ログイン

xj9 - 19628 - d2
98問 • 1年前
  • critical flaw
  • 通報

    問題一覧

  • 1

    Which type of IdentityIQ task checks for policy violations?
 The Identity Certification task

    False

  • 2

    Which type of IdentityIQ task checks for policy violations? The Remediation task

    False

  • 3

    Which type of IdentityIQ task checks for policy violations? The Policy task

    False

  • 4

    Which type of IdentityIQ task checks for policy violations? The Identity Refresh task

    True

  • 5

    Certification Events can be automatically triggered by a wide range of data changes within IdentityIQ, such as changing departments. The Perform Maintenance task must run for the certification process to complete

    True

  • 6

    You can exclude certain users (such as executives) from a certification campaign by using _____________.
 A custom workflow

    False

  • 7

    You can exclude certain users (such as executives) from a certification campaign by using _____________. A global setting

    False

  • 8

    You can exclude certain users (such as executives) from a certification campaign by using _____________.
 An exception policy

    False

  • 9

    You can exclude certain users (such as executives) from a certification campaign by using _____________.
 An exclusion rule

    True

  • 10

    Which role type supports this scenario: Mark is going to a conference and needs to be able to request access to purchase tickets and file expense reports.
 Birthright

    False

  • 11

    Which role type supports this scenario: Mark is going to a conference and needs to be able to request access to purchase tickets and file expense reports. Business

    True

  • 12

    All employees need to be issued an email address and membership in the DomainUsers group in Active Directory on day one of their employment.
 Business

    False

  • 13

    All employees need to be issued an email address and membership in the DomainUsers group in Active Directory on day one of their employment. Birthright

    True

  • 14

    Required relationships define the IT roles that are mandatory for any user who has a certain business role; while permitted relationships define the IT roles which a user is allowed to have, based on having a certain business role.

    True

  • 15

    The certification process can cause provisioning.

    True

  • 16

    Access requests cause the generation of a provisioning plan.

    True

  • 17

    An application connector can be forced to provision via IdentityIQ work items by removing “PROVISIONING” from the application features string.

    True

  • 18

    What is a workflow case?
 The object assigned to a user by the workflow when the workflow requires input from a user.

    False

  • 19

    What is a workflow case? The object that represents a running instance of a workflow.

    True

  • 20

    From the Administrator Console, you can view details about failed provisioning attempts and create a manual work item to complete the request.

    True

  • 21

    The Process Events option in an Identity Refresh task directs IdentityIQ to initiate the lifecycle event workflows.

    True

  • 22

    Rapid Setup Joiner runs for all new identity cubes created from any application.

    True

  • 23

    You can specify multiple triggers for the mover lifecycle event, for example, watching for changes in job title, department, or manager.

    True

  • 24

    Lifecycle Events, outside the Rapid Setup events, can only be used for situations other than joiner, mover, or leaver actions.

    False

  • 25

    To be able to view the lifecycle event details under Track My Requests, you must:
 Turn on auditing for identity lifecycle event execution

    False

  • 26

    To be able to view the lifecycle event details under Track My Requests, you must: Run an Advanced Analytics query

    False

  • 27

    To be able to view the lifecycle event details under Track My Requests, you must:
 Use a workflow that creates and updates the request record

    True

  • 28

    On a per Quicklink population basis, a rule can be implemented to constrain what members can request.

    True

  • 29

    A Quicklink population allows you to define a set of users who can make access requests for other sets of users.

    True

  • 30

    Through the Manage User Access Quicklink, a user can:
 Disable or enable accounts on a connected application

    False

  • 31

    Through the Manage User Access Quicklink, a user can:
 Manage passwords on connected applications

    False

  • 32

    Through the Manage User Access Quicklink, a user can:
 Request or remove entitlements and/or roles

    True

  • 33

    The requestability of an entitlement is configured in the Entitlement Catalog.

    True

  • 34

    While requesting access, you can search for entitlements using the extended attributes you’ve added to IdentityIQ.

    True

  • 35

    Roles can be configured to automatically be enabled at a specified future date.

