1.
IST is tool for
Correct Answer
D. All of the Above
Explanation
IST (Information Systems Technology) is a tool that can be used for various purposes including certification, termination, and transfer. It is a versatile tool that can assist in managing and tracking these processes efficiently. By using IST, organizations can streamline their certification procedures, manage employee terminations effectively, and facilitate smooth transfers within the company. Therefore, the correct answer is "All of the Above" as IST can be utilized for all the mentioned purposes.
2.
IST External is tool for
Correct Answer
D. All of the Above
Explanation
The correct answer is "All of the Above" because IST External is a tool that can be used for certification, simulation, and access reconciliation. It is a versatile tool that can perform multiple functions, making it a comprehensive solution for various tasks.
3.
MIT is tool for
Correct Answer
B. Inventory
Explanation
MIT is a tool that is used for managing inventory. It helps in keeping track of the stock levels, monitoring the movement of goods, and ensuring that the inventory is properly managed and organized. With MIT, businesses can easily track their inventory, make informed decisions about restocking, and optimize their supply chain processes. Therefore, the correct answer is "Inventory" as MIT is primarily used for inventory management.
4.
MXT is tool for
Correct Answer
B. EURC Feed
5.
Delegation functionality Exists in
Correct Answer
A. IST
Explanation
The correct answer is IST because delegation functionality exists in this system. It is not specified whether delegation functionality exists in the other systems (ISTX and MXT), so we cannot assume that it is available in those systems. Therefore, the correct answer is IST.
6.
IBus is
Correct Answer
C. GTI tool
Explanation
The correct answer is GTI tool. This suggests that iBus is a tool called GTI.
7.
Access Provisioning means
Correct Answer
D. None of the Above
Explanation
Access Provisioning refers to the process of granting or revoking user access rights to various systems, applications, or resources within an organization. It involves tasks such as creating user accounts, assigning appropriate roles and permissions, and managing access requests. Role Profiling, Bringing User Access information in IST, and Certifying User are not accurate definitions of Access Provisioning.
8.
IST Integration Team requests User Access file for
Correct Answer
A. Active Users
Explanation
The correct answer is "Active Users" because the IST Integration Team is specifically requesting the User Access file for active users only. This implies that they are not interested in the access details of inactive users or external users. Therefore, the correct response is to provide the User Access file for active users.
9.
IST Can display entitlement Hierarchy up to
Correct Answer
C. 10 Level
Explanation
The IST (Information System Technology) can display the entitlement hierarchy up to 10 levels. This means that the system is capable of organizing and displaying the hierarchical structure of entitlements, permissions, or access levels within an organization or system, with up to 10 levels of depth. This allows for a detailed and comprehensive representation of the hierarchy, enabling effective management and control of access and permissions within the system.
10.
IST External Can display entitlement Hierarchy up to
Correct Answer
B. Any level after Custom Coding
Explanation
The correct answer is "Any level after Custom Coding." This means that the IST External can display the entitlement hierarchy up to any level beyond the level achieved through custom coding. In other words, the IST External has the capability to show the hierarchy structure beyond what can be achieved through custom coding.
11.
MXT can be easily enhanced to use for
Correct Answer
A. Capacity Metrics Analysis
Explanation
MXT can be easily enhanced to use for Capacity Metrics Analysis. This means that MXT, which is likely a software or tool, can be improved or modified to analyze capacity metrics. This could involve measuring and evaluating various factors such as storage capacity, network bandwidth, or system performance to ensure optimal resource allocation and utilization. By enhancing MXT for capacity metrics analysis, users can gain valuable insights into their system's capacity and make informed decisions to improve efficiency and scalability.
12.
EURC & IST Integration will result
Correct Answer
D. All of the Above
Explanation
The correct answer is "All of the Above" because the integration of EURC & IST will result in several benefits. It will assist in accurate certification, meaning that the process of certifying certain standards or requirements will be made easier and more precise. Additionally, an exception report for access request processing will be generated, which will help identify any deviations or issues in the processing of access requests. Lastly, profiling validation will be carried out, ensuring that the profiles of individuals or entities are verified and validated. Therefore, all of these benefits will be achieved through the integration of EURC & IST.
