ログイン

xj9 - 19628 - d1
99問 • 1年前
  • critical flaw
  • 通報

    問題一覧

  • 1

    What is the term for reading application data into IdentityIQ from external sources? Application

    False

  • 2

    What is the term for reading application data into IdentityIQ from external sources? Refresh

    False

  • 3

    What is the term for reading application data into IdentityIQ from external sources? Certification

    False

  • 4

    What is the term for reading application data into IdentityIQ from external sources? Aggregation

    True

  • 5

    What is the term for the process of reviewing an identity’s accounts and entitlements on the applications within your enterprise? Aggregation

    False

  • 6

    What is the term for the process of reviewing an identity’s accounts and entitlements on the applications within your enterprise? Access Request

    False

  • 7

    What is the term for the process of reviewing an identity’s accounts and entitlements on the applications within your enterprise? Provisioning

    False

  • 8

    What is the term for the process of reviewing an identity’s accounts and entitlements on the applications within your enterprise? Certification

    True

  • 9

    What is the term for writing access changes to applications within your enterprise? Refresh

    False

  • 10

    What is the term for writing access changes to applications within your enterprise? Certification

    False

  • 11

    What is the term for writing access changes to applications within your enterprise? Aggregation

    False

  • 12

    What is the term for writing access changes to applications within your enterprise? Provisioning

    True

  • 13

    What is the difference between a task and a business process (workflow)? Tasks interact with users and are usually activated in response to user action/data change; workflows do batch processing and are scheduled.

    False

  • 14

    What is the difference between a task and a business process (workflow)? They can be used interchangeably, but a task is pre-compiled and a workflow is interpreted.

    False

  • 15

    What is the difference between a task and a business process (workflow)? Tasks perform batch processing and can be scheduled; workflows interact with users and are activated in response to user action/data change.

    True

  • 16

    Implementers can add custom business logic to IdentityIQ using what functionality?
 Workitems

    False

  • 17

    Implementers can add custom business logic to IdentityIQ using what functionality? Access Reviews

    False

  • 18

    Implementers can add custom business logic to IdentityIQ using what functionality?
 Rules

    True

  • 19

    Rapid Setup is an implementation tool built into the current IdentityIQ product version to help with configuring IdentityIQ.

    True

  • 20

    Certification must be part of Phase1 of any IdentityIQ implementation project.

    False

  • 21

    How does IdentityIQ communicate with target systems in your environment?
 Through IdentityIQ’s REST API

    False

  • 22

    How does IdentityIQ communicate with target systems in your environment? Through Hibernate

    False

  • 23

    How does IdentityIQ communicate with target systems in your environment?
 Through connectors and integration modules

    True

  • 24

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default?
 The WEB-INF directory

    False

  • 25

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default? Their own column in the database

    False

  • 26

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default?
 Tomcat

    False

  • 27

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default?
 In a CLOB

    True

  • 28

    It is impossible to have more than 20 extended attributes within IdentityIQ.

    False

  • 29

    Authoritative Identity Cubes are created for each account read from all applications.

    False

  • 30

    Which of these configurations is part of the Rapid Setup features?
 Choosing the application’s connector type

    False

  • 31

    Which of these configurations is part of the Rapid Setup features?
 Specifying the account schema attributes

    False

  • 32

    Which of these configurations is part of the Rapid Setup features?
 Specifying what attribute identifies a locked account

    True

  • 33

    When an attribute is marked as "searchable", what does this mean?
 The attribute is available for groups to be created from its values

    False

  • 34

    When an attribute is marked as "searchable", what does this mean?
 The attribute is stored in the CLOB for more efficient access for searching

    False

  • 35

    When an attribute is marked as "searchable", what does this mean? The attribute is stored in its own column for more efficient access for searching

    True

  • 36

    The terms Identity Attributes and Account Attributes refer to the same thing.

    False

  • 37

    A best practice is to assign ownership of objects, such as applications, to workgroups.

    True

  • 38

    Entitlements define which areas of the UI a user can access within IdentityIQ.

    False

  • 39

    By adding an identity to a workgroup, the identity inherits capabilities assigned to the workgroup.

    True

  • 40

    IdentityIQ does not support multi-factor authentication.

