Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Saviynt SCAIP - Saviynt Certified Advanced IGA Professional (Level 200)

Page: 2 / 2
Total 60 questions

In which system does the request fulfillment happen while integrating ServiceNow using Saviynt App for ServiceNow?

A.

Saviynt

B.

ServiceNow

C.

Saviynt or ServiceNow, based on the configuration

D.

None of the above

What mandatory connection parameters should be configured in order to reconcile accounts using REST Connector? (Multi-Select)

A.

ConnectionJSON

B.

ImportAccountEntJSON

C.

ImportUserJSON

D.

CreateAccountJSON

Schema based account import job failed with Schema definition file not found and No SAV file found. Which of the following could be the possible reasons for the same? (Multi-Select)

A.

SAV file with .sav extension is missing in the File Directory - > SAV files location

B.

SAV file with .sav extension is missing in the File Directory - > Data files location

C.

datafile (.csv extension) is not present in File Directory - > Data files location

D.

SAV file format is incorrect

An EIC Administration has a requirement to configure a separate password policy for service accounts along with the password policy for regular accounts. How can this be achieved in EIC?

A.

Define a separate Password Policy for Service Account and select it in Policy Rule Service Account field under Security System

B.

Only one Password Policy can be defined in the Security System which applies to both regular and service accounts

C.

Define a separate Password Policy for Service Account and select the checkbox Password Policy Service Account field under Password Policy configurations

D.

Define a separate Password Policy for Service Account and select it in Policy Rule Service Account field under Global Configurations

Scenario:

John, an EIC System Administrator, encounters a situation where a user account has been compromised, and he needs to take immediate action to prevent further unauthorized access.

Question:

Given the scenario, which action should John take on EIC to prevent compromised user account access on the impacted application?

A.

Lock

B.

Suspend

C.

Expire

D.

Delete

What are the different authentication modes supported for SMTP configurations? (Multi Select)

A.

NTLM

B.

OAuth

C.

None of the above

D.

Basic

Which campaign type should be used when managers must review and certify access for their direct reportees?

A.

User Manager Campaign

B.

Entitlement Owner Campaign

C.

Role Owner Campaign

D.

Service Account Campaign

In the Saviynt App for ServiceNow, what options are available to refresh the RITM status in the ServiceNow app based on the respective Saviynt’s status? (Multi-Select)

A.

Make a Postman API call

B.

Click Refresh button on the RITM page in ServiceNow

C.

It will be automatically updated in 1 minute via Request item history job in ServiceNow

D.

Regenerate application catalog item