SAP
C_THR83_2505
Q1:
What needs to be configured to enable recruiting e-mail triggers? Note: There are 2 correct answers to this question.
☐
A
An e-mail template needs to be assigned to the e-mail trigger.☐
B
The J permission needs to be granted in the Candidate Application template.☐
C
The e-mail trigger needs to be enabled in the Admin Center.☐
D
The e-mail trigger needs to be enabled in the Job Requisition template.
SAP
C_THR83_2505
Q2:
Which of the following location object data will populate into the job posting details when using the Map to Location Foundation Object field completion rule for Location in Recruiting Posting? Note: There are 3 correct answers to this question.
☐
A
State/Province☐
B
Country/Region☐
C
Postcode☐
D
Language☐
E
Location
SAP
C_THR83_2505
Q3:
What are the options to implement an offer approval? Note: There are 2 correct answers to this question.
☐
A
It can be implemented to include a pre-configured workflow approval.☐
B
It can be implemented to link the offer to the candidate profile.☐
C
It can be implemented to be used on a mobile device.☐
D
It can be implemented to contain offer letter tokens.
SAP
C_THR83_2505
Q4:
You need to allow candidates to search for jobs in a specific country.What do you need to do?
○
A
Configure a filter field and add it to the Internal and External Search settings.○
B
Configure the derived country field and add it as a filter on the Internal and External Search settings.○
C
Configure a background element and map it to the Succession Data Model.○
D
Configure the country field on the application template to allow candidates to search for jobs in their country.
SAP
C_THR83_2505
Q5:
The (S) Sourcer operator has a field permission taken away but the V operator gives permission to that field. The (S) Sourcer is an approver in the Route Map. What is the result?
○
A
The V permission overrides the taken away S permission.○
B
The V permission causes the S permission to only allow for reporting of the field in questions .○
C
It depends on the order in which the permissions were configured.○
D
The V permission is irrelevant in this situation.