13.
IST External Integration Team requests User Access file for
Correct Answer
D. All of the Above
Explanation
The IST External Integration Team is requesting the User Access file for Active Users, Inactive Users, and External Users. This means that they need access to the user data for all three categories mentioned. Therefore, the correct answer is "All of the Above."
14.
IST is capable of
Correct Answer
D. All of the Above
Explanation
IST (Identity and Access Management System) is capable of providing various functionalities including access reconciliation, automated access de-provisioning, and access inventory. Access reconciliation involves comparing the access rights of users with the defined access policies to identify any discrepancies or unauthorized access. Automated access de-provisioning refers to the process of automatically revoking access rights of users when they no longer require them, ensuring security and compliance. Access inventory allows organizations to keep track of all the access rights granted to users, enabling better visibility and control over user access. Therefore, the correct answer is "All of the Above".
15.
IST External is capable of
Correct Answer
D. All of the Above
Explanation
The correct answer is "All of the Above" because IST External is capable of Access Management, which involves controlling and granting access to resources based on user roles and permissions. It is also capable of Automated Access de-provisioning, which means removing access privileges when they are no longer needed or when an employee leaves the organization. Additionally, IST External is capable of Access Inventory, which involves keeping track of all the access rights and permissions granted to users. Therefore, all the mentioned options are correct.
16.
IST External & IST - Common Feature
Correct Answer
C. All internal employee Information
Explanation
The correct answer is "All of the Above". This means that the Line Manager Simulation includes all of the mentioned features, which are SSO based and contain all internal employee information.
17.
Production Support Job Function
Correct Answer
D. All of the Above
Explanation
The correct answer is "All of the Above" because the job function of production support involves various tasks such as SLA tracking, daily monitoring, and resolving business queries. SLA tracking ensures that the team meets the agreed-upon service level agreements, while daily monitoring involves monitoring the production environment for any issues or anomalies. Additionally, production support teams are responsible for resolving business queries and providing support to ensure smooth operations. Therefore, all the mentioned options are part of the production support job function.
18.
Myid is
Correct Answer
B. Access provisioning tool
Explanation
The correct answer is "Access provisioning tool" because the given statement mentions that "Myid is" and then lists different tools such as "Certification tool" and "Access provisioning tool". Since the question asks for the correct answer, it can be inferred that "Access provisioning tool" is the correct option among the given choices.
19.
IST Auto File Converter helps to
Correct Answer
D. None of them
20.
GE user access data was loaded/referred in
Correct Answer
C. Both
Explanation
The correct answer is "Both" because the statement indicates that GE user access data was both loaded and referred in IST and ISTX.
21.
IST Integration file layout Mandatorily asks for
Correct Answer
A. User Login ID
Explanation
The IST Integration file layout mandatorily asks for the User Login ID. This means that when integrating systems, the file layout requires the inclusion of the user's login ID. This information is necessary for proper user identification and authentication within the integrated systems.
22.
IST Delta Integration File
Correct Answer
A. Handles Header Record with A, M & D Status
Explanation
This answer suggests that the IST Delta Integration File is capable of handling both the Header Records with A, M, and D statuses, as well as the Detail Records with A, M, and D statuses. This means that the file can process and manage different types of records, allowing for efficient data integration and management.
23.
IST External Delta Integration File
Correct Answer
A. Handles Header Record with A, M & D Status
Explanation
The correct answer is "Handles Header Record with A, M & D Status". This means that the IST External Delta Integration File is capable of handling header records with A (Add), M (Modify), and D (Delete) status. It suggests that the file has the ability to process and manage different types of header records based on their status, allowing for effective integration and management of data.
24.
In IST, one user can have
Correct Answer
A. Same Access Entitlement ID in different level
Explanation
In IST (Identity and Access Management System), it is possible for a user to have the same Access Entitlement ID in different levels. This means that a user can be granted the same access rights or permissions across different levels or hierarchies within the system. This allows for more flexibility in managing user access and ensures that users have consistent access to the same resources across different levels or departments.