    False

  • 41

    What is the purpose of groups and populations?
 To specify identities that share responsibilities for actions in IdentityIQ, such as “owning” an application.

    False

  • 42

    What is the purpose of groups and populations? To specify additional IdentityIQ user rights for identities, such as Compliance Officer.

    False

  • 43

    What is the purpose of groups and populations? To specify identities to include when performing an IdentityIQ activity, such as running a report.

    True

  • 44

    A group can be defined based on multiple attributes; a population is based on a single attribute.

    False

  • 45

    In IdentityIQ, where and how are new Populations created?
 In the Identity Warehouse, using filtering criteria

    False

  • 46

    In IdentityIQ, where and how are new Populations created? In Setup > Groups, on the Populations tab

    False

  • 47

    In IdentityIQ, where and how are new Populations created?
 In Advanced Analytics, using identity search criteria

    True

  • 48

    Which statement best describes what happens when you click Save Identities as Population?
 Both the list of identities and the search criteria used to select them are saved

    False

  • 49

    Which statement best describes what happens when you click Save Identities as Population? The search criteria for the population is saved

    False

  • 50

    Which statement best describes what happens when you click Save Identities as Population?
 The list of identities in the population is saved

    True

  • 51

    Account schemas define which account attributes to read from an application when aggregating accounts with IdentityIQ.

    True

  • 52

    If we want to add an entitlement to the entitlement catalog, what should we mark the corresponding account attribute as?
 Entitlement

    False

  • 53

    If we want to add an entitlement to the entitlement catalog, what should we mark the corresponding account attribute as? Multi-valued

    False

  • 54

    If we want to add an entitlement to the entitlement catalog, what should we mark the corresponding account attribute as? Managed

    True

  • 55

    Groups which grant/identify user access on other systems (applications) and loaded into IdentityIQ through (account group) aggregation.
 Workgroup

    False

  • 56

    Groups which grant/identify user access on other systems (applications) and loaded into IdentityIQ through (account group) aggregation. Population

    False

  • 57

    Groups which grant/identify user access on other systems (applications) and loaded into IdentityIQ through (account group) aggregation.
 Group (factory)

    False

  • 58

    Groups which grant/identify user access on other systems (applications) and loaded into IdentityIQ through (account group) aggregation.
 Account Group

    True

  • 59

    Group of IdentityIQ users based on shared value of a single identity attribute and used to define target of operation (e.g. task filter, report filter).
 Workgroup

    False

  • 60

    Group of IdentityIQ users based on shared value of a single identity attribute and used to define target of operation (e.g. task filter, report filter). Account Group

    False

  • 61

    Group of IdentityIQ users based on shared value of a single identity attribute and used to define target of operation (e.g. task filter, report filter).
 Population

    False

  • 62

    Group of IdentityIQ users based on shared value of a single identity attribute and used to define target of operation (e.g. task filter, report filter).
 Group (factory)

    True

  • 63

    Group of IdentityIQ users and used for assigning capabilities and scopes to set of users.
 Population

    False

  • 64

    Group of IdentityIQ users and used for assigning capabilities and scopes to set of users. Group (factory)

    False

  • 65

    Group of IdentityIQ users and used for assigning capabilities and scopes to set of users.
 Account Group

    False

  • 66

    Group of IdentityIQ users and used for assigning capabilities and scopes to set of users.
 Workgroup

    True

  • 67

    Group of IdentityIQ users defined through an Advanced Analytics query and used to define target of operation (e.g. task filter, report filter).
 Group (factory)

    False

  • 68

    Group of IdentityIQ users defined through an Advanced Analytics query and used to define target of operation (e.g. task filter, report filter).
 Account Group

    False

  • 69

    Group of IdentityIQ users defined through an Advanced Analytics query and used to define target of operation (e.g. task filter, report filter).
 Workgroup

    False

  • 70

    Group of IdentityIQ users defined through an Advanced Analytics query and used to define target of operation (e.g. task filter, report filter).
 Population

    True

  • 71

    Accounts are correlated to existing Identity Cubes when the Prune Identity task is run.

    False

  • 72

    Which of these is true of manual correlation?
 It applies only until the next aggregation of that application.

    False

  • 73

    Which of these is true of manual correlation? It can never be changed.

    False

  • 74

    Which of these is true of manual correlation?
 It is not undone or overridden by a subsequent aggregation.

