ログイン

xj9 - 19628 - c
99問 • 1年前
  • critical flaw
  • 通報

    問題一覧

  • 1

    Why might someone using IdentityIQ to aggregate accounts set the option "Disable optimization of unchanged accounts = true" on application aggregation task? It is never a good idea to disable the built-in native aggregation optimization.

    False

  • 2

    Why might someone using IdentityIQ to aggregate accounts set the option "Disable optimization of unchanged accounts = true" on application aggregation task? It is a best practice for production system if identityIQ aggregation performance is not a concern.

    False

  • 3

    Why might someone using IdentityIQ to aggregate accounts set the option "Disable optimization of unchanged accounts = true" on application aggregation task? It is a best practice during the development phase, because it allows the developer to test changes made to how the data is being processed.

    True

  • 4

    Entitlements and groups that are included in the Entitlement Catalog have many uses within IdentityI Q. Which one of the following is NOT a use of items in the Entitlement Catalog? Requestable through Lifecycle Manager

    False

  • 5

    Entitlements and groups that are included in the Entitlement Catalog have many uses within IdentityI Q. Which one of the following is NOT a use of items in the Entitlement Catalog? Available to include in roles

    False

  • 6

    Entitlements and groups that are included in the Entitlement Catalog have many uses within IdentityI Q. Which one of the following is NOT a use of items in the Entitlement Catalog? Available for defining policies

    False

  • 7

    Entitlements and groups that are included in the Entitlement Catalog have many uses within IdentityI Q. Which one of the following is NOT a use of items in the Entitlement Catalog? Available for defining risk

    False

  • 8

    Entitlements and groups that are included in the Entitlement Catalog have many uses within IdentityI Q. Which one of the following is NOT a use of items in the Entitlement Catalog? Available as group factories

    True

  • 9

    The Rapid Setup mover configuration options, which can be triggered when a user moves within your organization are:
 Delete specified application accounts

    False

  • 10

    The Rapid Setup mover configuration options, which can be triggered when a user moves within your organization are: Reassign identities who report to the moving user to another user or workgroup

    False

  • 11

    The Rapid Setup mover configuration options, which can be triggered when a user moves within your organization are: Re-run the joiner logic to adjust birthright role assignments

    True

  • 12

    The Rapid Setup mover configuration options, which can be triggered when a user moves within your organization are: Certify the user's access on specified application

    True

  • 13

    What is the minimum process to fully promote entitlements on the identity cube, for example, to include entitlements in certifications? 
Mark the schema attribute for the entitlement as "Entitlement" and aggregate the application

    False

  • 14

    What is the minimum process to fully promote entitlements on the identity cube, for example, to include entitlements in certifications? Mark the schema attribute for the entitlement as "Managed", aggregate the application, and refresh t he identity cubes

    False

  • 15

    What is the minimum process to fully promote entitlements on the identity cube, for example, to include entitlements in certifications? Mark the schema attribute for the entitlement as "Managed" and aggregate the application

    False

  • 16

    What is the minimum process to fully promote entitlements on the identity cube, for example, to include entitlements in certifications? Mark the schema attribute for the entitlement as "Entitlement", aggregate the application, and refresh the identity cubes

    True

  • 17

    Which of the following log levels will provide the most detailed information? 
Warn

    False

  • 18

    Which of the following log levels will provide the most detailed information? 
Error

    False

  • 19

    Which of the following log levels will provide the most detailed information? 
Info

    False

  • 20

    Which of the following log levels will provide the most detailed information? 
Debug

    False

  • 21

    Which of the following log levels will provide the most detailed information? 
Trace

    True

  • 22

    When you view a user's record (identity cube) you can see how a user acquired a role. In the default role model, what is the difference between assigned and detached? 
Assigned means that the role is an IT role and that this user was given that role by someone or through a rule; detached means the role is a business role and IdentityIQ recognized that the user has the access defined in the role

