The correct answer isB – View Security for Securable Item.
In Workday, everytask,report,domain, andbusiness processis considered asecurable item. To analyze how access to a specific task (likeChange My Legal Name) is controlled, the system administrator uses theView Security for Securable Itemreport.
This report allows users to:
Identifywhich domain security policygoverns the securable item,
Seewhat security groupscurrently have access,
Determinethe type of accessgranted (View, Modify, Initiate, etc.), and
Understand thesecurity policy inheritanceassociated with the item.
For example, when you run this report and enter “Change My Legal Name” as the securable item, Workday returns the domain policy controlling it—typically within theWorker Data: Personal Informationdomain. From there, security administrators can update access via theMaintain Domain Security Policy for Functional Areatask if necessary.
This is thestandard and recommended Workday methodfor determining how any specific action, report, or task is secured.
[Reference:Workday Pro HCM –Security Fundamentals, “Analyzing Access with the View Security for Securable Item Report” section., ]
Submit