    True

  • 75

    After aggregating, entitlements are added to the Entitlement Catalog, but they are not fully promoted on Identity Cubes until a refresh task has been run.

    True

  • 76

    IQService is used for provisioning to Active Directory and to LDAP.

    False

  • 77

    The JDBC connector requires a provisioning rule to be written when provisioning to applications of this type.

    True

  • 78

    Many IdentityIQ connectors include pre-defined account and group schemas.

    True

  • 79

    We discussed two ways to view your application data prior to aggregation. Preview only lists the first 10 records, while __________________ lists all records and more details.
 Connector Debug

    True

  • 80

    Accounts are correlated to existing Identity Cubes when the Prune Identity task is run.

    False

  • 81

    Manual correlation will link an account to an identity cube, but only until the next aggregation of that application.

    False

  • 82

    Aggregation tasks are always partitioned and executed across multiple hosts.

    False

  • 83

    IdentityIQ supports both a delta aggregation and a delta refresh.

    True

  • 84

    You can use the Administrator Console to postpone a scheduled task.

    True

  • 85

    Which of the following log levels will provide the most detailed information?
 Error

    False

  • 86

    Which of the following log levels will provide the most detailed information?
 Debug

    False

  • 87

    Which of the following log levels will provide the most detailed information?
 Warn

    False

  • 88

    Which of the following log levels will provide the most detailed information?
 Info

    False

  • 89

    Which of the following log levels will provide the most detailed information?
 Trace

    True

  • 90

    It is a best practice to use Java println statements for logging.

    False

  • 91

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 Windows Event Viewer

    False

  • 92

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error? Administrator Console

    False

  • 93

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 Advanced Analytics > Syslog Search

    True

  • 94

    Once the spadmin password has been updated from the default, anyone who can authenticate into IdentityIQ can access the IdentityIQ console.

    False

  • 95

    The console commands export and import both provide the ability to strip dates and IDs from objects.

    True

  • 96

    Which of these is the best definition of Policy?
 An action you configure IdentityIQ to take when a user is found to be in violation of a business rule

    False

  • 97

    Which of these is the best definition of Policy? A capability or entitlement that can be assigned to a user to determine the IdentityIQ features the user can access

    False

  • 98

    Which of these is the best definition of Policy? Business rules that define user access conditions that are unwanted by the business

    True

  • 99

    When a policy violation is identified, a workflow can be initiated by IdentityIQ to address the violation.