    False

  • 23

    When you view a user's record (identity cube) you can see how a user acquired a role. In the default role model, what is the difference between assigned and detached? 
Assigned means that the role is business role and this user was assigned the role through the authoritative source; detached means that the role is an IT role that was requested through Lifecycle Manager

    False

  • 24

    When you view a user's record (identity cube) you can see how a user acquired a role. In the default role model, what is the difference between assigned and detached? 
Assigned means that the role is an IT role and this user was assigned the role through the authoritative source; detached means that the role is a business role that was requested through Lifecycle Manager

    False

  • 25

    When you view a user's record (identity cube) you can see how a user acquired a role. In the default role model, what is the difference between assigned and detached? 
Assigned means that the role is a business role and that this user was given that role by someone or through a rule; detached means the role is an IT role and identityIQ recognized that the user has the access defined in the role

    True

  • 26

    Certification of Events can be automatically triggered by a wide range of data changes within IdentityIQ, such as manager change.

    True

  • 27

    Through Rapid Setup, you can configure, per application, whether the application's entitlements are created in the Entitlement Catalog as requestable or not.

    True

  • 28

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default? 
Their own column in the database

    False

  • 29

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default? The WEB-INF directory

    False

  • 30

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default? In the application server

    False

  • 31

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default? 
In a CLOB

    True

  • 32

    Lifecycle Events can be created based on native changes. What is a native change? 
A change detected stemming from a rule

    False

  • 33

    Lifecycle Events can be created based on native changes. What is a native change? A change detected in identity attributes

    False

  • 34

    Lifecycle Events can be created based on native changes. What is a native change? 
A change detected during application aggregation

    True

  • 35

    When you implement with Rapid Setup, the Rapid Setup Joiner, Mover, and Leaver configurations still require you to write the workflow to execute the process.

    False

  • 36

    When implementing policies, a best practice is to set the _________ option to preview what impact they will have on the system. 
Capabilities

    False

  • 37

    When implementing policies, a best practice is to set the _________ option to preview what impact they will have on the system. Inactive State

    False

  • 38

    When implementing policies, a best practice is to set the _________ option to preview what impact they will have on the system. Check active policies

    False

  • 39

    When implementing policies, a best practice is to set the _________ option to preview what impact they will have on the system. 
Simulate

    True

  • 40

    Which is NOT a valid method for creating Identity Cubes? 
Bulk import

    False

  • 41

    Which is NOT a valid method for creating Identity Cubes? 
LCM Create Identity

    False

  • 42

    Which is NOT a valid method for creating Identity Cubes? 
By running aggregation takes to read user accounts from applications that we systems of record (such as an HR System)

    False

  • 43

    Which is NOT a valid method for creating Identity Cubes? Through the identity Warehouse

    True

  • 44

    The only users who can track an access request are the requesters themselves.

    False

  • 45

    In the standard IdentityIQ access request workflow (LCM Provisioning), the default approver is the owner.

    True

  • 46

    Rapid Setup Joiner configuration defines the operations that are launched when a user joins a new group within your organization, such as department transfer.

    False

  • 47

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct.
 Groups are used to assign IdentityIQ responsibilities (i. e. ownership of an application to set of identities. Membership is assigned manually or through rules.

    False

  • 48

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct. Workgroups are used to control or filter which cubes are being processed (i. e. limit a refresh task to a set of identities). The set of identities are based on a single attribute.

    False

  • 49

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct. Populations are used to assign IdentityIQ responsibilities (i. e. ownership of an application) to a set identities. Membership is assigned manually or through rules.

    False

  • 50

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct. Populations are used to control of filter which cubes are being processed (i. e. limit a refresh t ask to a set of identities). The set of identities are based on a save search.

    True

  • 51

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct. Groups are used to control or filter which cubes are being processed (i. e. filter a report on set of identities). The set of identities are based on a single attribute.

    True

  • 52

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct. Workgroups are used to assign IdentityIQ responsibilities (i. e. ownership of an application to a set of identities. Membership is assigned manually or through rules.

