IGA
IAM
SailPoint
General Knowledge
Multiple Choice
100

This process verifies that users are who they claim to be.

What is Authentication?

100

IGA stands for Identity ___ and Administration.

What is Governance?

100

The name of SailPoint’s cloud-native identity governance and access management platform.

What is Identity Security Cloud?

100

The “Harry Potter” series was written by this author.

Who is J.K. Rowling?

100

Who wrote the play Romeo and Juliet?
A) Christopher Marlowe
B) William Shakespeare
C) Ben Jonson
D) John Donne

B) William Shakespeare

200

Policies to prevent/identify risky access combinations.

What is SoD or Separation of Duties?

200

The routine review process that certifies whether each user’s access rights remain appropriate and compliant.

What is access certification?

200

In ISC, this portal module lets end users browse and request application access for themselves or others.

What is the Request Center portal?

200

In physics, this is the term for the amount of matter in an object.

What is mass?

200

In what year did the Titanic sink?
A) 1905
B) 1912
C) 1918
D) 1923

B) 1912

300

The security principle that limits users’ application privileges to only those needed to perform their jobs and nothing more.

What is the principle of least privilege?

300

This term involving the set of actions—such as adding, modifying, and removing user accounts—performed on target systems, whether connected or isolated.

What is Provisioning?

300

The Java-like scripting language used in IdentityNow for writing custom rule logic and transformations.


What is BeanShell?

300

Canberra is the capital city of this country.

What is Australia?

300

Which country hosted the 2016 Summer Olympics?
A) China
B) Brazil
C) United Kingdom
D) Russia

B) Brazil

400

This protocol uses XML-based assertions (often via Identity Provider and Service Provider) to enable cross-domain single sign-on.

What is SAML (Security Assertion Markup Language)?

400

These types of logs are essential for tracking who accessed what system and when.

What are audit logs?

400

The aggregation process that collects account, and entitlement data for an identity from all sources.

What is identity aggregation?

400

This revolutionary product, released in 2007, reshaped mobile communications and technology.

What is the iPhone?

400

What is the hardest naturally occurring mineral?
A) Diamond
B) Quartz
C) Topaz
D) Corundum

A) Diamond

500

What is the process of automatically adding and removing user accounts and access rights based on lifecycle events, such as an employee's hire or job transfer or termination?

What is Automated Provisioning/Deprovisioning?

500

Authentication method that allows users to access multiple applications and websites using a single set of login credentials. Typically involving an identity provider (IdP) that authenticates users and then allows them to access other applications or websites that trust the IdP.

What is Single Sign-On (SSO) ?

500

The feature that uses algorithms to automatically discover and suggest roles based on existing entitlements and attributes.

What is role mining?

500

The science of determining a tree’s age by looking at its growth rings.

What is dendrochronology?

500

Which author created the detective Sherlock Holmes?
A) Agatha Christie
B) Arthur Conan Doyle
C) Edgar Allan Poe
D) Dashiell Hammett

B) Arthur Conan Doyle

M
e
n
u