

Options:
A.

Add a Service step of Fire Integration to the Document Transformation (DT) Business Process (BP)

B.

Add an Integration step to the Connector Business Process (BP)

C.

Add an Integration step to the Document Transformation (DT) Business Process (BP)

D.

Add a Service step of Fire Integration to the Connector Business Process (BP)

Workday Workday-Pro-Integrations Premium Access
Questions 12

Refer to the following XML to answer the question below.

Workday-Pro-Integrations Question 12

Within the template which matches on wd:Report_Entry, you would like to conditionally process the wd:Education_Group elements by using an element. What XPath syntax would be used for the select to iterate over only the wd:Education_Group elements where the Degree is an MBA?

Options:
A.

wd:Education_Group[wd:Degree='MBA']

B.

wd:Education_Group/wd:Degree='MBA'

C.

wd:Report_Entry/wd:Education_Group/ wd:Degree='MBA' 1:Degree='MBA'

D.

wd:Report_Entry/wd:Education_Group[wd:Degree='MBA' 1:Degree='MBA']

Questions 13

A calculated field used as a field override in a Connector is not appearing in the output. Assuming the field has a value, what could cause this to occur?

Options:
A.

Access not provided to calculated field data source.

B.

Access not provided to all fields in the calculated field.

C.

Access not provided to Connector calculated field web service.

D.

Access not provided to all instances of calculated field.

Questions 14

You have a population of workers who have put multiple names in their Legal Name - First Name Workday delivered field. Your third-party vendor only accepts one-word first names. For workers that have included a middle name, the first and middle names are separated by a single space. You have been asked to implement the following logic:

* Extract the value before the single space from the Legal Name - First Name Workday delivered field.

* Count the number of characters in the extracted value.

* Identify if the number of characters is greater than.

* If the count of characters is greater than 0, use the extracted value. Otherwise, use the Legal Name - First Name Workday delivered field.

What functions are needed to achieve the end goal?

Options:
A.

Extract Single Instance, Text Length, Numeric Constant, True/False Condition

B.

Text Constant, Substring Text, Arithmetic Calculation, Evaluate Expression

C.

Format Text, Convert Text to Number, True/False Condition, Evaluate Expression

D.

Substring Text, Text Length, True/False Condition, Evaluate Expression

Questions 15

How do you initially upload the XSLT file to a Document Transformation integration system?

Options:
A.

From the Related Action on the Document Transformation, select Configure Integration Attachment Service.

B.

From the Related Action on the Document Transformation, select Configure Integration Attributes.

C.

In the Global Workday Search bar, run the Edit Integration Attachment Service task.

D.

In the Global Workday Search bar, run the Edit Integration Service Attachment task.

Questions 16

You are creating an outbound connector using the Core Connector: Organization Outbound template. The vendor has provided the following requirements for how the data should appear in the output file.

Workday-Pro-Integrations Question 16

The vendor would also like to change the default document retention policy of 30 days to 7 days. What tasks do you need to use to configure this in your connector?

Options:
A.

Configure Integration Maps and Configure Integration Attributes

B.

Configure Integration Field Overrides and Configure Integration Field Attributes

C.

Configure Integration Field Overrides and Configure Integration Attributes

D.

Configure Integration Maps and Configure Integration Field Attributes

Questions 17

Refer to the scenario. You are implementing a Core Connector: Worker integration to send employee data to a third-party active employee directory. The external vendor requires the following:

    The Employee's Active Directory User Principal Name.

    A mapping from Worker Type values to external worker type codes.

    A specific filename format that includes a timestamp and sequence number.

You also need to ensure the document transformation occurs before the file is delivered to the endpoint. You must include an Employee’s Active Directory User Principal Name (generated by a Calculated Field).

How do you ensure this field is pulled into the output?

Options:
A.

Configure an integration map.

B.

Configure an integration field override.

C.

Configure an integration field attribute.

D.

Configure an integration attribute.

Questions 18

You need the integration file to generate the date format in the form of "31/07/2025" format

• The first segment is day of the month represented by two characters.

• The second segment is month of the year represented by two characters.

• The last segment is made up of four characters representing the year

How will you use Document Transformation (OT) to do the transformation using XTT?

Options:
A.

Workday-Pro-Integrations Question 18 Option 1

B.

18

C.

18

D.

18

Questions 19

What is the purpose of declaring and defining the namespace in an XSLT stylesheet?

Options:
A.

To specify the version of XML being used in the source document.

B.

To distinguish XSLT elements from other XML elements.

C.

To specify the encoding type for the document.

D.

To provide a URL where additional transformation rules can be downloaded.

Questions 20

What is the relationship between the Integration System User (ISU), Integration System Security Group (ISSG), and domain security policies?

Options:
A.

Assign domain security policies to the ISSG, and then assign the ISSG to the ISU.

B.

Assign domain security policies to the ISU, and then assign the ISU to the ISSG.

C.

Assign the ISU to the ISSG, and then assign the ISSG to domain security policies.

D.

Assign the ISSG to the ISU, and then assign the ISU to domain security policies.