    True

  • 53

    You can use the Edit Identity Quicklink to modify an identity's attributes and trigger attribute synchronization to other applications.

    True

  • 54

    Which of these options defines how the account attributes within a provisioning plan are populated?
 Application schemas

    False

  • 55

    Which of these options defines how the account attributes within a provisioning plan are populated?
 Policy definitions

    False

  • 56

    Which of these options defines how the account attributes within a provisioning plan are populated?
 Build Map rule

    False

  • 57

    Which of these options defines how the account attributes within a provisioning plan are populated?
 Provisioning policies

    True

  • 58

    In the aggregation/refresh process, lifecycle events can be launched when a data change is detected during aggregation. Which option on the refresh task causes the refresh to trigger the lifecycle event workflows?
 Refresh assigned, detected roles and promote additional entitlements

    False

  • 59

    In the aggregation/refresh process, lifecycle events can be launched when a data change is detected during aggregation. Which option on the refresh task causes the refresh to trigger the lifecycle event workflows? Check active policies

    False

  • 60

    In the aggregation/refresh process, lifecycle events can be launched when a data change is detected during aggregation. Which option on the refresh task causes the refresh to trigger the lifecycle event workflows? Refresh identity attributes

    False

  • 61

    In the aggregation/refresh process, lifecycle events can be launched when a data change is detected during aggregation. Which option on the refresh task causes the refresh to trigger the lifecycle event workflows?
 Provision assignments

    False

  • 62

    In the aggregation/refresh process, lifecycle events can be launched when a data change is detected during aggregation. Which option on the refresh task causes the refresh to trigger the lifecycle event workflows? Process events

    True

  • 63

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 My Work --> Work Items

    False

  • 64

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 Setup --> Lifecycle Events

    False

  • 65

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 Java Standard Out log

    False

  • 66

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 Intelligence --> Advanced Analytics --> Syslog Search

    True

  • 67

    What does the "-clean" option do when exporting Objects?
 It deletes all passwords from the exported object.

    False

  • 68

    What does the "-clean" option do when exporting Objects? It creates an empty object of the type being exported.

    False

  • 69

    What does the "-clean" option do when exporting Objects?
 It removes the Object completely from the existing IdentityIQ database in preparation for loading it into the next database.

    False

  • 70

    What does the "-clean" option do when exporting Objects? It removes the GUID and creation/modification dates from the Object being exported.

    True

  • 71

    A provisioning plan is passed to a workflow to start the provisioning process. What is included in a provisioning plan?
 One or more request for multiple identities

    False

  • 72

    A provisioning plan is passed to a workflow to start the provisioning process. What is included in a provisioning plan? A set of provisioning policies

    False

  • 73

    A provisioning plan is passed to a workflow to start the provisioning process. What is included in a provisioning plan?
 One request for multiple identities

    False

  • 74

    A provisioning plan is passed to a workflow to start the provisioning process. What is included in a provisioning plan?
 One or more request for one identity

    True

  • 75

    What is a capability in IdentityIQ?
 The responsibilities the user has within the organization (for example, accounting)

    False

  • 76

    What is a capability in IdentityIQ? Quicklinks a user has access to and how the Quicklink is configured

    False

  • 77

    What is a capability in IdentityIQ? What a user can do within the HR system from which IdentityIQ aggregates authoritative accounts

    False

  • 78

    What is a capability in IdentityIQ? The rights a user has within the IdentityIQ

    True

  • 79

    From the Administrator Console, you can view details for a failed provisioning attempt and send a manual workitem to complete the request.

    True

  • 80

    Once a workflow has been launched, what is the name of the object that represents the execution of the workflow?
 SailPoint Context

    False

  • 81

    Once a workflow has been launched, what is the name of the object that represents the execution of the workflow?
 Workflow

    False

  • 82

    Once a workflow has been launched, what is the name of the object that represents the execution of the workflow?
 UIConfig

    False

  • 83

    Once a workflow has been launched, what is the name of the object that represents the execution of the workflow?
 WorkflowCase

    True

  • 84

    What is the difference between a task and a workflow?
 They can be used interchangeable, but a task is pre-compiled and a workflow is interpreted.

