Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Saviynt SCAIP Dumps Questions Answers

Page: 1 / 5
Total 60 questions

Saviynt Certified Advanced IGA Professional (Level 200) Questions and Answers

Question 1

What are the different integration options available to integrate Saviynt with ServiceNow?

Options:

A.

ServiceNow as a Managed Application

B.

ServiceNow as a Request Form

C.

ServiceNow as a Ticketing System (ITSM)

D.

All of the above

Buy Now
Question 2

A target application exposes REST APIs and you need Saviynt to perform imports as well as provisioning and deprovisioning. Which connector approach is the most appropriate?

Options:

A.

Active Directory Connector

B.

REST Connector

C.

SMTP Configuration

D.

Dataset Configuration

Question 3

Which of the following statements are correct?

Options:

A.

The role mining process discovers relationships between users based on similar access permissions that can logically be grouped to form a role

B.

In the Role mining, if the percentage cut-off = 60%, it would perform mining on only the access which is associated with 100% users

C.

Duplicate Identity Management feature access need to be added to the SAV Role to view the duplicate identity management

D.

Duplicate Identity Management can only merge user attributes but not user access

Question 4

What are the different features available under Role Intelligence? (Multi-Select)

Options:

A.

Role Governance

B.

Entitlement Discovery

C.

Role Mining

D.

Role-Access Mismatches

Question 5

Which configuration is NOT mandatory when establishing a cascading relationship between two fields in a form?

Options:

A.

Set "What action to perform when Parent attribute changes?" to Mapping

B.

Configure Parent Attribute parameter for the child attribute

C.

Set Action String to CHILD###PARENT

D.

Ensure that case of Attribute Name of parent field and Parent Attribute of child field should match

Question 6

In EIC, how is the accountname for the service account created? (Multi-Select)

Options:

A.

As defined in Endpoint - > Service Account Name Rule

B.

Enter Manually while requesting a service account

C.

As defined in Global Configurations - > Account Name Rule

D.

As defined in Connection - > Create Account JSON

Question 7

What mandatory connection parameters should be configured in order to reconcile accounts using REST Connector? (Multi-Select)

Options:

A.

ConnectionJSON

B.

ImportAccountEntJSON

C.

ImportUserJSON

D.

CreateAccountJSON

Question 8

Consider that your primary HR data is stored in Workday, and you want to display the full names of the users by combining their first and last names from Workday. The Identity Repository must reflect any changes made to the user data almost in real time.

Given the above scenario, how can identity data be transformed or normalized before importing into EIC?

Options:

A.

Configure an inline preprocessor with USERUPDATEJSON

B.

Configure an inline preprocessor with MODIFYUSERDATAJSON

C.

Configure an inline preprocessor with IMPORTUSERJSON

D.

None of the above

Question 9

Choose the correct SQL query from the below options to populate an attribute with the logged-in user’s Display Name

Options:

A.

select DISPLAYNAME as ID from Users u where u.userkey=${loggedInUser}

B.

select DISPLAYNAME as ID from Users u where u.userkey=${user.id}

C.

select DISPLAYNAME as ID from Users u where u.userkey=${requestor}

D.

All the above

Question 10

What are the filters available to view the SOD violations in the SOD Risk Evaluation Job? (Multi-Select)

Options:

A.

Users

B.

Security System

C.

Ruleset

D.

User Account Evaluation

Question 11

Which of the following statements are correct? (Multi-Select)

Options:

A.

The role mining process discovers relationships between users based on similar access permissions that can logically be grouped to form a role

B.

In the Role mining, if the percentage cut-off = 60%, it would perform mining on only the access which is associated with 100% users

C.

Duplicate Identity Management feature access need to be added to the SAV Role to view the duplicate identity management

D.

Duplicate Identity Management can only merge user attributes but not user access

Question 12

A customer requires provisioning of time-bound access through roles that should be revoked automatically after certain days from the day of assignment. What option in EIC will help the customer achieve this requirement?

Options:

A.

Configure Dynamic Attributes for Roles

B.

Enable Time-bound for Roles in Global Configurations > Roles

C.

Configure an Emergency Access Role

D.

Configure an Enterprise Role and enable timestamp under Role Details

Question 13

Problem Statement:

Access request approval is not being assigned to the correct approver for a given endpoint.

In this scenario, what configurations will you check? (Multi-Select)

Options:

A.

Verify the workflow attached to the corresponding Endpoint to ensure it is correctly configured

B.

Verify if Delegate is configured for the intended approver

C.

Verify the workflow attached to the corresponding Security System to ensure it is correctly configured

D.

Verify the requestor selected the correct approver while submitting the request

Question 14

The Helpdesk has set a new password for the user who called in for password reset assistance. Choose the correct configuration to share the password with the calling user

Options:

A.

System automatically shares the password

B.

Configure an email template in Change Password Notification configurations

C.

Configure an email template in the Reset Password notification under password policy

D.

Setup User Update Rule and configure an email template

Question 15

In which system does the request fulfillment happen while integrating ServiceNow using Saviynt App for ServiceNow?

Options:

A.

Saviynt

B.

ServiceNow

C.

Saviynt or ServiceNow, based on the configuration

D.

None of the above

Question 16

The EIC Administrator observed that all accounts were disabled in Saviynt due to incorrect configuration in the target application. What controls can be implemented in Saviynt to avoid such scenarios?

Options:

A.

Use the accEntThresholdValue attribute in the STATUS_THRESHOLD_CONFIG connection parameter

B.

It is not possible to set a limit

C.

Set the limit in the external config file

D.

Use the accountThresholdValue attribute in the STATUS_THRESHOLD_CONFIG connection parameter

Question 17

To authenticate Saviynt REST API calls, what must be generated before invoking protected APIs?

Options:

A.

SMTP token

B.

OAuth access token

C.

Transport package

D.

Dataset key

Question 18

An EIC Administrator wants to retrieve a report of users and their assigned SAV Roles. What are the ways in which it can be achieved? (Multi-Select)

Options:

A.

Create analytics with the SQL Query to get the data and select the checkbox "Send Email As Attachment" in analytics configuration

B.

Create an analytics with the SQL Query to get the data and export as CSV/Excel

C.

Run a SQL Query to retrieve the data in Data Analyzer

D.

Using enhanced query

Page: 1 / 5
Total 60 questions