Free SailPoint IdentityIQ-Engineer Exam Actual Questions

The questions for IdentityIQ-Engineer were last updated On Dec 16, 2024

Question No. 1

An engineer is assigned to configure an account attribute. The requirements are:

Purpose: Flag privileged accounts

Read from: Financial application, privileged attribute

Calculate from: Keystore application, responsibility-code attribute

Usage 1: Display as option in Advanced Analytics

Usage 2: Use when writing rules

Usage 3: Include in policies

Does the engineer need to set this configuration option on the account attribute to meet the requirements?

Solution: Source Mappings: Application Rule

Show Answer Hide Answer
Correct Answer: A

Yes, setting the 'Source Mappings: Application Rule' configuration on the account attribute is necessary to meet the requirements described. The use case involves flagging privileged accounts based on attributes read from different applications and using these flags in various IdentityIQ features like Advanced Analytics, rule writing, and policy enforcement. By configuring the attribute with a source mapping that uses an Application Rule, you can implement complex logic to derive the attribute's value from multiple sources, such as a financial application and a keystore application, according to the specific requirements.

Therefore, the correct answer is A. Yes.

Reference: This answer is based on the SailPoint IdentityIQ Implementation Guide, which discusses the use of source mappings and application rules for complex attribute calculations and configurations. The guide explains how to set up attributes that pull data from multiple sources and use this data across various IdentityIQ features.


Question No. 2

Is the following statement about workflows and sub-workflows (subprocesses) true?

Solution: Sub-workflows can be nested up to 3 levels only.

Show Answer Hide Answer
Correct Answer: B

The statement is false. In SailPoint IdentityIQ, there is no strict limitation on nesting sub-workflows (subprocesses) up to 3 levels. You can nest sub-workflows as deeply as required by your business logic and system design. However, it is advisable to manage the complexity of nested workflows to ensure maintainability and performance, but there is no enforced limit of 3 levels for nesting.


SailPoint IdentityIQ Workflow Guide

SailPoint IdentityIQ Administration Guide (Sections on Workflow Design Best Practices)

Question No. 3

Can a Workgroup be used for the following scenario?

Solution: Providing a group of users with specific capabilities.

Show Answer Hide Answer
Correct Answer: A

In SailPoint IdentityIQ, a Workgroup can indeed be used to provide a group of users with specific capabilities. Workgroups are collections of users that can be assigned roles, tasks, and permissions. By associating capabilities with a Workgroup, all members of that Workgroup will inherit the capabilities defined.

This feature is commonly used to manage teams or departments that need to share specific privileges, such as the ability to approve access requests or manage certifications. Configuring capabilities for a Workgroup is a standard practice within IdentityIQ to simplify permission management and ensure consistent access control across the group.

Therefore, the correct answer is A. Yes.

Reference: This conclusion is drawn from the SailPoint IdentityIQ Administration Guide, which details how Workgroups function and how they can be used to assign capabilities and manage access control within the platform.


Question No. 4

A client wants users who belong to an IdentitylQ workgroup named Management to be able to request entitlements and roles, but only for other users whose location attribute is the same as theirs.

Is this a population that will achieve the goal?

Solution: Create a quicklink population, set the membership match list to the IdentitylQ workgroup "Management," and set "Who can members request for?" as report to the requester.

Show Answer Hide Answer
Correct Answer: B

The provided solution does not fulfill the client's requirement. Setting 'Who can members request for?' to 'report to the requester' only limits the request scope to users who directly report to the requester, which does not account for the location attribute. The goal is to restrict requests based on the location attribute, and this specific configuration does not consider that attribute. To achieve the desired behavior, the configuration should include logic that filters users based on the same location as the requester.


SailPoint IdentityIQ Quicklink Population Configuration Guide

SailPoint IdentityIQ Advanced Population Management Guide

Question No. 5

Is this statement correct about writing and executing source mapping rules to populate identity attributes?

Solution: The Identity object is passed to the rule.

Show Answer Hide Answer
Correct Answer: A

The statement 'The Identity object is passed to the rule' is correct. When writing source mapping rules to populate identity attributes, the Identity object is indeed passed to the rule. This allows the rule to access and modify attributes on the Identity object based on the logic defined within the rule.

Therefore, the correct answer is A. Yes.