Saviynt IGA 101 Quiz Flashcards

1
Q

Which of the following statements is incorrect regarding the successful implementation of IGA? Providing cataloguing feature and governing all critical applications

  • Maintaining a higher total cost of ownership (TCO)
  • Providing the right access at the right time
  • Clearing the audit process
A

Maintaining a higher total cost of ownership (TCO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Saviynt platform offers the Controls Library feature to collect suggestions for common applications and compliance requirements including HIPAA, HiTRUST, SOX, PCI DSS, CPPA, GDPR, ISO 2000 series, and NIST.

-TRUE
-FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following can be autogenerated in Saviynt during reconciliation?

  • Username
  • SystemUsername
  • Email
  • All of the above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Microservices architecture breaks an application into its core functions. Each function is called a service and is built and deployed independently, wherein individual services function without negatively affecting others.

  • TRUE
  • FALSE
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify the incorrect step in the Connected Application User Import process

  • Create a connection to the target
  • Run the User Import Job to import users
  • Map the attributes that are to be imported in the file
  • Test the connection
A
  • Test the connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following statements is incorrect about Data Transformation in Saviynt?

  • Can be performed in the Post-Import stage
  • Can be performed in the Pre-Import stage
  • Can be performed using the user pre-processor config JSON at the file upload level only
  • Can be performed in the Post-Import stage by using the CUSTOMQUERYJOB job
A

Can be performed in the Post-Import stage by using the CUSTOMQUERYJOB job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the significance of the SAV Role, ROLE_ADMIN?

  • Assignee of this role has restricted access to the application.
  • Assignee of this role has unrestricted access to the application.
  • All of the above
A

Assignee of this role has unrestricted access to the application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Through SAV Roles, you can control what end-users can do at both broad and granular levels in EIC.

  • TRUE
  • FALSE
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The SAV Role name must be in uppercase. For example, ROLE_SAV_MANAGER.

  • TRUE
  • FALSE
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If a user is still having access to critical applications even after leaving an organization or moving to any other department, it is a risk to the company. Which identity event do you think should have been managed properly to avoid such risks?

  • Resignation
  • Exit Interview
  • Offboarding
  • Transfer
A

Offboarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Technical Rules are used to provision ___________ to employees joining a company based on specified conditions.

  • Automatic Access
  • Birthright Access
  • Remove Birthright Access
  • An Account
A

Birthright Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Technical Rules can be triggered from User Update Rules through re-run of all provisioning rules and selected Technical Rule actions. Select the correct option and click Submit.

  • TRUE
  • FALSE
A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Edward an IT admin has setup a new Employee Onboarding Rule in Saviynt. He noticed that the new employees were not assigned any access even after setting up the rule, and that the rules were not running as expected.

  • Set up a Technical Rule
  • Set up a User Update Rule
  • Check the Execution Trail page for help with troubleshooting and rerun the failed rules and actions
A

Check the Execution Trail page for help with troubleshooting and rerun the failed rules and actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a user’s employee type is changed (condition), an action to launch a certification by the manager should be added along with another action such as notifying by an email.

  • Request Rules
  • Technical Rules
  • User Update Rules
  • Scan Rules
A

User Update Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A User Update Rule can be triggered when:

  • A User is removed from UI (One click disable)
  • A User is created from API calls
  • A User is created from Import
  • All of the above
A

A User is removed from UI (One click disable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identity BOT enables you to integrate Saviynt Enterprise Identity Cloud with applications that do not expose _______________.

  • Integration APIs
  • Accounts
  • Reconciliation APIs
  • None of the above
A

Integration APIs

17
Q

Saviynt Access Review supports

  • Connected Applications
  • Disconnected Applications
  • Hybrid Applications
  • All the Above
A

All the Above

18
Q

Which of the following options can be requested through the Saviynt Access Request System?

  • Role modification Request
  • Application Access Request
  • Enterprise Role Request
  • All of the above
A

Application Access Request

19
Q

How can you make an Application requestable?

  • By adding an Endpoint to the Security System
  • By adding a Workflow to the Security System
  • By making an Application requestable in Global Configuration
  • None of the above
A

By adding an Endpoint to the Security System

20
Q

How many personas does the Saviynt’s Access Request System support?

  • 2
  • 3
  • 5
21
Q

A primary certifier/owner is mandatory for a Role Owner access review

  • TRUE
  • FALSE
22
Q

Entitlement Owner Access Review

  • Reviews entitlement details
  • Reviews users and accounts having access to the entitlement
  • Reviews child entitlements
  • All the Above
A

Reviews users and accounts having access to the entitlement

23
Q

What is the primary purpose of the ES-based SQL query?

  • Fetch data from Elasticsearch
  • Retrieve data from the SQL database and store it in Elasticsearch
  • Execute commands in Elasticsearch
  • Generate reports directly from SQL database
A

Fetch data from Elasticsearch

24
Q

What is the initial step to enable an ES-based query?

  • Fetch data directly from Elasticsearch
  • Create and execute an ES-based SQL query to retrieve records from the SQL database and store them in Elasticsearch
  • Set up indices in Elasticsearch
  • Define controls for data retrieval
A

Set up indices in Elasticsearch

25
Q

How is the data utilized once available in Elasticsearch after executing the SQL query?

  • It is analyzed using SQL commands
  • Stored in a separate index for future reference
  • Utilized to create analytics controls
  • Transferred back to the SQL database
A

Stored in a separate index for future reference

26
Q

You can create a _______________ if you wish to get a certain set of data from the Saviynt database. This is the most powerful of all analytics configurations since it allows retrieval of data directly from the database.

  • Runtime Analytics Control
  • Elasticsearch Query
  • SQL query
  • Custom Analytics Control