    False

  • 85

    What is the difference between a task and a workflow? A task can interact with a user and is typically activated in response to a user action or data change; a workflow performs batch processing and it can be scheduled.

    False

  • 86

    What is the difference between a task and a workflow? A task performs batch processing and it can be scheduled; a workflow can interact with a user and is typically activated in response to a user action or data change.

    True

  • 87

    ________ define which account attributes to read from an application when aggregating accounts with IdentityIQ.
 Connectors

    False

  • 88

    ________ define which account attributes to read from an application when aggregating accounts with IdentityIQ. Delimited files

    False

  • 89

    ________ define which account attributes to read from an application when aggregating accounts with IdentityIQ.
 Group schemas

    False

  • 90

    ________ define which account attributes to read from an application when aggregating accounts with IdentityIQ.
 Account schemas

    True

  • 91

    Which connector requires a provisioning rule to be written when provisioning to applications of the type?
 LDAP

    False

  • 92

    Which connector requires a provisioning rule to be written when provisioning to applications of the type?
 Active Directory

    False

  • 93

    Which connector requires a provisioning rule to be written when provisioning to applications of the type?
 Delimited File

    False

  • 94

    Which connector requires a provisioning rule to be written when provisioning to applications of the type?
 JDBC

    True

  • 95

    There are five important tasks that are shipped pre-scheduled in IdentityIQ. Which task advances certifications through their phases and restarts backgrounded workflows?
 Check sunset requests for notifications daily

    False

  • 96

    There are five important tasks that are shipped pre-scheduled in IdentityIQ. Which task advances certifications through their phases and restarts backgrounded workflows?
 Check expired work items daily

    False

  • 97

    There are five important tasks that are shipped pre-scheduled in IdentityIQ. Which task advances certifications through their phases and restarts backgrounded workflows?
 Check expired mitigations daily

    False

  • 98

    There are five important tasks that are shipped pre-scheduled in IdentityIQ. Which task advances certifications through their phases and restarts backgrounded workflows?
 Perform Identity Request Maintenance

    False

  • 99

    There are five important tasks that are shipped pre-scheduled in IdentityIQ. Which task advances certifications through their phases and restarts backgrounded workflows?
 Perform maintenance

