mediummultiple choiceObjective-mapped

Exhibit

Exhibit:
- SaaS A uses local user accounts
- SaaS B uses local user accounts
- SaaS C supports SAML and automated provisioning
- Help desk reports 120 password reset tickets per month
- Former employees can remain active in two apps for up to 24 hours after termination

Management wants one sign-in and faster deprovisioning.

Based on the exhibit, which identity architecture change best addresses the repeated password resets and delayed offboarding across the company's SaaS applications?

Exhibit: - SaaS A uses local user accounts - SaaS B uses local user accounts - SaaS C supports SAML and automated provisioning - Help desk reports 120 password reset tickets per month - Former employees can remain active in two apps for up to 24 hours after termination

Management wants one sign-in and faster deprovisioning.

Question 1mediummultiple choice
Full question →

Based on the exhibit, which identity architecture change best addresses the repeated password resets and delayed offboarding across the company's SaaS applications?

Exhibit: - SaaS A uses local user accounts - SaaS B uses local user accounts - SaaS C supports SAML and automated provisioning - Help desk reports 120 password reset tickets per month - Former employees can remain active in two apps for up to 24 hours after termination

Management wants one sign-in and faster deprovisioning.

Answer choices

Why each option matters

Good practice is not just finding the correct option. The wrong answers often show the exact trap the exam wants you to fall into.

A

Best answer

Implement federated SSO with the enterprise identity provider and automated provisioning for SaaS users.

This is the best answer because federation centralizes authentication, and automated provisioning improves lifecycle management. Users sign in once through the identity provider, reducing password fatigue and help desk resets. When accounts are created, modified, or removed centrally, access changes can reach supported applications much faster, which helps with offboarding and reduces orphaned access.

B

Distractor review

Create one shared account for each application and store the passwords in a vault.

Shared accounts make accountability worse and create a larger blast radius if credentials are exposed. A vault is useful for secrets management, but it does not solve individual identity, least privilege, or timely offboarding concerns.

C

Distractor review

Keep local accounts in every SaaS app and reset passwords whenever staff change roles.

This preserves the exact problem shown in the exhibit: scattered accounts and manual maintenance. It increases administrative burden and makes consistent offboarding harder, especially as the number of applications grows.

D

Distractor review

Put the SaaS apps behind a network firewall and use source IP filtering instead of identity.

IP filtering does not replace identity-based access control and does not solve password resets or account lifecycle issues. Remote users, changing networks, and mobile access make IP-based controls too brittle for this requirement.

Common exam trap

Common exam trap: NAT rules depend on direction and matching traffic

NAT is not only about the public address. The inside/outside interface roles and the ACL or rule that matches traffic are just as important.

Technical deep dive

How to think about this question

NAT questions usually test address translation, overload/PAT behaviour, static mappings and whether the right traffic is being translated. Read the interface direction and address terms carefully.

KKey Concepts to Remember

  • Static NAT maps one inside address to one outside address.
  • PAT allows many inside hosts to share one public address using ports.
  • Inside local and inside global describe the private and translated addresses.
  • NAT ACLs identify traffic for translation, not always security filtering.

TExam Day Tips

  • Identify inside and outside interfaces first.
  • Check whether the scenario needs static NAT, dynamic NAT or PAT.
  • Do not confuse NAT matching ACLs with normal packet-filtering intent.

Related practice questions

Related SY0-701 practice-question pages

Use these pages to review the topic behind this question. This is how one missed question becomes focused revision.

More questions from this exam

Keep practising from the same exam bank, or move into a focused topic page if this question exposed a weak area.

FAQ

Questions learners often ask

What does this SY0-701 question test?

Static NAT maps one inside address to one outside address.

What is the correct answer to this question?

The correct answer is: Implement federated SSO with the enterprise identity provider and automated provisioning for SaaS users. — Federated SSO with centralized provisioning is the most effective design for the problems shown in the exhibit. It reduces the number of passwords users must manage, which lowers support tickets and improves usability. It also gives the organization a single place to disable or modify access, so employee departures and role changes can be reflected much faster across SaaS services that support federation and lifecycle automation. Why others are wrong: Option B increases credential sprawl and weakens accountability. Option C leaves identity scattered across applications, so the organization still has to manage each account separately. Option D controls network location rather than user identity, so it cannot provide the required access lifecycle management.

What should I do if I get this SY0-701 question wrong?

Then try more questions from the same exam bank and focus on understanding why the wrong options are tempting.

Discussion

Loading comments…

Sign in to join the discussion.