Can she adjust security assignments for other Supervisors?
Refer to the figure shown: A Supervisor has access rights assigned as shown in the image, at the same levels across all sites. Can she adjust security assignments for other Supervisors?A . YesB . NoC . Only for the same siteD . Cannot tell from image, ability depends on her...
Which of the following is true for “Marked Tim”?
Which of the following is true for “Marked Tim”?A . The only difference between an "Exception" and "Marked Time" is that an Exception may be asked by an Agent while Marked Time may notB . When an "Marked Time" is scheduled Agent is taken away from his/her Work for the...
What are the possible actions one can take in order to avoid an Agent available in WFM Configuration Utility to be scheduled at all during the next schedule period? (Choose three.)
What are the possible actions one can take in order to avoid an Agent available in WFM Configuration Utility to be scheduled at all during the next schedule period? (Choose three.)A . Change the skill levels in WFM Configuration UtilityB . Disable Skills in WFM Configuration UtilityC . Remove the...
Which two actions can you perform using the WFM Configuration Utility? (Choose two.)
Which two actions can you perform using the WFM Configuration Utility? (Choose two.)A . Modify scheduleB . Create a ReportC . Create a shiftD . Change access rights to scheduling moduleView AnswerAnswer: AC
Where in WFM Configuration Utility do you define business hours for a contact center?
Where in WFM Configuration Utility do you define business hours for a contact center?A . OrganizationB . Activity PoliciesC . Contract Site RulesD . Contract AvailabilityE . Rotating PatternsView AnswerAnswer: E Explanation: Reference: http://docs.genesys.com/Documentation/WM/8.1.2/Admin/AboutPol
Which of the following would provide greater insight on the potential impact of this attempted attack?
Ann, a member of the finance department at a large corporation, has submitted a suspicious email she received to the information security team. The team was not expecting an email from Ann, and it contains a PDF file inside a ZIP compressed archive. The information security learn is not sure...
How is the notification performed?
Alerts in the Performance module are notifications that occur when pre-configured thresholds are reached. How is the notification performed?A . Through EmailB . Through a Configurable EventC . By displaying the word "ALERT" with no audible signalD . By displaying the word "ALERT' with audible signalE . Through audible signal...
When a call arrives on a Routing Point and needs to be delivered to an Agent with a specific skill, which Genesys Solution actually decides who will receive the call?
When a call arrives on a Routing Point and needs to be delivered to an Agent with a specific skill, which Genesys Solution actually decides who will receive the call?A . Workforce ManagementB . Outbound ContactC . Universal RoutingD . Solution ReportingView AnswerAnswer: A Explanation: Reference: http://docs.genesys.com/Documentation/Composer/8.1.3/Help/RoutingFAQs
For which of following activity types can you configure statistics to collect historical data? (Choose two.)
For which of following activity types can you configure statistics to collect historical data? (Choose two.)A . Immediate WorkB . Deferred WorkC . Fixed Staff WorkD . Temp Staff WorkView AnswerAnswer: BD
Which of the following interfaces can be localized without any programming knowledge? (Choose two.)
Which of the following interfaces can be localized without any programming knowledge? (Choose two.)A . WFM Database UtilityB . WFM Configuration UtilityC . WFM Web for AgentsD . WFM Web for SupervisorsView AnswerAnswer: BD