Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Review the current identity model and scenario below.

Scenario

John Doe requests "Sales" access on Salesforce for himself. In the approval process, John Doe's manager approves. The access request is tils the expected provisioning action sent to the source connectors?

Solution: Expected Provisioning No provisioning is sent out.

A.

Yes

B.

No

Full Access
Question # 5

An IdentityNow engineer has the following problem:

IdentityNow shows status failed on a virtual appliance (VA).

Is this one of the steps that should be taken troubleshoot the issue?

Solution: Review the log files in /home/sailpoint/log for errors.

A.

Yes

B.

No

Full Access
Question # 6

When preparing for a manager certification campaign is this a step that is considered a best practice before the campaign preview is generated?

Solution: Evaluate available campaign administration filters

A.

Yes

B.

No

Full Access
Question # 7

An IdentityNow engineer needs to find identities with disabled AD accounts by using IdentityNow's search features. Is this the correct search syntax to perform this task?

Solution:

A.

Yes

B.

No

Full Access
Question # 8

Is the following true about custom connectors in IdentityNow?

Solution: Custom connector configurations can have account correlation settings defined.

A.

Yes

B.

No

Full Access
Question # 9

Is this an item that an IdentityNow engineer should configure when implementing a source that uses a JDBC connector?

Solution: Use a query select statement with a clause to match the incoming account to an existing account for the Single Account SQL Query configuration item

A.

Yes

B.

No

Full Access
Question # 10

Is the following true about the web-services connector in IdentityNow?

Solution: The connector supports SAML authentication.

A.

Yes

B.

No

Full Access
Question # 11

In an IdentityNow environment, the source lest connection is failing with a timeout error.

Is this a step an identityNow engineer should take to troubleshoot the problem?

Solution: Turn off the virtual appliance's (VA) internal firewall.

A.

Yes

B.

No

Full Access
Question # 12

The customer has a system that matches the following description. Is this a suitable connector type to use?

The system is a modern, cloud-based, web application that uses a MySQL database backend provided by the cloud platform. The database is only accessible from the web application. The web application exposes a fully compliant SCIM 2.0 interface with OAuth 2.0 client credentials.

Solution: OpenLDAP Connector

A.

Yes

B.

No

Full Access
Question # 13

Is this an item that an IdentityNow engineer should configure when implementing a source that uses a JDBC connector?

Solution: Select the checkbox to use database admin as service account.

A.

Yes

B.

No

Full Access
Question # 14

Is this an appropriate use case for the Build Map?

Solution: To provide the ability to modify to modify the map data of an account for a JDBC or a Delimated File source.

A.

Yes

B.

No

Full Access
Question # 15

Does this correctly describe Manager Correlation?

Solution: an approval process by which identifies assigned as manager must periodically review and approve all access assigned to their employees.

A.

Yes

B.

No

Full Access
Question # 16

An IdentityNow engineer has set up an access profile for an application. The access profile allows for users to request access, and for a user's manager to approve or deny access.

After a recent staff meeting, management has expressed that they want to remove any approval requirements for this application.

Is management's request possible in IdentityNow. and. if so. are these the recommended steps the engineer should take to meet their new requirement?

Solution: It is possible. Delete the access profile.

A.

Yes

B.

No

Full Access
Question # 17

Is this an item that an IdentityNow engineer should configure when implementing a source that uses a JDBC connector?

Solution: Define an account schema by using 'Discover Schema'' or by manually configuring the schema attributes.

A.

Yes

B.

No

Full Access
Question # 18

A customer wants to configure a virtual appliance (VA) to use a static IP address. Does this file on the VA need to be modified to perform the configuration?

Solution: /home/sailpoint/proxy.yaml

A.

Yes

B.

No

Full Access
Question # 19

Refer to the following diagram.

For this strategy, all virtual appliances (VAs) are deployed in a single VA cluster, with all VAs running concurrently. Some of these VAs are in the primary data center, and others {called OR VAs) are deployed in a DR data center.

While using this strategy, is this a disadvantage?

Solution: A reconfiguration will be required within identityNow to connect to the disaster recovery VAs. If there are many sources configured, this will cause overhead in performing this failover

A.

Yes

B.

No

Full Access
Question # 20

An engineer needs to troubleshoot the following issue:

Incomplete Identities on authoritative source

Is this a reasonable action for the engineer to take?

Solution: Download the identity Exceptions report from the identity profile page.

A.

Yes

B.

No

Full Access
Question # 21

Is this statement true about certification campaigns?

Solution: Certifications are assigned to the reviewer when the campaign status is Preview Ready.

A.

Yes

B.

No

Full Access
Question # 22

Does this run on the VA?

Solution: Active Directory connector

A.

Yes

B.

No

Full Access
Question # 23

In an IdentityNow environment, the source lest connection is failing with a timeout error.

Is this a step an identityNow engineer should take to troubleshoot the problem?

Solution: Clear the Authentication checkbox for the source in identityNow.

A.

Yes

B.

No

Full Access
Question # 24

In an IdentityNow environment, the source lest connection is failing with a timeout error.

Is this a step an identityNow engineer should take to troubleshoot the problem?

Solution: Check that port values configured on the identityNow source are connected for the source.

A.

Yes

B.

No

Full Access
Question # 25

Does this example accurately describe an IdentityNow data flow?

Solution:

1. Identity data is aggregated from an authoritative source.

2. The aggregated data is used to build an identity model.

3. Accounts are provisioned to source systems.

4 Identity attributes are periodically synchronized to write-enabled systems

A.

Yes

B.

No

Full Access
Question # 26

In an optimized aggregation, if an account is unchanged since the last aggregation, does this step execute?

Solution: The virtual appliance connects to the target system to retrieve accounts.

A.

Yes

B.

No

Full Access
Question # 27

An engineer needs to troubleshoot the following issue:

Incomplete Identities on authoritative source

Is this a reasonable action for the engineer to take?

Solution: Download the accounts data csv from the Account tab on the authoritative source.

A.

Yes

B.

No

Full Access
Question # 28

Is this statement correct about security and/or encryption of data?

Solution: When setting up a virtual appliance cluster. SailPoint creates an asymmetnc key pair based on a user-provided passphrase. and then uses this key pair to communication with the IdentityNow tenant.

A.

Yes

B.

No

Full Access
Question # 29

Is this statement accurate regarding SailPoint's multi-tenant processing environment?

Solution: A proprietary fairness algorithm is used to manage and distribute the workload.

A.

Yes

B.

No

Full Access
Question # 30

Review the steps.

1______________________________________

2. Import the virtual appliance (VA) image to the virtualization platform.

3. Start the VA.

4. Log in to the VA using the default credentials.

5. Change the password for the SailPoint user.

6______________________________________

7. Create a new VA cluster in IdentityNow.

8. Create a new VA configuration in IdentityNow. 9 Download / procure the config.yaml.

10. Configure the keyPassphrase in the config.yaml.

11. Upload the config.yaml into the VA.

12______________________________________.

Are these the missing steps?

Solution: 1. Click Test Connection on the VA configuration. 6. Download / procure the VA image. 12. Configure networking configurations (as needed).

A.

Yes

B.

No

Full Access
Question # 31

When preparing for a manager certification campaign is this a step that is considered a best practice before the campaign preview is generated?

Solution: validate the email template. Certification Due

A.

Yes

B.

No

Full Access
Question # 32

A customer wants to configure a virtual appliance (VA) to use a static IP address. Does this file on the VA need to be modified to perform the configuration?

Solution: /etc/ systemd/network/ static, network

A.

Yes

B.

No

Full Access