    True

  • 36

    Attachments can be added in which type of Quicklink process:
 Edit Identity

    False

  • 37

    Attachments can be added in which type of Quicklink process:
 Manage Passwords

    False

  • 38

    Attachments can be added in which type of Quicklink process:
 Manage Accounts

    False

  • 39

    Attachments can be added in which type of Quicklink process:
 Manage User Access

    True

  • 40

    The Recommendation Engine can provide a recommendation for approving or denying a request for access.

    True

  • 41

    Quicklink behaviour can be configured per Quicklink population.

    True

  • 42

    Both methods can disallow users from deleting their accounts on connected systems: In the LCM Configuration, disallow the Delete option for the My Actions category of users and removing access to the Manage Accounts Quicklink for the Self Service Quicklink population.

    True

  • 43

    Password Policies must be defined for each application for which managing passwords is supported.

    False

  • 44

    You can use the Edit Identity Quicklink to modify an identity’s attributes and trigger attribute synchronization to other applications.

    True

  • 45

    IdentityIQ can only monitor for password change requests originating from IdentityIQ.

    False

  • 46

    IdentityIQ can kick off a certification campaign for an identity when it detects a change in that person's account attributes.

    True

  • 47

    What are batch requests typically used for within IdentityIQ?
 Triggering aggregation/refresh tasks for many identities or accounts

    False

  • 48

    What are batch requests typically used for within IdentityIQ?
 Logging the activity of many identities or accounts

    False

  • 49

    What are batch requests typically used for within IdentityIQ?
 Bulk loading identities or identity updates

    True

  • 50

    In IdentityIQ, new account groups can be created and provisioned in a connected application by using the Add New Entitlement button located in the Entitlement Catalog.

    True

  • 51

    Which of the following is true of the Rapid Setup Termination process?
 It launches the Leaver Lifecycle Event for the selected user.

    False

  • 52

    Which of the following is true of the Rapid Setup Termination process?
 Access to it is controlled by a Quicklink Population.

    False

  • 53

    Which of the following is true of the Rapid Setup Termination process?
 It has its own parallel configurations to the Rapid Setup Leaver options.

    True

  • 54

    When designating a batch host, a best practice is to add the host name to the Task ServiceDefinition object and the Request ServiceDefinition object.

    True

  • 55

    The critical network performance zone is between the user’s browser and IdentityIQ. It requires a round trip latency of 3ms or less.

    False

  • 56

    SailPoint recommends use of multiple environments and a version control system as part of your deployment management strategy.

    True

  • 57

    The Services Standard Build (SSB) is a deployment process provided by SailPoint that is required when deploying IdentityIQ.

    False

  • 58

    Which of the following is not an IdentityIQ module?
 Compliance Manager

    False

  • 59

    Which of the following is not an IdentityIQ module?
 Lifecycle Manager

    False

  • 60

    Which of the following is not an IdentityIQ module?
 File Access Manager

    True

  • 61

    What are Identities
 Reading or collecting identity data from an enterprise application into IdentityIQ

    False

  • 62

    What are Identities
 The type of access a user when logging into an application. Also called permission

    False

  • 63

    What are Identities
 Any resource you want to manage, such as operating systems, directories or databases

    False

  • 64

    What are Identities
 IdentityIQ users and those with access to systems in your organization

    True

  • 65

    What is an Application
 IdentityIQ users and those with access to systems in your organization

    False

  • 66

    What is an Application
 Reading or collecting identity data from an enterprise application into IdentityIQ

    False

  • 67

    What is an Application
 The type of access a user when logging into an application. Also called permission

    False

  • 68

    What is an Application
 Any resource you want to manage, such as operating systems, directories or databases

    True

  • 69

    What are Entitlements
 IdentityIQ users and those with access to systems in your organization

    False

  • 70

    What are Entitlements
 Any resource you want to manage, such as operating systems, directories or databases

    False

  • 71

    What are Entitlements
 Reading or collecting identity data from an enterprise application into IdentityIQ

    False

  • 72

    What are Entitlements
 The type of access a user when logging into an application. Also called permission

    True

  • 73

    What is an Aggregation
 IdentityIQ users and those with access to systems in your organization

    False

  • 74

    What is an Aggregation
 The type of access a user when logging into an application. Also called permission

    False

  • 75

    What is an Aggregation
 Any resource you want to manage, such as operating systems, directories or databases