    True

  • xj9 - 19628 - a

    xj9 - 19628 - a

    critical flaw · 98問 · 2年前

    xj9 - 19628 - a

    xj9 - 19628 - a

    98問 • 2年前
    critical flaw

    xj9 - 19628 - b

    xj9 - 19628 - b

    critical flaw · 30問 · 2年前

    xj9 - 19628 - b

    xj9 - 19628 - b

    30問 • 2年前
    critical flaw

    xj9 - 19628 - c

    xj9 - 19628 - c

    critical flaw · 99問 · 1年前

    xj9 - 19628 - c

    xj9 - 19628 - c

    99問 • 1年前
    critical flaw

    xj9 - 19628 - d2

    xj9 - 19628 - d2

    critical flaw · 98問 · 1年前

    xj9 - 19628 - d2

    xj9 - 19628 - d2

    98問 • 1年前
    critical flaw

    1. Shattershot

    1. Shattershot

    critical flaw · 50問 · 1年前

    1. Shattershot

    1. Shattershot

    50問 • 1年前
    critical flaw

    Conquest Book 1

    Conquest Book 1

    critical flaw · 100問 · 1年前

    Conquest Book 1

    Conquest Book 1

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D1 - A

    k3ch - 2910116 - D1 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D1 - A

    k3ch - 2910116 - D1 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D1 - B

    k3ch - 2910116 - D1 - B

    critical flaw · 65問 · 1年前

    k3ch - 2910116 - D1 - B

    k3ch - 2910116 - D1 - B

    65問 • 1年前
    critical flaw

    k3ch - 2910116 - D2 - A

    k3ch - 2910116 - D2 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D2 - A

    k3ch - 2910116 - D2 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D2 - B

    k3ch - 2910116 - D2 - B

    critical flaw · 55問 · 1年前

    k3ch - 2910116 - D2 - B

    k3ch - 2910116 - D2 - B

    55問 • 1年前
    critical flaw

    k3ch - 2910116 - D3 - A

    k3ch - 2910116 - D3 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D3 - A

    k3ch - 2910116 - D3 - A

    100問 • 1年前
    critical flaw

    k3ch - 2910116 - D3 - B

    k3ch - 2910116 - D3 - B

    critical flaw · 63問 · 1年前

    k3ch - 2910116 - D3 - B

    k3ch - 2910116 - D3 - B

    63問 • 1年前
    critical flaw

    k3ch - 2910116 - D4 - A

    k3ch - 2910116 - D4 - A

    critical flaw · 100問 · 1年前

    k3ch - 2910116 - D4 - A

    k3ch - 2910116 - D4 - A

    100問 • 1年前
    critical flaw

    1. X-Tinction Agenda

    1. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    1. X-Tinction Agenda

    1. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    2. X-Tinction Agenda

    2. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    2. X-Tinction Agenda

    2. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    3. X-Tinction Agenda

    3. X-Tinction Agenda

    critical flaw · 100問 · 1年前

    3. X-Tinction Agenda

    3. X-Tinction Agenda

    100問 • 1年前
    critical flaw

    4. X-Tinction Agenda

    4. X-Tinction Agenda

    critical flaw · 90問 · 1年前

    4. X-Tinction Agenda

    4. X-Tinction Agenda

    90問 • 1年前
    critical flaw

    Executioner's Song Book 1

    Executioner's Song Book 1

    critical flaw · 30問 · 1年前

    Executioner's Song Book 1

    Executioner's Song Book 1

    30問 • 1年前
    critical flaw

    問題一覧

  • 1

    What is the term for reading application data into IdentityIQ from external sources? Application

    False

  • 2

    What is the term for reading application data into IdentityIQ from external sources? Refresh

    False

  • 3

    What is the term for reading application data into IdentityIQ from external sources? Certification

    False

  • 4

    What is the term for reading application data into IdentityIQ from external sources? Aggregation

    True

  • 5

    What is the term for the process of reviewing an identity’s accounts and entitlements on the applications within your enterprise? Aggregation

    False

  • 6

    What is the term for the process of reviewing an identity’s accounts and entitlements on the applications within your enterprise? Access Request

    False

  • 7

    What is the term for the process of reviewing an identity’s accounts and entitlements on the applications within your enterprise? Provisioning

    False

  • 8

    What is the term for the process of reviewing an identity’s accounts and entitlements on the applications within your enterprise? Certification

    True

  • 9

    What is the term for writing access changes to applications within your enterprise? Refresh

    False

  • 10

    What is the term for writing access changes to applications within your enterprise? Certification

    False

  • 11

    What is the term for writing access changes to applications within your enterprise? Aggregation

    False

  • 12

    What is the term for writing access changes to applications within your enterprise? Provisioning

    True

  • 13

    What is the difference between a task and a business process (workflow)? Tasks interact with users and are usually activated in response to user action/data change; workflows do batch processing and are scheduled.

    False

  • 14

    What is the difference between a task and a business process (workflow)? They can be used interchangeably, but a task is pre-compiled and a workflow is interpreted.

    False

  • 15

    What is the difference between a task and a business process (workflow)? Tasks perform batch processing and can be scheduled; workflows interact with users and are activated in response to user action/data change.

    True

  • 16

    Implementers can add custom business logic to IdentityIQ using what functionality?
 Workitems

    False

  • 17

    Implementers can add custom business logic to IdentityIQ using what functionality? Access Reviews

    False

  • 18

    Implementers can add custom business logic to IdentityIQ using what functionality?
 Rules

    True

  • 19

    Rapid Setup is an implementation tool built into the current IdentityIQ product version to help with configuring IdentityIQ.

    True

  • 20

    Certification must be part of Phase1 of any IdentityIQ implementation project.