    True

  • xj9 - 19628 - a

    xj9 - 19628 - a

    critical flaw · 98問 · 2年前

    xj9 - 19628 - a

    xj9 - 19628 - a

    98問 • 2年前
    critical flaw

    xj9 - 19628 - b

    xj9 - 19628 - b

    critical flaw · 30問 · 2年前

    xj9 - 19628 - b

    xj9 - 19628 - b

    30問 • 2年前
    critical flaw

    xj9 - 19628 - d1

    xj9 - 19628 - d1

    critical flaw · 99問 · 1年前

    xj9 - 19628 - d1

    xj9 - 19628 - d1

    99問 • 1年前
    critical flaw

    xj9 - 19628 - d2

    xj9 - 19628 - d2

    critical flaw · 98問 · 1年前

    xj9 - 19628 - d2

    xj9 - 19628 - d2

    98問 • 1年前
    critical flaw

    1. Shattershot

    1. Shattershot

    critical flaw · 50問 · 1年前

    1. Shattershot

    1. Shattershot

    50問 • 1年前
    critical flaw

    Conquest Book 1

    Conquest Book 1

    critical flaw · 100問 · 1年前

    Conquest Book 1

    Conquest Book 1

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D1 - A

    k3ch - 2910116 - D1 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D1 - A

    k3ch - 2910116 - D1 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D1 - B

    k3ch - 2910116 - D1 - B

    critical flaw · 65問 · 1年前

    k3ch - 2910116 - D1 - B

    k3ch - 2910116 - D1 - B

    65問 • 1年前
    critical flaw

    k3ch - 2910116 - D2 - A

    k3ch - 2910116 - D2 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D2 - A

    k3ch - 2910116 - D2 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D2 - B

    k3ch - 2910116 - D2 - B

    critical flaw · 55問 · 1年前

    k3ch - 2910116 - D2 - B

    k3ch - 2910116 - D2 - B

    55問 • 1年前
    critical flaw

    k3ch - 2910116 - D3 - A

    k3ch - 2910116 - D3 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D3 - A

    k3ch - 2910116 - D3 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D3 - B

    k3ch - 2910116 - D3 - B

    critical flaw · 63問 · 1年前

    k3ch - 2910116 - D3 - B

    k3ch - 2910116 - D3 - B

    63問 • 1年前
    critical flaw

    k3ch - 2910116 - D4 - A

    k3ch - 2910116 - D4 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D4 - A

    k3ch - 2910116 - D4 - A

    100問 • 1年前
    critical flaw

    1. X-Tinction Agenda

    1. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    1. X-Tinction Agenda

    1. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    2. X-Tinction Agenda

    2. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    2. X-Tinction Agenda

    2. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    3. X-Tinction Agenda

    3. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    3. X-Tinction Agenda

    3. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    4. X-Tinction Agenda

    4. X-Tinction Agenda

    critical flaw · 90問 · 1年前

    4. X-Tinction Agenda

    4. X-Tinction Agenda

    90問 • 1年前
    critical flaw

    Executioner's Song Book 1

    Executioner's Song Book 1

    critical flaw · 30問 · 1年前

    Executioner's Song Book 1

    Executioner's Song Book 1

    30問 • 1年前
    critical flaw

    問題一覧

  • 1

    Why might someone using IdentityIQ to aggregate accounts set the option "Disable optimization of unchanged accounts = true" on application aggregation task? It is never a good idea to disable the built-in native aggregation optimization.

    False

  • 2

    Why might someone using IdentityIQ to aggregate accounts set the option "Disable optimization of unchanged accounts = true" on application aggregation task? It is a best practice for production system if identityIQ aggregation performance is not a concern.

    False

  • 3

    Why might someone using IdentityIQ to aggregate accounts set the option "Disable optimization of unchanged accounts = true" on application aggregation task? It is a best practice during the development phase, because it allows the developer to test changes made to how the data is being processed.

    True

  • 4

    Entitlements and groups that are included in the Entitlement Catalog have many uses within IdentityI Q. Which one of the following is NOT a use of items in the Entitlement Catalog? Requestable through Lifecycle Manager

    False

  • 5

    Entitlements and groups that are included in the Entitlement Catalog have many uses within IdentityI Q. Which one of the following is NOT a use of items in the Entitlement Catalog? Available to include in roles

    False

  • 6

    Entitlements and groups that are included in the Entitlement Catalog have many uses within IdentityI Q. Which one of the following is NOT a use of items in the Entitlement Catalog? Available for defining policies

    False

  • 7

    Entitlements and groups that are included in the Entitlement Catalog have many uses within IdentityI Q. Which one of the following is NOT a use of items in the Entitlement Catalog? Available for defining risk

    False

  • 8

    Entitlements and groups that are included in the Entitlement Catalog have many uses within IdentityI Q. Which one of the following is NOT a use of items in the Entitlement Catalog? Available as group factories

    True

  • 9

    The Rapid Setup mover configuration options, which can be triggered when a user moves within your organization are:
 Delete specified application accounts

    False

  • 10

    The Rapid Setup mover configuration options, which can be triggered when a user moves within your organization are: Reassign identities who report to the moving user to another user or workgroup

    False

  • 11

    The Rapid Setup mover configuration options, which can be triggered when a user moves within your organization are: Re-run the joiner logic to adjust birthright role assignments

    True

  • 12

    The Rapid Setup mover configuration options, which can be triggered when a user moves within your organization are: Certify the user's access on specified application

    True

  • 13

    What is the minimum process to fully promote entitlements on the identity cube, for example, to include entitlements in certifications? 
Mark the schema attribute for the entitlement as "Entitlement" and aggregate the application

