SailPoint Quiz
SailPoint Quiz : This SailPoint Beginner Quiz contains set of Top 30 SailPoint Quiz which will help to clear any Mcqs exam which is designed for Beginner.
1) 1. Assignement Rule is Bydefault present in Role Container. Business Role
- TRUE
- FALSE
2) 2. XXX.targate.properties exist in Bile Home Directory
- TRUE
- FALSE
3) 3. If identity attributes has to be calculated from multiple application attributes, Is the statement correct to set global rule in the identity mapping
- TRUE
- FALSE
4) 4. Is the statement true about email template
- TRUE
- FALSE
6) 5. If below command is run in IIQ console, which option will be correct
- workflow Test Workflow /home/arGWrk.xml (note: variable identityName is initialized in the arGWrk.xml)
- Workflow will fail as end step is called before complete
- Workflow will print “inside approval set <identityName>”
7) 6. Task Definition can be imported using Deployment accelerator
- TRUE
- FALSE
8) 7. Task Definition objects has to be placed the SSB
- TRUE
- FALSE
9) 8. Which of the following functionality supported by an aggregation task
- Update identity attribute
- Cleanup deleted accounts
- Promote managed attributes
- Execute certification
10) 9. Which of the following is done by Identity management?
- Controlling access to data in the cloud
- Maintaining user roles
- Preventing unauthorized uses
- All of the Above
11) 10. Which of the following operation can be executed from Eclipse with Deployment accelerator:
- Run rule
- Import xml
- Trigger workflow
- Trigger certification
12) 11. Which of the following does authentication aim to accomplish?
- Restrict what operations/data the user can access
- Determine if the user is an attacker
- Flag the user if he/she misbehaves
- Determine who the user is
13) 12. Which of the following is relevant for IIQ installation:
- of roles
- Available RAM and memory
- IIQ version
- All of the Above
14) 13. Which of the following is an authentication method?
- Biometric
- SMS Code
- Password
- All of the Above
15) 14. In role-based access control, each user is assigned one or more roles, and the roles determine which parts of the system the user is allowed to access.
- TRUE
- FALSE
16) 15. If LDAP is configured for pass through authentication, IIQ always used LDAP uid to match with Username entered on login form.:
- TRUE
- FALSE
17) 16. Which of the following is correct event type:
- Manager Transfer
- Role assigned
- Email sent
18) 17. Is the statement true about the VTL syntax $identityName, ${identityName},$!identityName:
- TRUE
- FALSE
21) 18. Authorization aims to determine who the user is, and authentication aims to restrict what operations/data the user can access
- TRUE
- FALSE
22) 19. Which of the following defines provisioning?
- To distribute
- To make available
- To assign
- To administer
23) 20. Consider following properties from iiq.properties:
- TRUE
- FALSE
28) 21. Which of the following is an example of a good identifier?
- Birth certificate
- Driver’s license
- Social Security card
- Credit Card
29) 22. Which of the following is not a component of IAM?
- Roles
- Users
- Organizational Units
- Groups
30) 23. Every user you create in the IAM systems starts with ________.
- Full Permissions
- No Permissions
- Partial Permissions
31) 24. Is the statement correct to call rule in rule
- TRUE
- FALSE
32) <RuleLibraries>
33) <Reference class=”sailpoint.object.Rule” name=”SP Provisioning Rules Library”/>
34) </RuleLibraries>
35) 25. Is the statement true about the VTL syntax $identityName, ${identityName},$!identityName:
- TRUE
- FALSE
36) {} syntax allows concatenation with other text
37) ! syntax suppresses printing when the variable is null
38) 26. Which of the following is a pre-requisite for Deployment Accelerator:
- IIQ server should be running
- Eclipse
- Mail server
- IIQ Database
39) 27. Which of the following can be used for importing XML objects in IIQ :
- Import from IIQ console
- Import from UI
- Both
40) 28. An IIQ Engineer wants to test email notification, which of the following are correct configuration:
- Select IMPL
- Select POP3
- Select Redirect to file
41) 29. What is the role of biometrics?
- Authorization
- Authentication
- Communication
42) 30. The information security team must also get which group involved in order to have a successful identity and access management (IAM) deployment?
- Networking
- Human resources
- Finance
- Physical security