    False

  • 21

    How does IdentityIQ communicate with target systems in your environment?
 Through IdentityIQ’s REST API

    False

  • 22

    How does IdentityIQ communicate with target systems in your environment? Through Hibernate

    False

  • 23

    How does IdentityIQ communicate with target systems in your environment?
 Through connectors and integration modules

    True

  • 24

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default?
 The WEB-INF directory

    False

  • 25

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default? Their own column in the database

    False

  • 26

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default?
 Tomcat

    False

  • 27

    When you add extended attributes that are not marked searchable to IdentityIQ, where are these new attributes stored by default?
 In a CLOB

    True

  • 28

    It is impossible to have more than 20 extended attributes within IdentityIQ.

    False

  • 29

    Authoritative Identity Cubes are created for each account read from all applications.

    False

  • 30

    Which of these configurations is part of the Rapid Setup features?
 Choosing the application’s connector type

    False

  • 31

    Which of these configurations is part of the Rapid Setup features?
 Specifying the account schema attributes

    False

  • 32

    Which of these configurations is part of the Rapid Setup features?
 Specifying what attribute identifies a locked account

    True

  • 33

    When an attribute is marked as "searchable", what does this mean?
 The attribute is available for groups to be created from its values

    False

  • 34

    When an attribute is marked as "searchable", what does this mean?
 The attribute is stored in the CLOB for more efficient access for searching

    False

  • 35

    When an attribute is marked as "searchable", what does this mean? The attribute is stored in its own column for more efficient access for searching

    True

  • 36

    The terms Identity Attributes and Account Attributes refer to the same thing.

    False

  • 37

    A best practice is to assign ownership of objects, such as applications, to workgroups.

    True

  • 38

    Entitlements define which areas of the UI a user can access within IdentityIQ.

    False

  • 39

    By adding an identity to a workgroup, the identity inherits capabilities assigned to the workgroup.

    True

  • 40

    IdentityIQ does not support multi-factor authentication.

    False

  • 41

    What is the purpose of groups and populations?
 To specify identities that share responsibilities for actions in IdentityIQ, such as “owning” an application.

    False

  • 42

    What is the purpose of groups and populations? To specify additional IdentityIQ user rights for identities, such as Compliance Officer.

    False

  • 43

    What is the purpose of groups and populations? To specify identities to include when performing an IdentityIQ activity, such as running a report.

    True

  • 44

    A group can be defined based on multiple attributes; a population is based on a single attribute.

    False

  • 45

    In IdentityIQ, where and how are new Populations created?
 In the Identity Warehouse, using filtering criteria

    False

  • 46

    In IdentityIQ, where and how are new Populations created? In Setup > Groups, on the Populations tab

    False

  • 47

    In IdentityIQ, where and how are new Populations created?
 In Advanced Analytics, using identity search criteria

    True

  • 48

    Which statement best describes what happens when you click Save Identities as Population?
 Both the list of identities and the search criteria used to select them are saved

    False

  • 49

    Which statement best describes what happens when you click Save Identities as Population? The search criteria for the population is saved

    False

  • 50

    Which statement best describes what happens when you click Save Identities as Population?
 The list of identities in the population is saved

    True

  • 51

    Account schemas define which account attributes to read from an application when aggregating accounts with IdentityIQ.

    True

  • 52

    If we want to add an entitlement to the entitlement catalog, what should we mark the corresponding account attribute as?
 Entitlement

    False

  • 53

    If we want to add an entitlement to the entitlement catalog, what should we mark the corresponding account attribute as? Multi-valued

    False

  • 54

    If we want to add an entitlement to the entitlement catalog, what should we mark the corresponding account attribute as? Managed

    True

  • 55

    Groups which grant/identify user access on other systems (applications) and loaded into IdentityIQ through (account group) aggregation.
 Workgroup

    False

  • 56

    Groups which grant/identify user access on other systems (applications) and loaded into IdentityIQ through (account group) aggregation. Population

    False

  • 57

    Groups which grant/identify user access on other systems (applications) and loaded into IdentityIQ through (account group) aggregation.
 Group (factory)

    False

  • 58

    Groups which grant/identify user access on other systems (applications) and loaded into IdentityIQ through (account group) aggregation.
 Account Group

    True

  • 59

    Group of IdentityIQ users based on shared value of a single identity attribute and used to define target of operation (e.g. task filter, report filter).
 Workgroup

    False

  • 60

    Group of IdentityIQ users based on shared value of a single identity attribute and used to define target of operation (e.g. task filter, report filter). Account Group