    False

  • 76

    What is an Aggregation
 Reading or collecting identity data from an enterprise application into IdentityIQ

    True

  • 77

    In IdentityIQ, users can request changes to which of the following?
 Entitlements

    False

  • 78

    In IdentityIQ, users can request changes to which of the following?
 Employee ID number

    False

  • 79

    In IdentityIQ, users can request changes to which of the following?
 Roles

    True

  • 80

    In IdentityIQ, users can request changes to which of the following?
 Password

    True

  • 81

    Select the types of events that can trigger provisioning in IdentityIQ
 An employee adopts a baby

    False

  • 82

    Select the types of events that can trigger provisioning in IdentityIQ
 A new employee

    True

  • 83

    Select the types of events that can trigger provisioning in IdentityIQ
 An employee retires

    True

  • 84

    Select the types of events that can trigger provisioning in IdentityIQ
 An employee moves from London to Toronto

    True

  • 85

    The certifier in a certification campaign is always the current manager of each employee.

    False

  • 86

    A policy definition disallows an identity to have both Admin and manager access on the Time Clock system. A user already has the Manager entitlement when she submits a request for Admin. IdentityIQ compares the access being requested and the user’s existing access to the policies. What kind of policy is this?
 Compliance

    False

  • 87

    A policy definition disallows an identity to have both Admin and manager access on the Time Clock system. A user already has the Manager entitlement when she submits a request for Admin. IdentityIQ compares the access being requested and the user’s existing access to the policies. What kind of policy is this?
 Detective

    False

  • 88

    A policy definition disallows an identity to have both Admin and manager access on the Time Clock system. A user already has the Manager entitlement when she submits a request for Admin. IdentityIQ compares the access being requested and the user’s existing access to the policies. What kind of policy is this?
 Preventive

    True

  • 89

    Identity search only allows you to search on the standard identity attributes that are pre-defined by IdentityIQ

    False

  • 90

    What is displayed on the My Reports tab?
 Only custom reports you or your implementation team have created

    False

  • 91

    What is displayed on the My Reports tab?
 Every report template that you IdentityIQ capabilities allow you to access

    False

  • 92

    What is displayed on the My Reports tab?
 Reports that you have configured and searches that have been saved as reports

    True

  • 93

    IdentityIQ roles are required to ensure proper access security.

    False

  • 94

    Roles can be manually requested by users and automatically assigned to users.