    False

  • 14

    What is the minimum process to fully promote entitlements on the identity cube, for example, to include entitlements in certifications? Mark the schema attribute for the entitlement as "Managed", aggregate the application, and refresh t he identity cubes

    False

  • 15

    What is the minimum process to fully promote entitlements on the identity cube, for example, to include entitlements in certifications? Mark the schema attribute for the entitlement as "Managed" and aggregate the application

    False

  • 16

    What is the minimum process to fully promote entitlements on the identity cube, for example, to include entitlements in certifications? Mark the schema attribute for the entitlement as "Entitlement", aggregate the application, and refresh the identity cubes

    True

  • 17

    Which of the following log levels will provide the most detailed information? 
Warn

    False

  • 18

    Which of the following log levels will provide the most detailed information? 
Error

    False

  • 19

    Which of the following log levels will provide the most detailed information? 
Info

    False

  • 20

    Which of the following log levels will provide the most detailed information? 
Debug

    False

  • 21

    Which of the following log levels will provide the most detailed information? 
Trace

    True

  • 22

    When you view a user's record (identity cube) you can see how a user acquired a role. In the default role model, what is the difference between assigned and detached? 
Assigned means that the role is an IT role and that this user was given that role by someone or through a rule; detached means the role is a business role and IdentityIQ recognized that the user has the access defined in the role

    False

  • 23

    When you view a user's record (identity cube) you can see how a user acquired a role. In the default role model, what is the difference between assigned and detached? 
Assigned means that the role is business role and this user was assigned the role through the authoritative source; detached means that the role is an IT role that was requested through Lifecycle Manager

    False

  • 24

    When you view a user's record (identity cube) you can see how a user acquired a role. In the default role model, what is the difference between assigned and detached? 
Assigned means that the role is an IT role and this user was assigned the role through the authoritative source; detached means that the role is a business role that was requested through Lifecycle Manager

    False

  • 25

    When you view a user's record (identity cube) you can see how a user acquired a role. In the default role model, what is the difference between assigned and detached? 
Assigned means that the role is a business role and that this user was given that role by someone or through a rule; detached means the role is an IT role and identityIQ recognized that the user has the access defined in the role

    True

  • 26

    Certification of Events can be automatically triggered by a wide range of data changes within IdentityIQ, such as manager change.

    True

  • 27

    Through Rapid Setup, you can configure, per application, whether the application's entitlements are created in the Entitlement Catalog as requestable or not.

    True

  • 28

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default? 
Their own column in the database

    False

  • 29

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default? The WEB-INF directory

    False

  • 30

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default? In the application server

    False

  • 31

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default? 
In a CLOB

    True

  • 32

    Lifecycle Events can be created based on native changes. What is a native change? 
A change detected stemming from a rule

    False

  • 33

    Lifecycle Events can be created based on native changes. What is a native change? A change detected in identity attributes

    False

  • 34

    Lifecycle Events can be created based on native changes. What is a native change? 
A change detected during application aggregation

    True

  • 35

    When you implement with Rapid Setup, the Rapid Setup Joiner, Mover, and Leaver configurations still require you to write the workflow to execute the process.

    False

  • 36

    When implementing policies, a best practice is to set the _________ option to preview what impact they will have on the system. 
Capabilities

    False

  • 37

    When implementing policies, a best practice is to set the _________ option to preview what impact they will have on the system. Inactive State

    False

  • 38

    When implementing policies, a best practice is to set the _________ option to preview what impact they will have on the system. Check active policies

    False

  • 39

    When implementing policies, a best practice is to set the _________ option to preview what impact they will have on the system. 
Simulate

    True

  • 40

    Which is NOT a valid method for creating Identity Cubes? 
Bulk import

    False

  • 41

    Which is NOT a valid method for creating Identity Cubes? 
LCM Create Identity

    False

  • 42

    Which is NOT a valid method for creating Identity Cubes? 
By running aggregation takes to read user accounts from applications that we systems of record (such as an HR System)

    False

  • 43

    Which is NOT a valid method for creating Identity Cubes? Through the identity Warehouse

    True

  • 44

    The only users who can track an access request are the requesters themselves.

