SailPoint IdentityIQ-Engineer SailPoint Certified IdentityIQ Engineer Exam Practice Test

Page: 1 / 14
Total 122 questions
Question 1

Is the following statement true?

Solution: All ManagedAttribute objects associated to an Identity can be viewed on the 'Attributes' tab from 'View Identity' QuickLink.



Answer : B

Not all ManagedAttribute objects associated with an Identity are visible on the 'Attributes' tab within the 'View Identity' QuickLink. The 'Attributes' tab typically displays attributes that are specifically configured to be shown in the identity view, which might include certain managed attributes depending on how the system is configured. ManagedAttributes can represent various aspects like roles, entitlements, or even custom attributes, and their visibility on the UI depends on how the IdentityIQ instance is configured. To manage and configure visibility of attributes, consult the SailPoint IdentityIQ User Interface Customization Guide and Managed Attributes documentation.

Top of Form

Bottom of Form


Question 2

Can the Provisioning tab under "Administrator Console' be used to do the following task?

Solution: Map the associated WorkflowCase to a particular Provisioning Transaction.



Answer : B

No, the Provisioning tab under the 'Administrator Console' is not used to map the associated WorkflowCase to a particular Provisioning Transaction. The Provisioning tab is primarily for monitoring and managing provisioning operations, not for mapping workflow cases to transactions. Such mappings are typically handled within the workflow configuration itself, not through the Provisioning tab.


SailPoint IdentityIQ Workflow Guide (Handling Workflow and Provisioning Transactions)

SailPoint IdentityIQ Administration Guide (Provisioning Tab Limitations)

Question 3

Can the Provisioning tab under "Administrator Console' be used to do the following task?

Solution: View the specific operations on each attribute being provisioned.



Answer : A

Yes, the Provisioning tab under the 'Administrator Console' in IdentityIQ can be used to view the specific operations on each attribute being provisioned. This tab provides detailed visibility into the provisioning operations, including which attributes are being modified, created, or removed as part of the provisioning process. This is essential for administrators to monitor and troubleshoot provisioning tasks.


SailPoint IdentityIQ Administration Guide (Provisioning Tab Overview)

SailPoint IdentityIQ Provisioning Guide

Question 4

Can this action be performed as part of configuring an application definition in IdentitylQ?

Solution: Define account correlation via a rule.



Answer : A

Yes, defining account correlation via a rule is an action that can be performed as part of configuring an application definition in SailPoint IdentityIQ. Account correlation rules are often used to determine how accounts from different sources are linked to identities within IdentityIQ. These rules allow for complex logic to be applied when matching accounts to identities, beyond simple attribute matching.


SailPoint IdentityIQ Administration Guide (Section on Account Correlation)

SailPoint IdentityIQ Application Configuration Guide (Using Rules for Account Correlation)

Question 5

Can this action be performed as part of configuring an application definition in IdentitylQ?

Solution: Specify which users should be provisioned with a basic account as part of a joiner event.



Answer : A

Yes, this action can be performed as part of configuring an application definition in IdentityIQ. When defining an application, you can specify provisioning policies, including which users should be provisioned with a basic account as part of a joiner event. This is typically done by setting up account creation rules or provisioning policies that trigger when a new user (joiner) is detected, ensuring they receive the necessary basic accounts and entitlements.

Therefore, the correct answer is A. Yes.


Question 6

Is this statement true about the IdentitylQ Audit functionality and/or options?

Solution: The built-in auditing options are immutable; they are always recorded. However, custom audits can be turned on or off.



Answer : A

Yes, the statement is true. In SailPoint IdentityIQ, the built-in auditing options are indeed immutable, meaning they are always recorded and cannot be disabled or altered. This ensures that critical actions and changes are always logged for compliance and security purposes. However, custom audit configurations, such as additional custom audit fields or logs, can be turned on or off based on specific organizational requirements.


SailPoint IdentityIQ Audit Guide

SailPoint IdentityIQ Administration Guide (Sections on Auditing and Compliance)

Question 7

Is this statement correct about writing and executing source mapping rules to populate identity attributes?

Solution: Once the value for the identity attribute has been calculated, the rule must persist the identity attribute to the database.



Answer : B

The statement is incorrect. When writing and executing source mapping rules to populate identity attributes, the rule itself does not need to persist the identity attribute to the database. In SailPoint IdentityIQ, once the value for an identity attribute has been calculated by a source mapping rule, IdentityIQ automatically handles the persistence of this attribute to the database as part of the aggregation or provisioning process. The developer does not need to explicitly persist the attribute; this is managed by the system.


SailPoint IdentityIQ Source Mapping Guide

SailPoint IdentityIQ Administration Guide (Aggregation and Attribute Mapping Sections)

Page:    1 / 14   
Total 122 questions