0% found this document useful (0 votes)
291 views3 pages

Saviynt IGA MCQ

Uploaded by

minisin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
291 views3 pages

Saviynt IGA MCQ

Uploaded by

minisin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 3

Here are multiple-choice questions (MCQs) with answers based on the provided

topics:

Section 1: Building Identity Warehouse

Objective 1:1 – Introduction to Saviynt

1. What is the primary purpose of Saviynt’s user interface?


a) To import data from external systems
b) To navigate and manage identity governance activities
c) To host application-specific data
d) To manage cloud services directly

Answer: b) To navigate and manage identity governance activities

Objective 1:2 – Different ways to Import Users from HR Platform into Saviynt

2. Which method is used to import users into Saviynt using an HR system’s APIs?
a) Batch Process
b) Manual Import via CSV
c) Connected System
d) User Import via APIs

Answer: d) User Import via APIs

3. What is the key feature of the batch process for importing users into Saviynt?
a) Real-time data synchronization
b) Manual intervention
c) Scheduled, bulk data imports
d) Direct API integration

Answer: c) Scheduled, bulk data imports

Objective 1:3 – Application Onboarding in Saviynt

4. In Saviynt, what is the relationship between the security system, endpoint, and
connection?
a) Endpoint defines the connection type for a security system
b) Security system connects endpoints to external users
c) Connection links the security system to endpoints for data flow
d) All are independent and unrelated

Answer: c) Connection links the security system to endpoints for data flow

Section 2: Access Request System

Objective 2:1 – Access Request System in Saviynt

5. What type of access request can be submitted via the ARS module?
a) Requests for application data import
b) Requests for new accounts or access for applications
c) Requests for workflow configurations
d) Requests for CSV-based user imports

Answer: b) Requests for new accounts or access for applications

Objective 2:4 – Access Provisioning

6. What is required to enable provisioning for disconnected applications?


a) An endpoint connection
b) Manual intervention
c) API-based integration
d) Scheduling provisioning jobs

Answer: d) Scheduling provisioning jobs

Section 3: Rules Engineering

Objective 3:1 – Access Policies in Saviynt

7. Which policy is used for automating access assignments during a new hire
process?
a) Event-based Policies
b) Access Request-based Policies
c) Joiner Access Policies
d) Data Access Governance Policies

Answer: c) Joiner Access Policies

Objective 3:2 – Technical Rules

8. What feature ensures technical rules are applied during user import?
a) Scheduled Jobs
b) Real-time Data Flow
c) Auto-trigger Rules
d) Manual Configuration

Answer: c) Auto-trigger Rules

Section 4: Segregation of Duties (SOD)

Objective 4:3 – Preventative SOD Analysis

9. What is the purpose of enabling SOD analysis at the access request level?
a) To track SOD violations after provisioning
b) To prevent SOD violations during the approval process
c) To remediate existing violations
d) To perform detective SOD analysis

Answer: b) To prevent SOD violations during the approval process

Objective 4:6 – SOD Reporting

10. Where can custom SOD reports be configured?


a) Access Request Module
b) Analytics Module
c) Workflows Section
d) Certification Module

Answer: b) Analytics Module

Section 5: Access Reviews

Objective 5:1 – Overview of Access Reviews in Saviynt

11. What is the primary goal of an access review campaign?


a) To monitor application logs
b) To validate user access and entitlements
c) To onboard new applications
d) To create analytic reports

Answer: b) To validate user access and entitlements

Objective 5:5 – Miscellaneous Campaign Features

12. What is the purpose of risk-based micro-certifications in Saviynt?


a) To automate all access reviews
b) To focus on high-risk user certifications
c) To create dashboards for campaigns
d) To manage connected applications

Answer: b) To focus on high-risk user certifications

Section 6: Analytics

Objective 6:3 – Different methods to create Reports

13. Which method is used for creating runtime analytic controls in Saviynt?
a) Elasticsearch Queries
b) SQL Queries
c) Predefined Dashboards
d) Custom Analytics

Answer: a) Elasticsearch Queries

Objective 6:4 – Dashboards

14. What is a key feature of Saviynt dashboards?


a) User import automation
b) Real-time data visualization for various modules
c) Campaign certification
d) SOD violation detection

Answer: b) Real-time data visualization for various modules

Would you like additional MCQs or explanations for any topic?

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy