New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

IdentityNow-Engineer Questions and Answers

Question # 6

Is this statement correct about security and/or encryption of data?

Solution: When setting up a virtual appliance cluster. SailPoint creates an asymmetnc key pair based on a user-provided passphrase. and then uses this key pair to communication with the IdentityNow tenant.

A.

Yes

B.

No

Full Access
Question # 7

Is the following statement accurate regarding Separation of Duties (SoD)?

Solution: An SoD policy can define mitigating controls.

A.

Yes

B.

No

Full Access
Question # 8

An IdentityNow engineer needs to find identities with disabled AD accounts by using IdentityNow's search features. Is this the correct search syntax to perform this task?

Solution:

A.

Yes

B.

No

Full Access
Question # 9

When preparing for a manager certification campaign is this a step that is considered a best practice before the campaign preview is generated?

Solution: Evaluate available campaign administration filters

A.

Yes

B.

No

Full Access
Question # 10

Is this statement true about the IdentityNow release cycle?

Solution: IdentityNow releases are controlled and coordinated by SailPoint.

A.

Yes

B.

No

Full Access
Question # 11

Does this run on the VA?

Solution: Active Directory connector

A.

Yes

B.

No

Full Access
Question # 12

Is this statement true about using the IdentityNow APIs?

Solution: API documentation is located at https://docs.sailpoint.com

A.

Yes

B.

No

Full Access
Question # 13

In an IdentityNow environment, the source lest connection is failing with a timeout error.

Is this a step an identityNow engineer should take to troubleshoot the problem?

Solution: Clear the Authentication checkbox for the source in identityNow.

A.

Yes

B.

No

Full Access
Question # 14

Is this statement correct about security and/or encryption of data?

Solution: identityNow uses a hashing algorithm for secure encryption of data in transit and uses TLS for hashing passwords and the answers to security questions

A.

Yes

B.

No

Full Access
Question # 15

In an optimized aggregation, if an account is unchanged since the last aggregation, does this step execute?

Solution: The virtual appliance connects to the target system to retrieve accounts.

A.

Yes

B.

No

Full Access
Question # 16

Is this an item that an IdentityNow engineer should configure when implementing a source that uses a JDBC connector?

Solution: Use a query select statement with a clause to match the incoming account to an existing account for the Single Account SQL Query configuration item

A.

Yes

B.

No

Full Access
Question # 17

An IdentityNow engineer needs to review logs to diagnose when the secure tunnel fails to allow communication. Could reviewing thi9 log file help diagnose the issue?

Solution: /home/sailpoint/log/relay.log

A.

Yes

B.

No

Full Access
Question # 18

The customer has a system that matches the following description. Is this a suitable connector type to use?

The system is a modern, cloud-based, web application that uses a MySQL database backend provided by the cloud platform. The database is only accessible from the web application. The web application exposes a fully compliant SCIM 2.0 interface with OAuth 2.0 client credentials.

Solution: SCIM 2.0 Connector

A.

Yes

B.

No

Full Access
Question # 19

An IdentityNow engineer has the following problem:

An identity is listed under Identities with Errors.

Is this one of the steps that should be taken to troubleshoot the issue?

Solution: Check for missing lastname, email, or uid attributes.

A.

Yes

B.

No

Full Access
Question # 20

Is this an advantage of microservice architecture?

Solution: It provides quicker resolution of unintentional issues or failures with the service.

A.

Yes

B.

No

Full Access
Question # 21

Is this statement true about the purpose of a tenant?

Solution: A non-production tenant is for demonstrating functionality.

A.

Yes

B.

No

Full Access
Question # 22

In an IdentityNow environment, the source lest connection is failing with a timeout error.

Is this a step an identityNow engineer should take to troubleshoot the problem?

Solution: Test connectivity from the virtual appliance (VA) to the source.

A.

Yes

B.

No

Full Access
Question # 23

Is this statement accurate regarding SailPoint's multi-tenant processing environment?

Solution: identityNow admins have the option to choose how often updates to their tenant occur.

A.

Yes

B.

No

Full Access
Question # 24

Is this an example of a vanity URL?

Solution: https://identityNowacme.com

A.

Yes

B.

No

Full Access
Question # 25

Is the following true about the web-services connector in IdentityNow?

Solution: The connector supports SAML authentication.

A.

Yes

B.

No

Full Access
Question # 26

Is this statement accurate regarding SailPoint's multi-tenant processing environment?

Solution: identityNow admins have the option to choose how often updates to their tenant occur.

A.

Yes

B.

No

Full Access
Question # 27

Is this an appropriate use case for the Build Map?

Solution: To provide the ability to modify to modify the map data of an account for a JDBC or a Delimated File source.

A.

Yes

B.

No

Full Access
Question # 28

An IdentityNow engineer has set up an access profile for an application. The access profile allows for users to request access, and for a user's manager to approve or deny access.

After a recent staff meeting, management has expressed that they want to remove any approval requirements for this application.

Is management's request possible in IdentityNow. and. if so. are these the recommended steps the engineer should take to meet their new requirement?

Solution: It is possible. Delete the certification campaign associated with this application.

A.

Yes

B.

No

Full Access
Question # 29

A customer wants to configure a virtual appliance (VA) to use a static IP address. Does this file on the VA need to be modified to perform the configuration?

Solution: /home/sailpoint/proxy.yaml

A.

Yes

B.

No

Full Access
Question # 30

Review the steps.

1______________________________________

2. Import the virtual appliance (VA) image to the virtualization platform.

3. Start the VA.

4. Log in to the VA using the default credentials.

5. Change the password for the SailPoint user.

6______________________________________

7. Create a new VA cluster in IdentityNow.

8. Create a new VA configuration in IdentityNow. 9 Download / procure the config.yaml.

10. Configure the keyPassphrase in the config.yaml.

11. Upload the config.yaml into the VA.

12______________________________________.

Are these the missing steps?

Solution: 1. Click Test Connection on the VA configuration. 6. Download / procure the VA image. 12. Configure networking configurations (as needed).

A.

Yes

B.

No

Full Access
Question # 31

An IdentityNow engineer needs to find identities with disabled AD accounts by using IdentityNow's search features. Is this the correct search syntax to perform this task?

Solution:

A.

Yes

B.

No

Full Access
Question # 32

Is the following true about custom connectors in IdentityNow?

Solution: Custom connector are developed and compiled inside identityNow.

A.

Yes

B.

No

Full Access