What is the minimum RAM system requirement for Designer?
A. 128 MB
B. 256 MB
C. 512 MB
D. 1024 MB
E. 2048 MB
To which can you add Named Passwords? (Choose 2.)
A. Server
B. Drivers
C. Driver Sets
D. Applications
E. Identity Vaults
Which pre-defined jobs operate at the driver set level? (Choose 2.)
A. Driver Health
B. Schedule Driver
C. Subscriber Channel Trigger
D. Random Password Generator
E. Password Expiration Notification
Which Identity Manager reporting component retrieves the data needed for report generation from the Identity Information Warehouse?
A. Reporting Service
B. Report Packaging Tool
C. Data Collection Service
D. Identity Vault Data Sources
E. Data Collection Service Driver
Which Identity Manager component allows your organization to assure that user access to resources does not break any corporate or government regulations?
A. Workflow
B. Attestation
C. Self Service
D. Data Synchronizing
E. Auditing and Reporting
When using Designer, what option allows you to manage and view the file resources that are in your workspace?
A. Outline View
B. Project View
C. Dataflow View
D. Properties View
E. Navigation View
Which defines the Provisioning request categories the user application can display?
A. Driver Filter
B. Role Catalog
C. Package Catalog
D. Global Configuration Values
E. The Directory Abstraction Layer
Which are directory objects that encapsulate the business rules for granting or revoking a corporate resource or role, and binding the corporate resource or role to a workflow?
A. Role Mapping Definitions
B. Provisioning Request Definitions
C. Data Abstraction Layer Definitions
D. Global Configuration Values Definitions
In the Standard SoD Constraint Exception Approval Workflow Activity, which Activity Name determines whether the approval is a quorum condition?
A. Localize SoD Name
B. Approve SoD Conflict
C. Check for Processing Type
D. Approve SoD Conflict (Serial)
E. Approve SoD Conflict (Quorum)
Within the Role Mapping Administrator, which displays the roles that you are authorized to manage?
A. Systems list
B. Mappings list
C. Authorization list
D. Identity Vault Roles list