    False

  • 45

    In the standard IdentityIQ access request workflow (LCM Provisioning), the default approver is the owner.

    True

  • 46

    Rapid Setup Joiner configuration defines the operations that are launched when a user joins a new group within your organization, such as department transfer.

    False

  • 47

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct.
 Groups are used to assign IdentityIQ responsibilities (i. e. ownership of an application to set of identities. Membership is assigned manually or through rules.

    False

  • 48

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct. Workgroups are used to control or filter which cubes are being processed (i. e. limit a refresh task to a set of identities). The set of identities are based on a single attribute.

    False

  • 49

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct. Populations are used to assign IdentityIQ responsibilities (i. e. ownership of an application) to a set identities. Membership is assigned manually or through rules.

    False

  • 50

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct. Populations are used to control of filter which cubes are being processed (i. e. limit a refresh t ask to a set of identities). The set of identities are based on a save search.

    True

  • 51

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct. Groups are used to control or filter which cubes are being processed (i. e. filter a report on set of identities). The set of identities are based on a single attribute.

    True

  • 52

    Sets of identities in IdentityIQ can be used for a number of purposes, and each is created in a different way. Select all statements that are correct. Workgroups are used to assign IdentityIQ responsibilities (i. e. ownership of an application to a set of identities. Membership is assigned manually or through rules.

    True

  • 53

    You can use the Edit Identity Quicklink to modify an identity's attributes and trigger attribute synchronization to other applications.

    True

  • 54

    Which of these options defines how the account attributes within a provisioning plan are populated?
 Application schemas

    False

  • 55

    Which of these options defines how the account attributes within a provisioning plan are populated?
 Policy definitions

    False

  • 56

    Which of these options defines how the account attributes within a provisioning plan are populated?
 Build Map rule

    False

  • 57

    Which of these options defines how the account attributes within a provisioning plan are populated?
 Provisioning policies

    True

  • 58

    In the aggregation/refresh process, lifecycle events can be launched when a data change is detected during aggregation. Which option on the refresh task causes the refresh to trigger the lifecycle event workflows?
 Refresh assigned, detected roles and promote additional entitlements

    False

  • 59

    In the aggregation/refresh process, lifecycle events can be launched when a data change is detected during aggregation. Which option on the refresh task causes the refresh to trigger the lifecycle event workflows? Check active policies

    False

  • 60

    In the aggregation/refresh process, lifecycle events can be launched when a data change is detected during aggregation. Which option on the refresh task causes the refresh to trigger the lifecycle event workflows? Refresh identity attributes

    False

  • 61

    In the aggregation/refresh process, lifecycle events can be launched when a data change is detected during aggregation. Which option on the refresh task causes the refresh to trigger the lifecycle event workflows?
 Provision assignments

    False

  • 62

    In the aggregation/refresh process, lifecycle events can be launched when a data change is detected during aggregation. Which option on the refresh task causes the refresh to trigger the lifecycle event workflows? Process events

    True

  • 63

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 My Work --> Work Items

    False

  • 64

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 Setup --> Lifecycle Events

    False

  • 65

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 Java Standard Out log

    False

  • 66

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 Intelligence --> Advanced Analytics --> Syslog Search

    True

  • 67

    What does the "-clean" option do when exporting Objects?
 It deletes all passwords from the exported object.

    False

  • 68

    What does the "-clean" option do when exporting Objects? It creates an empty object of the type being exported.

    False

  • 69

    What does the "-clean" option do when exporting Objects?
 It removes the Object completely from the existing IdentityIQ database in preparation for loading it into the next database.

    False

  • 70

    What does the "-clean" option do when exporting Objects? It removes the GUID and creation/modification dates from the Object being exported.