    True

  • 95

    Select all the objects that support extended attributes.
 Quicklinks

    False

  • 96

    Select all the objects that support extended attributes.
 Identity Cubes

    True

  • 97

    Select all the objects that support extended attributes.
 Applications

    True

  • 98

    Select all the objects that support extended attributes.
 Entitlements

    True

  • xj9 - 19628 - a

    xj9 - 19628 - a

    critical flaw · 98問 · 2年前

    xj9 - 19628 - a

    xj9 - 19628 - a

    98問 • 2年前
    critical flaw

    xj9 - 19628 - b

    xj9 - 19628 - b

    critical flaw · 30問 · 2年前

    xj9 - 19628 - b

    xj9 - 19628 - b

    30問 • 2年前
    critical flaw

    xj9 - 19628 - c

    xj9 - 19628 - c

    critical flaw · 99問 · 1年前

    xj9 - 19628 - c

    xj9 - 19628 - c

    99問 • 1年前
    critical flaw

    xj9 - 19628 - d1

    xj9 - 19628 - d1

    critical flaw · 99問 · 1年前

    xj9 - 19628 - d1

    xj9 - 19628 - d1

    99問 • 1年前
    critical flaw

    1. Shattershot

    1. Shattershot

    critical flaw · 50問 · 1年前

    1. Shattershot

    1. Shattershot

    50問 • 1年前
    critical flaw

    Conquest Book 1

    Conquest Book 1

    critical flaw · 100問 · 1年前

    Conquest Book 1

    Conquest Book 1

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D1 - A

    k3ch - 2910116 - D1 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D1 - A

    k3ch - 2910116 - D1 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D1 - B

    k3ch - 2910116 - D1 - B

    critical flaw · 65問 · 1年前

    k3ch - 2910116 - D1 - B

    k3ch - 2910116 - D1 - B

    65問 • 1年前
    critical flaw

    k3ch - 2910116 - D2 - A

    k3ch - 2910116 - D2 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D2 - A

    k3ch - 2910116 - D2 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D2 - B

    k3ch - 2910116 - D2 - B

    critical flaw · 55問 · 1年前

    k3ch - 2910116 - D2 - B

    k3ch - 2910116 - D2 - B

    55問 • 1年前
    critical flaw

    k3ch - 2910116 - D3 - A

    k3ch - 2910116 - D3 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D3 - A

    k3ch - 2910116 - D3 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D3 - B

    k3ch - 2910116 - D3 - B

    critical flaw · 63問 · 1年前

    k3ch - 2910116 - D3 - B

    k3ch - 2910116 - D3 - B

    63問 • 1年前
    critical flaw

    k3ch - 2910116 - D4 - A

    k3ch - 2910116 - D4 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D4 - A

    k3ch - 2910116 - D4 - A

    100問 • 1年前
    critical flaw

    1. X-Tinction Agenda

    1. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    1. X-Tinction Agenda

    1. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    2. X-Tinction Agenda

    2. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    2. X-Tinction Agenda

    2. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    3. X-Tinction Agenda

    3. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    3. X-Tinction Agenda

    3. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    4. X-Tinction Agenda

    4. X-Tinction Agenda

    critical flaw · 90問 · 1年前

    4. X-Tinction Agenda

    4. X-Tinction Agenda

    90問 • 1年前
    critical flaw

    Executioner's Song Book 1

    Executioner's Song Book 1

    critical flaw · 30問 · 1年前

    Executioner's Song Book 1

    Executioner's Song Book 1

    30問 • 1年前
    critical flaw

    問題一覧

  • 1

    Which type of IdentityIQ task checks for policy violations?
 The Identity Certification task

    False

  • 2

    Which type of IdentityIQ task checks for policy violations? The Remediation task

    False

  • 3

    Which type of IdentityIQ task checks for policy violations? The Policy task

    False

  • 4

    Which type of IdentityIQ task checks for policy violations? The Identity Refresh task

    True

  • 5

    Certification Events can be automatically triggered by a wide range of data changes within IdentityIQ, such as changing departments. The Perform Maintenance task must run for the certification process to complete

    True

  • 6

    You can exclude certain users (such as executives) from a certification campaign by using _____________.
 A custom workflow

    False

  • 7

    You can exclude certain users (such as executives) from a certification campaign by using _____________. A global setting

    False

  • 8

    You can exclude certain users (such as executives) from a certification campaign by using _____________.
 An exception policy

    False

  • 9

    You can exclude certain users (such as executives) from a certification campaign by using _____________.
 An exclusion rule

    True

  • 10

    Which role type supports this scenario: Mark is going to a conference and needs to be able to request access to purchase tickets and file expense reports.
 Birthright

    False

  • 11

    Which role type supports this scenario: Mark is going to a conference and needs to be able to request access to purchase tickets and file expense reports. Business

    True

  • 12

    All employees need to be issued an email address and membership in the DomainUsers group in Active Directory on day one of their employment.
 Business

    False

  • 13

    All employees need to be issued an email address and membership in the DomainUsers group in Active Directory on day one of their employment. Birthright

    True

  • 14

    Required relationships define the IT roles that are mandatory for any user who has a certain business role; while permitted relationships define the IT roles which a user is allowed to have, based on having a certain business role.

    True

  • 15

    The certification process can cause provisioning.

    True

  • 16

    Access requests cause the generation of a provisioning plan.

    True

  • 17

    An application connector can be forced to provision via IdentityIQ work items by removing “PROVISIONING” from the application features string.

    True

  • 18

    What is a workflow case?
 The object assigned to a user by the workflow when the workflow requires input from a user.

    False

  • 19

    What is a workflow case? The object that represents a running instance of a workflow.

    True

  • 20

    From the Administrator Console, you can view details about failed provisioning attempts and create a manual work item to complete the request.

    True

  • 21

    The Process Events option in an Identity Refresh task directs IdentityIQ to initiate the lifecycle event workflows.

    True

  • 22

    Rapid Setup Joiner runs for all new identity cubes created from any application.

    True

  • 23

    You can specify multiple triggers for the mover lifecycle event, for example, watching for changes in job title, department, or manager.

