SailPoint IdentityIQ-Engineer SailPoint Certified IdentityIQ Engineer Exam Practice Test

Page: 1 / 14
Total 122 questions
Question 1

Is the following statement true?

Solution: Every Link object must be associated to an Identity object



Answer : A

In SailPoint IdentityIQ, every Link object, which represents an account on an application for an identity, must be associated with an Identity object. The Link object is inherently tied to an identity, as it is a representation of that identity's account on a target system. Without this association, the Link would not have context within IdentityIQ. This is a fundamental aspect of IdentityIQ's data model. Refer to the SailPoint IdentityIQ Data Model documentation for detailed information on the relationships between Link objects and Identity objects.


Question 2

Is the following statement true?

Solution: All Application objects must have an Identity object as the owner.



Answer : B

Not all Application objects in SailPoint IdentityIQ must have an Identity object as the owner. While it is common practice to assign an owner to an Application object for governance and administration purposes, it is not a strict requirement. Applications can exist without a direct association to an Identity object. The ownership concept in IdentityIQ is more of a best practice for accountability rather than a mandatory attribute. Refer to the SailPoint IdentityIQ Application Definition Guide for more information on the configuration and management of Application objects.


Question 3

The engineer is configuring a new application definition.

The customer wants an Audit record to be created with the error message, if provisioning fails.

Is this the rule an engineer should write to accomplish the goal?

Solution: Configure a Postlterate rule



Answer : B

A Post-Iterate rule is used in the context of data aggregation or import processes, where it runs after each record has been processed during the iteration of accounts. This type of rule is not appropriate for handling provisioning errors or creating audit records based on provisioning failures. For auditing provisioning errors, you should configure error handling in the provisioning policy or use a custom workflow that logs errors into the audit log. The Post-Iterate rule is irrelevant to provisioning tasks and error logging, making it unsuitable for this purpose. Refer to the SailPoint IdentityIQ documentation on rules and workflows for proper error handling strategies during provisioning.


Question 4

The engineer is configuring a new application definition.

The customer wants an Audit record to be created with the error message, if provisioning fails.

Is this the rule an engineer should write to accomplish the goal?

Solution: Write an AfterProvisioning rule.



Answer : B

An AfterProvisioning rule in SailPoint IdentityIQ is typically used to execute custom logic after the provisioning process has been completed successfully. However, if provisioning fails, this rule will not be triggered because it is specifically designed for post-successful provisioning activities. To log an error message in the audit record when provisioning fails, a better approach would be to use a provisioning error handler or configure a specific workflow that captures errors and logs them accordingly. The AfterProvisioning rule is not the correct solution for this use case. Refer to the SailPoint IdentityIQ Provisioning and Workflow documentation for appropriate methods of handling provisioning errors and audit logging.


Question 5

Can the Provisioning tab under "Administrator Console' be used to do the following task?

Solution: Manually retry the provisioning attempt for pending transactions.



Answer : A

Yes, the Provisioning tab under the 'Administrator Console' can be used to manually retry provisioning attempts for pending transactions. This feature allows administrators to retry failed provisioning operations or manually trigger provisioning actions that are in a pending state, providing greater control over the provisioning process.


SailPoint IdentityIQ Administration Guide (Provisioning Management and Manual Retry)

SailPoint IdentityIQ Provisioning Guide

Question 6

A client needs a custom quicklink, which only managers can launch, in order to launch a simple workflow. Is this a valid step to take during the development of this custom quicklink?

Solution: Insert the "Managers" quicklink population as the dynamic scope in the quicklink object.



Answer : A

Inserting the 'Managers' QuickLink population as the dynamic scope in the QuickLink object is a valid step when creating a custom QuickLink that should only be accessible by managers. QuickLink populations are used to define which users have access to specific QuickLinks based on criteria like role, department, or other attributes. By assigning the 'Managers' population, only users who are members of that population will see and be able to launch the QuickLink.

Therefore, the correct answer is A. Yes.


Question 7

A client needs a custom quicklink, which only managers can launch, in order to launch a simple workflow. Is this a valid step to take during the development of this custom quicklink?

Solution: Place a quicklink object on the workflow that is to be launched



Answer : B

Placing a QuickLink object directly on a workflow is not a valid step in the development of a custom QuickLink. QuickLinks are used to provide users with easy access to specific tasks or workflows through the IdentityIQ interface, but the QuickLink itself is not embedded within the workflow. Instead, the QuickLink is created as a separate object and associated with the desired workflow or task that it is meant to launch.

The correct approach would involve creating a QuickLink that points to the workflow and then controlling access to the QuickLink by restricting it to a specific QuickLink population (e.g., 'Managers'). Therefore, the correct answer is B. No.


Page:    1 / 14   
Total 122 questions