Pre-Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Saviynt SCAIP Saviynt Certified Advanced IGA Professional (Level 200) Exam Practice Test

Demo: 18 questions
Total 60 questions

Saviynt Certified Advanced IGA Professional (Level 200) Questions and Answers

Question 1

Which among these is NOT a valid parameter under ImportAccountEntJSON in REST connector?

Options:

A.

accountOwnerParams

B.

entitlementParams

C.

accountParams

D.

entOwnerParams

Question 2

Which of the following statements are correct? (Multi-Select)

Options:

A.

The role mining process discovers relationships between users based on similar access permissions that can logically be grouped to form a role

B.

In the Role mining, if the percentage cut-off = 60%, it would perform mining on only the access which is associated with 100% users

C.

Duplicate Identity Management feature access need to be added to the SAV Role to view the duplicate identity management

D.

Duplicate Identity Management can only merge user attributes but not user access

Question 3

Administrator created a custom SAV role, ROLE_CUSTOM_READ, with the "Read Only" option set to true. If the user is assigned both ROLE_ADMIN and ROLE_CUSTOM_READ, what actions can the user perform?

Options:

A.

User can only view/edit the modules as mapped under Features for ROLE_CUSTOM_READ

B.

User can only view all EIC configurations

C.

It depends; the access defined in the SAV Role that was assigned later takes precedence over the other

D.

User will have full view/edit access as user is part of ROLE_ADMIN

Question 4

Which campaign type should be used when managers must review and certify access for their direct reportees?

Options:

A.

User Manager Campaign

B.

Entitlement Owner Campaign

C.

Role Owner Campaign

D.

Service Account Campaign

Question 5

What configuration types are needed to set up an emergency access role request?

Options:

A.

Select emergency access related parameters in the Role-level Configurations

B.

All the above

C.

Select required feature access in SAV Role Configurations

D.

Select a workflow under Global Configurations

Question 6

Which of the following scenarios are True to trigger Technical Rule Execution in EIC? (Multi-Select)

Options:

A.

When a user is deleted and the condition in the rule matches

B.

When users are imported through Import Job and the condition in the rule matches

C.

A new user is registered or created from the UI and the condition in the rule matches

D.

The existing user is updated and satisfies a user update rule with action as Re-run provisioning rules

Question 7

What is the use of the Show XML option in a workflow?

Options:

A.

It allows users to create new JSON wirings from scratch

B.

It shows the Workflow version history

C.

It provides the ability to edit the Workflow XML script

D.

It enables users to open and view the Workflow XML script in a read-only mode

Question 8

Which User Update Rule action is used to automatically change service account ownership when the current owner is terminated?

Options:

A.

Transfer Ownership

B.

Run Role Mining

C.

Launch Campaign

D.

Disable SMTP

Question 9

The EIC Administrator observed that all accounts were disabled in Saviynt due to incorrect configuration in the target application. What controls can be implemented in Saviynt to avoid such scenarios?

Options:

A.

Use the accEntThresholdValue attribute in the STATUS_THRESHOLD_CONFIG connection parameter

B.

It is not possible to set a limit

C.

Set the limit in the external config file

D.

Use the accountThresholdValue attribute in the STATUS_THRESHOLD_CONFIG connection parameter

Question 10

In Saviynt App for ServiceNow, the manager is submitting a request for his subordinate, who is a valid SNOW user. However, when searching for the user, they are not appearing in the request form. What could be the potential issue?

Options:

A.

user already has access to the selected application

B.

SNOW user is not linked to imported Saviynt user

C.

The logged in manager requires additional access to submit request

D.

user does not have the selected application account

Question 11

Problem Statement:

Access request approval is not being assigned to the correct approver for a given endpoint.

In this scenario, what configurations will you check? (Multi-Select)

Options:

A.

Verify the workflow attached to the corresponding Endpoint to ensure it is correctly configured

B.

Verify if Delegate is configured for the intended approver

C.

Verify the workflow attached to the corresponding Security System to ensure it is correctly configured

D.

Verify the requestor selected the correct approver while submitting the request

Question 12

Which rule type is primarily used to provision birthright access, also known as zero-day provisioning, based on specified conditions?

Options:

A.

User Update Rule

B.

Technical Rule

C.

Scan Rule

D.

SAV Role

Question 13

In which system does the request fulfillment happen while integrating ServiceNow using Saviynt App for ServiceNow?

Options:

A.

Saviynt

B.

ServiceNow

C.

Saviynt or ServiceNow, based on the configuration

D.

None of the above

Question 14

An EIC Administrator has a requirement to execute provisioning as soon as the user import is completed, what type of job can be configured to achieve this?

Options:

A.

Multi threading job

B.

Trigger chain job

C.

Single Threaded Job

D.

WSRetry job

Question 15

Which among the following are best practices recommended to configure a technical rule in Saviynt Identity Cloud?

Options:

A.

Use Advanced Configurations

B.

Configure Retrofit for all the rules

C.

Always have user.statuskey = 1 check wherever applicable

D.

All of the above

Question 16

Which parameter can be used to manipulate data while importing from the target application in REST Connector?

Options:

A.

#nextApiKeyField#

B.

#VALUE#

C.

#CHAR#

D.

#CONST#

Question 17

Which of the following options are True with respect to Password Policy in EIC? (Multi-Select)

Options:

A.

When a password policy is configured at both the security system and connector, the password policy assigned to the security system takes precedence and is applied

B.

If you want to restrict the password change for users for a particular endpoint, you can configure "Change Password Access Query" in the endpoint

C.

When a password policy is configured at both the security system and connector, the password policy assigned to the connector takes precedence and is applied

D.

If a password policy is defined only at the connector, the password policy configured at the connector will be applied

Question 18

Schema based account import job failed with Schema definition file not found and No SAV file found. Which of the following could be the possible reasons for the same? (Multi-Select)

Options:

A.

SAV file with .sav extension is missing in the File Directory - > SAV files location

B.

SAV file with .sav extension is missing in the File Directory - > Data files location

C.

datafile (.csv extension) is not present in File Directory - > Data files location

D.

SAV file format is incorrect

Demo: 18 questions
Total 60 questions