    True

  • 24

    Lifecycle Events, outside the Rapid Setup events, can only be used for situations other than joiner, mover, or leaver actions.

    False

  • 25

    To be able to view the lifecycle event details under Track My Requests, you must:
 Turn on auditing for identity lifecycle event execution

    False

  • 26

    To be able to view the lifecycle event details under Track My Requests, you must: Run an Advanced Analytics query

    False

  • 27

    To be able to view the lifecycle event details under Track My Requests, you must:
 Use a workflow that creates and updates the request record

    True

  • 28

    On a per Quicklink population basis, a rule can be implemented to constrain what members can request.

    True

  • 29

    A Quicklink population allows you to define a set of users who can make access requests for other sets of users.

    True

  • 30

    Through the Manage User Access Quicklink, a user can:
 Disable or enable accounts on a connected application

    False

  • 31

    Through the Manage User Access Quicklink, a user can:
 Manage passwords on connected applications

    False

  • 32

    Through the Manage User Access Quicklink, a user can:
 Request or remove entitlements and/or roles

    True

  • 33

    The requestability of an entitlement is configured in the Entitlement Catalog.

    True

  • 34

    While requesting access, you can search for entitlements using the extended attributes you’ve added to IdentityIQ.

    True

  • 35

    Roles can be configured to automatically be enabled at a specified future date.

    True

  • 36

    Attachments can be added in which type of Quicklink process:
 Edit Identity

    False

  • 37

    Attachments can be added in which type of Quicklink process:
 Manage Passwords

    False

  • 38

    Attachments can be added in which type of Quicklink process:
 Manage Accounts

    False

  • 39

    Attachments can be added in which type of Quicklink process:
 Manage User Access

    True

  • 40

    The Recommendation Engine can provide a recommendation for approving or denying a request for access.

    True

  • 41

    Quicklink behaviour can be configured per Quicklink population.

    True

  • 42

    Both methods can disallow users from deleting their accounts on connected systems: In the LCM Configuration, disallow the Delete option for the My Actions category of users and removing access to the Manage Accounts Quicklink for the Self Service Quicklink population.

    True

  • 43

    Password Policies must be defined for each application for which managing passwords is supported.

    False

  • 44

    You can use the Edit Identity Quicklink to modify an identity’s attributes and trigger attribute synchronization to other applications.

    True

  • 45

    IdentityIQ can only monitor for password change requests originating from IdentityIQ.

    False

  • 46

    IdentityIQ can kick off a certification campaign for an identity when it detects a change in that person's account attributes.

    True

  • 47

    What are batch requests typically used for within IdentityIQ?
 Triggering aggregation/refresh tasks for many identities or accounts

    False

  • 48

    What are batch requests typically used for within IdentityIQ?
 Logging the activity of many identities or accounts

    False

  • 49

    What are batch requests typically used for within IdentityIQ?
 Bulk loading identities or identity updates

    True

  • 50

    In IdentityIQ, new account groups can be created and provisioned in a connected application by using the Add New Entitlement button located in the Entitlement Catalog.

    True

  • 51

    Which of the following is true of the Rapid Setup Termination process?
 It launches the Leaver Lifecycle Event for the selected user.

    False

  • 52

    Which of the following is true of the Rapid Setup Termination process?
 Access to it is controlled by a Quicklink Population.

    False

  • 53

    Which of the following is true of the Rapid Setup Termination process?
 It has its own parallel configurations to the Rapid Setup Leaver options.

    True

  • 54

    When designating a batch host, a best practice is to add the host name to the Task ServiceDefinition object and the Request ServiceDefinition object.

    True

  • 55

    The critical network performance zone is between the user’s browser and IdentityIQ. It requires a round trip latency of 3ms or less.

    False

  • 56

    SailPoint recommends use of multiple environments and a version control system as part of your deployment management strategy.

    True

  • 57

    The Services Standard Build (SSB) is a deployment process provided by SailPoint that is required when deploying IdentityIQ.

