1. Match the following Microsoft Dynamics AX 2012 security concept nameswith their descriptions.
c 1. Group of duties for a job function.
a 2. Group of duties which can be optionally used when assigning duties to roles.
e 3. A responsibility to perform one or more tasks or services for a job.
d 4. Group of related entry points with associated access levels.
b 5. Group of base objects and required permissions For example: Form permissions .
a. Process Cycle
b. Permissions
c. Roles
d. Privileges
e. Duties
2. Where is the role-based security set up stored?
(•) Application Object Tree (AOT)
( ) Application files
( ) Security file
( ) Security tables
3. True or False? It is recommended that record level security is used to secure data in Microsoft Dynamics AX because the extensible data security policy framework is being deprecated in a future release.
( ) True
(•) False
4. What new authentication types are added to Microsoft Dynamics AX 2012? (Select all that apply)
( ) Active Directory users
(√) Active Directory groups
(√) Claims users
( ) SQL users
5. Which of the following statements are true? (Select all that apply)
(√) Overrides for securable objects are not associated with specific duties or privileges.
( ) Overrides for securable objects are associated with specific duties or privileges.
(√) If you apply an override, the access level for the object is set for the role, regardless of the access levels specified by the duties and privileges to that role.
( ) If you apply an override, the access level for the object is set for the role, only if access levels are specified by the duties and privileges to that role.
c 1. Group of duties for a job function.
a 2. Group of duties which can be optionally used when assigning duties to roles.
e 3. A responsibility to perform one or more tasks or services for a job.
d 4. Group of related entry points with associated access levels.
b 5. Group of base objects and required permissions For example: Form permissions .
a. Process Cycle
b. Permissions
c. Roles
d. Privileges
e. Duties
2. Where is the role-based security set up stored?
(•) Application Object Tree (AOT)
( ) Application files
( ) Security file
( ) Security tables
3. True or False? It is recommended that record level security is used to secure data in Microsoft Dynamics AX because the extensible data security policy framework is being deprecated in a future release.
( ) True
(•) False
4. What new authentication types are added to Microsoft Dynamics AX 2012? (Select all that apply)
( ) Active Directory users
(√) Active Directory groups
(√) Claims users
( ) SQL users
5. Which of the following statements are true? (Select all that apply)
(√) Overrides for securable objects are not associated with specific duties or privileges.
( ) Overrides for securable objects are associated with specific duties or privileges.
(√) If you apply an override, the access level for the object is set for the role, regardless of the access levels specified by the duties and privileges to that role.
( ) If you apply an override, the access level for the object is set for the role, only if access levels are specified by the duties and privileges to that role.