SailPoint Certified IdentityIQ Engineer Exam Practice Test

Page: 1 / 14
Total 122 questions
Question 1

An engineer is assigned to configure an account attribute. The requirements are:

Purpose: Flag privileged accounts

Read from: Financial application, privileged attribute

Calculate from: Keystore application, responsibility-code attribute

Usage 1: Display as option in Advanced Analytics

Usage 2: Use when writing rules

Usage 3: Include in policies

Does the engineer need to set this configuration option on the account attribute to meet the requirements?

Solution: Edit Mode: Read Only



Answer : B

Setting the configuration option 'Edit Mode: Read Only' on the account attribute would not meet the requirements as specified. The requirement to 'Calculate from: Keystore application, responsibility-code attribute' implies that the attribute needs to be dynamically calculated or updated based on another attribute. If the attribute is set to 'Read Only,' it cannot be modified, which would prevent it from being calculated or updated as needed. Therefore, 'Edit Mode: Read Only' should not be used in this scenario.


SailPoint IdentityIQ Administration Guide (Sections on Account Attributes and Attribute Calculation)

SailPoint IdentityIQ Configuration Guide (Field Properties and Edit Modes)

Question 2

An engineer is assigned to configure an account attribute. The requirements are:

Purpose: Flag privileged accounts

Read from: Financial application, privileged attribute

Calculate from: Keystore application, responsibility-code attribute

Usage 1: Display as option in Advanced Analytics

Usage 2: Use when writing rules

Usage 3: Include in policies

Does the engineer need to set this configuration option on the account attribute to meet the requirements?

Solution: Source Mappings: Application Rule



Answer : A

Yes, setting the 'Source Mappings: Application Rule' configuration on the account attribute is necessary to meet the requirements described. The use case involves flagging privileged accounts based on attributes read from different applications and using these flags in various IdentityIQ features like Advanced Analytics, rule writing, and policy enforcement. By configuring the attribute with a source mapping that uses an Application Rule, you can implement complex logic to derive the attribute's value from multiple sources, such as a financial application and a keystore application, according to the specific requirements.

Therefore, the correct answer is A. Yes.

Reference: This answer is based on the SailPoint IdentityIQ Implementation Guide, which discusses the use of source mappings and application rules for complex attribute calculations and configurations. The guide explains how to set up attributes that pull data from multiple sources and use this data across various IdentityIQ features.


Question 3

Is this a valid scenario that can be achieved in IdentitylQ by configuring the Quicklink populations?

Solution: Allow a user to create a new identity cube in IdentitylQ.



Answer : B

Allowing a user to create a new identity cube in IdentityIQ is not a scenario that can be achieved through QuickLink populations. QuickLink populations are used to define which users have access to specific QuickLinks or tasks in the IdentityIQ interface. They do not control the creation of identity cubes, which is a function typically handled through the aggregation process, API calls, or specific administrative actions within the IdentityIQ platform. The creation of an identity cube involves data import and transformation processes, not just a UI-level permission.

Therefore, the correct answer is B. No.

Reference: This answer is supported by the SailPoint IdentityIQ Administration Guide, which explains the roles and functions of QuickLink populations, highlighting their use for access control within the UI, but not for core operations like identity cube creation.


Question 4

A customer wants to make changes in their IdentitylQ user interface. Consider branding and other IdentitylQ Ul changes. Is this statement valid?

Solution: Primary and secondary colors are set through the IdentitylQ Configuration > Miscellaneous page.



Answer : B

The primary and secondary colors in the IdentityIQ user interface are not set through the IdentityIQ Configuration > Miscellaneous page. Instead, these colors are typically configured through the style.css or other custom CSS files that are part of the IdentityIQ UI customization process. Administrators can define and modify the color scheme, fonts, and other style elements by editing the relevant CSS files or using the Branding feature within IdentityIQ.

Therefore, the correct answer is B. No.

Reference: This information is based on the SailPoint IdentityIQ Branding Guide, which details how to modify the visual aspects of the UI, including colors, by editing CSS files rather than through the Miscellaneous settings.


Question 5

A customer wants to make changes in their IdentitylQ user interface. Consider branding and other IdentitylQ Ul changes. Is this statement valid?

Solution: Text on the login page is set through message keys in the message catalog.



Answer : A

Yes, the text on the login page of IdentityIQ is set through message keys in the message catalog. The message catalog in IdentityIQ contains localized text strings that are used throughout the user interface, including on the login page. By modifying the appropriate message keys in the catalog, you can customize the text that appears on the login page to match the organization's branding or messaging requirements.

Therefore, the correct answer is A. Yes.

Reference: This answer is based on the SailPoint IdentityIQ Localization Guide, which explains how message keys in the message catalog can be edited to customize UI text, including login page content.


Question 6

Can the Provisioning tab under "Administrator Console' be used to do the following task?

Solution: Manually retry the provisioning attempt for pending transactions.



Answer : A

Yes, the Provisioning tab under the 'Administrator Console' can be used to manually retry provisioning attempts for pending transactions. This feature allows administrators to retry failed provisioning operations or manually trigger provisioning actions that are in a pending state, providing greater control over the provisioning process.


SailPoint IdentityIQ Administration Guide (Provisioning Management and Manual Retry)

SailPoint IdentityIQ Provisioning Guide

Question 7

Can the Provisioning tab under "Administrator Console' be used to do the following task?

Solution: Map the associated WorkflowCase to a particular Provisioning Transaction.



Answer : B

No, the Provisioning tab under the 'Administrator Console' is not used to map the associated WorkflowCase to a particular Provisioning Transaction. The Provisioning tab is primarily for monitoring and managing provisioning operations, not for mapping workflow cases to transactions. Such mappings are typically handled within the workflow configuration itself, not through the Provisioning tab.


SailPoint IdentityIQ Workflow Guide (Handling Workflow and Provisioning Transactions)

SailPoint IdentityIQ Administration Guide (Provisioning Tab Limitations)

Page:    1 / 14   
Total 122 questions