    False

  • 58

    Which of the following is not an IdentityIQ module?
 Compliance Manager

    False

  • 59

    Which of the following is not an IdentityIQ module?
 Lifecycle Manager

    False

  • 60

    Which of the following is not an IdentityIQ module?
 File Access Manager

    True

  • 61

    What are Identities
 Reading or collecting identity data from an enterprise application into IdentityIQ

    False

  • 62

    What are Identities
 The type of access a user when logging into an application. Also called permission

    False

  • 63

    What are Identities
 Any resource you want to manage, such as operating systems, directories or databases

    False

  • 64

    What are Identities
 IdentityIQ users and those with access to systems in your organization

    True

  • 65

    What is an Application
 IdentityIQ users and those with access to systems in your organization

    False

  • 66

    What is an Application
 Reading or collecting identity data from an enterprise application into IdentityIQ

    False

  • 67

    What is an Application
 The type of access a user when logging into an application. Also called permission

    False

  • 68

    What is an Application
 Any resource you want to manage, such as operating systems, directories or databases

    True

  • 69

    What are Entitlements
 IdentityIQ users and those with access to systems in your organization

    False

  • 70

    What are Entitlements
 Any resource you want to manage, such as operating systems, directories or databases

    False

  • 71

    What are Entitlements
 Reading or collecting identity data from an enterprise application into IdentityIQ

    False

  • 72

    What are Entitlements
 The type of access a user when logging into an application. Also called permission

    True

  • 73

    What is an Aggregation
 IdentityIQ users and those with access to systems in your organization

    False

  • 74

    What is an Aggregation
 The type of access a user when logging into an application. Also called permission

    False

  • 75

    What is an Aggregation
 Any resource you want to manage, such as operating systems, directories or databases

    False

  • 76

    What is an Aggregation
 Reading or collecting identity data from an enterprise application into IdentityIQ

    True

  • 77

    In IdentityIQ, users can request changes to which of the following?
 Entitlements

    False

  • 78

    In IdentityIQ, users can request changes to which of the following?
 Employee ID number

    False

  • 79

    In IdentityIQ, users can request changes to which of the following?
 Roles

    True

  • 80

    In IdentityIQ, users can request changes to which of the following?
 Password

    True

  • 81

    Select the types of events that can trigger provisioning in IdentityIQ
 An employee adopts a baby

    False

  • 82

    Select the types of events that can trigger provisioning in IdentityIQ
 A new employee

    True

  • 83

    Select the types of events that can trigger provisioning in IdentityIQ
 An employee retires

    True

  • 84

    Select the types of events that can trigger provisioning in IdentityIQ
 An employee moves from London to Toronto

    True

  • 85

    The certifier in a certification campaign is always the current manager of each employee.

    False

  • 86

    A policy definition disallows an identity to have both Admin and manager access on the Time Clock system. A user already has the Manager entitlement when she submits a request for Admin. IdentityIQ compares the access being requested and the user’s existing access to the policies. What kind of policy is this?
 Compliance

    False

  • 87

    A policy definition disallows an identity to have both Admin and manager access on the Time Clock system. A user already has the Manager entitlement when she submits a request for Admin. IdentityIQ compares the access being requested and the user’s existing access to the policies. What kind of policy is this?
 Detective

    False

  • 88

    A policy definition disallows an identity to have both Admin and manager access on the Time Clock system. A user already has the Manager entitlement when she submits a request for Admin. IdentityIQ compares the access being requested and the user’s existing access to the policies. What kind of policy is this?
 Preventive

    True

  • 89

    Identity search only allows you to search on the standard identity attributes that are pre-defined by IdentityIQ

    False

  • 90

    What is displayed on the My Reports tab?
 Only custom reports you or your implementation team have created

    False

  • 91

    What is displayed on the My Reports tab?
 Every report template that you IdentityIQ capabilities allow you to access

    False

  • 92

    What is displayed on the My Reports tab?
 Reports that you have configured and searches that have been saved as reports

    True

  • 93

    IdentityIQ roles are required to ensure proper access security.

    False

  • 94

    Roles can be manually requested by users and automatically assigned to users.

    True

  • 95

    Select all the objects that support extended attributes.
 Quicklinks

    False

  • 96

    Select all the objects that support extended attributes.
 Identity Cubes

    True

  • 97

    Select all the objects that support extended attributes.
 Applications

    True

  • 98

    Select all the objects that support extended attributes.
 Entitlements

    True