    True

  • 71

    A provisioning plan is passed to a workflow to start the provisioning process. What is included in a provisioning plan?
 One or more request for multiple identities

    False

  • 72

    A provisioning plan is passed to a workflow to start the provisioning process. What is included in a provisioning plan? A set of provisioning policies

    False

  • 73

    A provisioning plan is passed to a workflow to start the provisioning process. What is included in a provisioning plan?
 One request for multiple identities

    False

  • 74

    A provisioning plan is passed to a workflow to start the provisioning process. What is included in a provisioning plan?
 One or more request for one identity

    True

  • 75

    What is a capability in IdentityIQ?
 The responsibilities the user has within the organization (for example, accounting)

    False

  • 76

    What is a capability in IdentityIQ? Quicklinks a user has access to and how the Quicklink is configured

    False

  • 77

    What is a capability in IdentityIQ? What a user can do within the HR system from which IdentityIQ aggregates authoritative accounts

    False

  • 78

    What is a capability in IdentityIQ? The rights a user has within the IdentityIQ

    True

  • 79

    From the Administrator Console, you can view details for a failed provisioning attempt and send a manual workitem to complete the request.

    True

  • 80

    Once a workflow has been launched, what is the name of the object that represents the execution of the workflow?
 SailPoint Context

    False

  • 81

    Once a workflow has been launched, what is the name of the object that represents the execution of the workflow?
 Workflow

    False

  • 82

    Once a workflow has been launched, what is the name of the object that represents the execution of the workflow?
 UIConfig

    False

  • 83

    Once a workflow has been launched, what is the name of the object that represents the execution of the workflow?
 WorkflowCase

    True

  • 84

    What is the difference between a task and a workflow?
 They can be used interchangeable, but a task is pre-compiled and a workflow is interpreted.

    False

  • 85

    What is the difference between a task and a workflow? A task can interact with a user and is typically activated in response to a user action or data change; a workflow performs batch processing and it can be scheduled.

    False

  • 86

    What is the difference between a task and a workflow? A task performs batch processing and it can be scheduled; a workflow can interact with a user and is typically activated in response to a user action or data change.

    True

  • 87

    ________ define which account attributes to read from an application when aggregating accounts with IdentityIQ.
 Connectors

    False

  • 88

    ________ define which account attributes to read from an application when aggregating accounts with IdentityIQ. Delimited files

    False

  • 89

    ________ define which account attributes to read from an application when aggregating accounts with IdentityIQ.
 Group schemas

    False

  • 90

    ________ define which account attributes to read from an application when aggregating accounts with IdentityIQ.
 Account schemas

    True

  • 91

    Which connector requires a provisioning rule to be written when provisioning to applications of the type?
 LDAP

    False

  • 92

    Which connector requires a provisioning rule to be written when provisioning to applications of the type?
 Active Directory

    False

  • 93

    Which connector requires a provisioning rule to be written when provisioning to applications of the type?
 Delimited File

    False

  • 94

    Which connector requires a provisioning rule to be written when provisioning to applications of the type?
 JDBC

    True

  • 95

    There are five important tasks that are shipped pre-scheduled in IdentityIQ. Which task advances certifications through their phases and restarts backgrounded workflows?
 Check sunset requests for notifications daily

    False

  • 96

    There are five important tasks that are shipped pre-scheduled in IdentityIQ. Which task advances certifications through their phases and restarts backgrounded workflows?
 Check expired work items daily

    False

  • 97

    There are five important tasks that are shipped pre-scheduled in IdentityIQ. Which task advances certifications through their phases and restarts backgrounded workflows?
 Check expired mitigations daily

    False

  • 98

    There are five important tasks that are shipped pre-scheduled in IdentityIQ. Which task advances certifications through their phases and restarts backgrounded workflows?
 Perform Identity Request Maintenance

    False

  • 99

    There are five important tasks that are shipped pre-scheduled in IdentityIQ. Which task advances certifications through their phases and restarts backgrounded workflows?
 Perform maintenance

    True