Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

SCAIP Questions and Answers

Question # 6

EIC is configured to create tickets in ServiceNow for requests for disconnected applications. The end user selects 3 different entitlements for a disconnected application and submits the request. How will EIC process this request?

A.

If the "Enable Multi Entitlement Request" option is selected, then three tickets will be created in ServiceNow; otherwise, only one ticket will be created

B.

Not a valid scenario because EIC does not support multiple entitlement requests when ServiceNow is integrated as the ticketing system

C.

EIC will create three separate tickets in ServiceNow, one for each of the three entitlements

D.

EIC will combine all three entitlements and create one ticket in ServiceNow

Full Access
Question # 7

Scenario:

John, an EIC System Administrator, encounters a situation where a user account has been compromised, and he needs to take immediate action to prevent further unauthorized access.

Question:

Given the scenario, which action should John take on EIC to prevent compromised user account access on the impacted application?

A.

Lock

B.

Suspend

C.

Expire

D.

Delete

Full Access
Question # 8

The EIC administrator must address the email generation issues caused by accent characters in some users' names. What are the potential options to resolve this issue?

A.

API

B.

Datasets

C.

Roles

D.

Rules

Full Access
Question # 9

What are the different features available under Role Intelligence? (Multi-Select)

A.

Role Governance

B.

Entitlement Discovery

C.

Role Mining

D.

Role-Access Mismatches

Full Access
Question # 10

Which campaign type should be used when managers must review and certify access for their direct reportees?

A.

User Manager Campaign

B.

Entitlement Owner Campaign

C.

Role Owner Campaign

D.

Service Account Campaign

Full Access
Question # 11

An EIC Administrator has a requirement to execute User Import at 9 AM everyday. What are the different options available in EIC to schedule this job?

A.

CRON expression in Job trigger

B.

Schedule option (Hourly, Weekly, Daily, Minutes) in Job trigger

C.

Global configuration

D.

Externalconfig.properties file

Full Access
Question # 12

What methods are available for integrating applications with Saviynt Enterprise Identity Cloud (EIC)? (Multi-Select)

A.

Classic integration using connectors

B.

Application Onboarding using Design module

C.

Using Connector framework

D.

Upload Connection file

Full Access
Question # 13

To authenticate Saviynt REST API calls, what must be generated before invoking protected APIs?

A.

SMTP token

B.

OAuth access token

C.

Transport package

D.

Dataset key

Full Access
Question # 14

An EIC Administrator wants to retrieve a report of users and their assigned SAV Roles. What are the ways in which it can be achieved? (Multi-Select)

A.

Create analytics with the SQL Query to get the data and select the checkbox "Send Email As Attachment" in analytics configuration

B.

Create an analytics with the SQL Query to get the data and export as CSV/Excel

C.

Run a SQL Query to retrieve the data in Data Analyzer

D.

Using enhanced query

Full Access
Question # 15

Which statement correctly describes the two major ServiceNow integration modes supported by Saviynt?

A.

ServiceNow as a Managed Application supports import, provisioning, and deprovisioning; ServiceNow as a Ticketing System supports ticket-based ITSM integration.

B.

ServiceNow as a Managed Application is only for branding and labels; ServiceNow as a Ticketing System is only for analytics.

C.

ServiceNow as a Managed Application is used only for SAV roles; ServiceNow as a Ticketing System is used only for password sync.

D.

Both modes are the same and serve identical purposes.

Full Access
Question # 16

Which of the following statements are correct?

A.

The role mining process discovers relationships between users based on similar access permissions that can logically be grouped to form a role

B.

In the Role mining, if the percentage cut-off = 60%, it would perform mining on only the access which is associated with 100% users

C.

Duplicate Identity Management feature access need to be added to the SAV Role to view the duplicate identity management

D.

Duplicate Identity Management can only merge user attributes but not user access

Full Access
Question # 17

Which HTTP method or methods is used to generate an Authorization Token for Saviynt EIC API?

A.

PUT

B.

GET

C.

POST

D.

GIVE

Full Access
Question # 18

Choose the correct SQL query from the below options to populate an attribute with the logged-in user’s Display Name

A.

select DISPLAYNAME as ID from Users u where u.userkey=${loggedInUser}

B.

select DISPLAYNAME as ID from Users u where u.userkey=${user.id}

C.

select DISPLAYNAME as ID from Users u where u.userkey=${requestor}

D.

All the above

Full Access