Is this statement true about using the IdentityNow APIs?
Solution: API documentation is located at https://docs.sailpoint.com
Is this an appropriate use case for the Build Map?
Solution: To provide the ability to modify to modify the map data of an account for a JDBC or a Delimated File source.
An IdentityNow engineer needs to find identities with disabled AD accounts by using IdentityNow's search features. Is this the correct search syntax to perform this task?
Solution:
Is this statement correct about security and/or encryption of data?
Solution: When setting up a virtual appliance cluster. SailPoint creates an asymmetnc key pair based on a user-provided passphrase. and then uses this key pair to communication with the IdentityNow tenant.
An engineer needs to troubleshoot the following issue:
Incomplete Identities on authoritative source
Is this a reasonable action for the engineer to take?
Solution: Download the identity Exceptions report from the identity profile page.
When preparing for a manager certification campaign is this a step that is considered a best practice before the campaign preview is generated?
Solution: Load entitlement descriptions
Is this statement true about deploying and configuring IdentityNow's virtual appliance (VA)?
Solution: When using the AWS deployment option, the identityNow engineer needs to convert the VA image in order to deploy it.
Is this an item that an IdentityNow engineer should configure when implementing a source that uses a JDBC connector?
Solution: This item is complete
Is the following true about custom connectors in IdentityNow?
Solution: Custom connector configurations can have account correlation settings defined.
Does the following use case accurately describe provisioning on a source that has provisioning disabled?
Solution: Provisioning is initialed by a process (e.g. Access Request Role Assignments). Provisioning instructions are calculated based on current access, and go through filtering and expansion processes. Provisioning is then assigned to a source for provisioning. Since provisioning is disabled on the source a manual task is opened in IdentityNow A person carries out the provisioning manually.
Is this statement correct about identityNow components?
Solution: Password interception is available for the Active Directory source.
Exhibit.
Solution: An engineer has one small production data center with an Active Directory, a database server, and two cloud applications to which they need to connect Where would the virtual appliances (VAs) reside In this scenario?
Solution: A
Exhibit.
The diagram represents me contents of a single Active Directory forest. Assume that all employees hove employeeType set to employee and contractors have employeeType set to contractor.
is the following configuration valid for the given scenario?
Solution:
The customer needs to query only Employees from Domain A and Contingent Workers from Domain B Fotests:
1. DN - dc=domains, dc=com;TLS =No; Server = server,domaina.com
2. DN - dc=domaininb,dc=com;TLS =No; Server = server,domaina.com
search DNS:
1. DN - OU=users, DC=domains, DC=com; LDAP Filter = (employeeType=employee
2. DN - OU=Contingent Workers, OU=Users, DC=domainb, DC=com
Does this correctly describe Manager Correlation?
Solution: Linking the manager of a given identity based on the value of an account or identify attribute
In an IdentityNow environment, the source lest connection is failing with a timeout error.
Is this a step an identityNow engineer should take to troubleshoot the problem?
Solution: Check that port values configured on the identityNow source are connected for the source.
Is this statement correct about security and/or encryption of data?
Solution: identityNow uses a hashing algorithm for secure encryption of data in transit and uses TLS for hashing passwords and the answers to security questions
Refer to the following diagram.
For this strategy, all virtual appliances (VAs) are deployed in a single VA cluster, with all VAs running concurrently. Some of these VAs are in the primary data center, and others {called OR VAs) are deployed in a DR data center.
While using this strategy, is this a disadvantage?
Solution: A reconfiguration will be required within identityNow to connect to the disaster recovery VAs. If there are many sources configured, this will cause overhead in performing this failover
Is the following description of an access profile correct?
Solution: It directly references roles to provide access.
Is this an advantage of microservice architecture?
Solution: identities take up less space in the cloud.
Is this an item that an IdentityNow engineer should configure when implementing a source that uses a JDBC connector?
Solution: Select the checkbox to use database admin as service account.
Exhibit.
Solution: An engineer has one small production data center with an Active Directory, a database server, and two cloud applications to which they need to connect Where would the virtual appliances (VAs) reside In this scenario?
Solution: C
Does this example accurately describe an IdentityNow data flow?
Solution:
1. An IdentityNow engineer clicks "start manual aggregation".
2. The IdentityNow tenant contacts the Active Directory domain controller.
3. The domain controller sends a list of accounts to the virtual appliance.
4. The virtual appliance masks sensitive information and sends a list of accounts to the IdentityNow tenant.
Is this statement true about the purpose of a tenant?
Solution: Live access reviews should be performed in a production environment.
Is the following description of an access profile correct?
Solution: it can be acknowledged during certifications.
Is this statement true?
Solution: IdentifyNow allow HTML editing of an email template.
Is this statement true about deploying and configuring IdentityNow's virtual appliance (VA)?
Solution: When deploying the VA in Azure, the identityNow engineer will need to utilize the Azure command –line interface(CLI) to deploy the VA image.
Is this statement accurate regarding SailPoint's multi-tenant processing environment?
Solution: A proprietary fairness algorithm is used to manage and distribute the workload.
An IdentityNow engineer has the following problem:
IdentityNow shows status failed on a virtual appliance (VA).
Is this one of the steps that should be taken troubleshoot the issue?
Solution: Log in to the console of the VA and verify that the VA has connectivity to the internet.