SailPoint Quiz

SailPoint Quiz

SailPoint Quiz : This SailPoint Beginner Quiz contains set of Top 30 SailPoint Quiz which will help to clear any Mcqs exam which is designed for Beginner.



1) 1. Assignement Rule is Bydefault present in Role Container. Business Role

  1. TRUE
  2. FALSE
Answer : Option A

 

 

2) 2. XXX.targate.properties exist in Bile Home Directory

  1. TRUE
  2. FALSE
Answer : Option A

 

 

3) 3. If identity attributes has to be calculated from multiple application attributes, Is the statement correct to set global rule in the identity mapping

  1. TRUE
  2. FALSE
Answer : Option A

 

 

4) 4. Is the statement true about email template

  1. TRUE
  2. FALSE
Answer : Option A

 

6) 5.  If below command is run in IIQ console, which option will be correct

  1. workflow Test Workflow /home/arGWrk.xml (note: variable identityName is initialized in the arGWrk.xml)
  2. Workflow will fail as end step is called before complete
  3. Workflow will print “inside approval set <identityName>”
Answer : Option A

 

 

7) 6. Task Definition can be imported using Deployment accelerator

  1. TRUE
  2. FALSE
Answer : Option A

 

 

8) 7. Task Definition objects has to be placed the SSB

  1. TRUE
  2. FALSE
Answer : Option A

 

 

9) 8. Which of the following functionality supported by an aggregation task

  1. Update identity attribute
  2. Cleanup deleted accounts
  3. Promote managed attributes
  4. Execute certification
Answer : Option C

 

 

10) 9. Which of the following is done by Identity management?

  1. Controlling access to data in the cloud
  2. Maintaining user roles
  3. Preventing unauthorized uses
  4. All of the Above
Answer : Option D

 

 

11) 10. Which of the following operation can be executed from Eclipse with Deployment accelerator:

  1. Run rule
  2. Import xml
  3. Trigger workflow
  4. Trigger certification
Answer : Option B

 

 

12) 11. Which of the following does authentication aim to accomplish?

  1. Restrict what operations/data the user can access
  2. Determine if the user is an attacker
  3. Flag the user if he/she misbehaves
  4. Determine who the user is
Answer : Option D

 

 

13) 12. Which of the following is relevant for IIQ installation:

  1. of roles
  2. Available RAM and memory
  3. IIQ version
  4. All of the Above
Answer : Option B

 

 

14) 13. Which of the following is an authentication method?

  1. Biometric
  2. SMS Code
  3. Password
  4. All of the Above
Answer : Option D

 

 

15) 14. In role-based access control, each user is assigned one or more roles, and the roles determine which parts of the system the user is allowed to access.

  1. TRUE
  2. FALSE
Answer : Option A

 

 

16) 15. If LDAP is configured for pass through authentication, IIQ always used LDAP uid to match with Username entered on login form.:

  1. TRUE
  2. FALSE
Answer : Option A

 

 

17) 16. Which of the following is correct event type:

  1. Manager Transfer
  2. Role assigned
  3. Email sent
Answer : Option A

 

 

18) 17. Is the statement true about the VTL syntax $identityName, ${identityName},$!identityName:

  1. TRUE
  2. FALSE
Answer : Option B

 

21) 18. Authorization aims to determine who the user is, and authentication aims to restrict what operations/data the user can access

  1. TRUE
  2. FALSE
Answer : Option B

 

 

22) 19. Which of the following defines provisioning?

  1. To distribute
  2. To make available
  3. To assign
  4. To administer
Answer : Option B

 

23) 20. Consider following properties from iiq.properties:

  1. TRUE
  2. FALSE
Answer : Option A

 

28) 21. Which of the following is an example of a good identifier?

  1. Birth certificate
  2. Driver’s license
  3. Social Security card
  4. Credit Card
Answer : Option B

 

 

29) 22. Which of the following is not a component of IAM?

  1. Roles
  2. Users
  3. Organizational Units
  4. Groups
Answer : Option C

 

 

30) 23. Every user you create in the IAM systems starts with ________.

  1. Full Permissions
  2. No Permissions
  3. Partial Permissions
Answer : Option B

 

 

31) 24. Is the statement correct to call rule in rule

  1. TRUE
  2. FALSE
Answer : Option B

 

 

32) <RuleLibraries>

Answer :

 

 

33) <Reference class=”sailpoint.object.Rule” name=”SP Provisioning Rules Library”/>

Answer :

 

 

34) </RuleLibraries>

Answer :

 

 

35) 25. Is the statement true about the VTL syntax $identityName, ${identityName},$!identityName:

  1. TRUE
  2. FALSE
Answer : Option A

 

 

36) {} syntax allows concatenation with other text

Answer :

 

 

37) ! syntax suppresses printing when the variable is null

Answer :

 

 

38) 26. Which of the following is a pre-requisite for Deployment Accelerator:

  1. IIQ server should be running
  2. Eclipse
  3. Mail server
  4. IIQ Database
Answer : Option B

 

 

39) 27. Which of the following can be used for importing XML objects in IIQ :

  1. Import from IIQ console
  2. Import from UI
  3. Both
Answer : Option C

 

 

40) 28. An IIQ Engineer wants to test email notification, which of the following are correct configuration:

  1. Select IMPL
  2. Select POP3
  3. Select Redirect to file
Answer : Option C

 

 

41) 29. What is the role of biometrics?

  1. Authorization
  2. Authentication
  3. Communication
Answer : Option B

 

42) 30. The information security team must also get which group involved in order to have a successful identity and access management (IAM) deployment?

  1. Networking
  2. Human resources
  3. Finance
  4. Physical security
Answer : Option A