    False

  • 61

    Group of IdentityIQ users based on shared value of a single identity attribute and used to define target of operation (e.g. task filter, report filter).
 Population

    False

  • 62

    Group of IdentityIQ users based on shared value of a single identity attribute and used to define target of operation (e.g. task filter, report filter).
 Group (factory)

    True

  • 63

    Group of IdentityIQ users and used for assigning capabilities and scopes to set of users.
 Population

    False

  • 64

    Group of IdentityIQ users and used for assigning capabilities and scopes to set of users. Group (factory)

    False

  • 65

    Group of IdentityIQ users and used for assigning capabilities and scopes to set of users.
 Account Group

    False

  • 66

    Group of IdentityIQ users and used for assigning capabilities and scopes to set of users.
 Workgroup

    True

  • 67

    Group of IdentityIQ users defined through an Advanced Analytics query and used to define target of operation (e.g. task filter, report filter).
 Group (factory)

    False

  • 68

    Group of IdentityIQ users defined through an Advanced Analytics query and used to define target of operation (e.g. task filter, report filter).
 Account Group

    False

  • 69

    Group of IdentityIQ users defined through an Advanced Analytics query and used to define target of operation (e.g. task filter, report filter).
 Workgroup

    False

  • 70

    Group of IdentityIQ users defined through an Advanced Analytics query and used to define target of operation (e.g. task filter, report filter).
 Population

    True

  • 71

    Accounts are correlated to existing Identity Cubes when the Prune Identity task is run.

    False

  • 72

    Which of these is true of manual correlation?
 It applies only until the next aggregation of that application.

    False

  • 73

    Which of these is true of manual correlation? It can never be changed.

    False

  • 74

    Which of these is true of manual correlation?
 It is not undone or overridden by a subsequent aggregation.

    True

  • 75

    After aggregating, entitlements are added to the Entitlement Catalog, but they are not fully promoted on Identity Cubes until a refresh task has been run.

    True

  • 76

    IQService is used for provisioning to Active Directory and to LDAP.

    False

  • 77

    The JDBC connector requires a provisioning rule to be written when provisioning to applications of this type.

    True

  • 78

    Many IdentityIQ connectors include pre-defined account and group schemas.

    True

  • 79

    We discussed two ways to view your application data prior to aggregation. Preview only lists the first 10 records, while __________________ lists all records and more details.
 Connector Debug

    True

  • 80

    Accounts are correlated to existing Identity Cubes when the Prune Identity task is run.

    False

  • 81

    Manual correlation will link an account to an identity cube, but only until the next aggregation of that application.

    False

  • 82

    Aggregation tasks are always partitioned and executed across multiple hosts.

    False

  • 83

    IdentityIQ supports both a delta aggregation and a delta refresh.

    True

  • 84

    You can use the Administrator Console to postpone a scheduled task.

    True

  • 85

    Which of the following log levels will provide the most detailed information?
 Error

    False

  • 86

    Which of the following log levels will provide the most detailed information?
 Debug

    False

  • 87

    Which of the following log levels will provide the most detailed information?
 Warn

    False

  • 88

    Which of the following log levels will provide the most detailed information?
 Info

    False

  • 89

    Which of the following log levels will provide the most detailed information?
 Trace

    True

  • 90

    It is a best practice to use Java println statements for logging.

    False

  • 91

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 Windows Event Viewer

    False

  • 92

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error? Administrator Console

    False

  • 93

    When a serious system error occurs, and an incident code is displayed, where would an admin user go to see details of the error?
 Advanced Analytics > Syslog Search

    True

  • 94

    Once the spadmin password has been updated from the default, anyone who can authenticate into IdentityIQ can access the IdentityIQ console.

    False

  • 95

    The console commands export and import both provide the ability to strip dates and IDs from objects.

    True

  • 96

    Which of these is the best definition of Policy?
 An action you configure IdentityIQ to take when a user is found to be in violation of a business rule

    False

  • 97

    Which of these is the best definition of Policy? A capability or entitlement that can be assigned to a user to determine the IdentityIQ features the user can access

    False

  • 98

    Which of these is the best definition of Policy? Business rules that define user access conditions that are unwanted by the business

    True

  • 99

    When a policy violation is identified, a workflow can be initiated by IdentityIQ to address the violation.

    True