Try 12 Okta Certified Administrator sample questions and practice-test preview prompts on user lifecycle, app assignments, policies, provisioning, delegated administration, system logs, and access troubleshooting.
Okta Certified Administrator is an administration route for candidates who manage users, groups, applications, policies, provisioning, delegated roles, lifecycle tasks, and troubleshooting in an Okta environment.
Use this page to preview the kind of admin decisions an Okta Administrator practice route should test. The questions below are original IT Mastery sample questions, not official Okta exam questions.
Practice option: Sample preview available
Start with the 12 sample questions on this page. Dedicated practice for Okta Certified Administrator is not live in the web app yet; enter your email if this route should be prioritized.
Need a supported route now? See currently available IT Mastery exam pages.
Topic: lifecycle automation
A new employee should receive application access based on department and location. Which approach is most maintainable?
Best answer: C
Explanation: Attribute-driven group membership can automate consistent access when profile data is reliable. It is more maintainable than manual assignments.
Topic: delegated administration
A helpdesk team should reset passwords but not change application policy. What should the Okta admin configure?
Best answer: A
Explanation: Delegated administration should follow least privilege. The team should receive only the rights needed to perform approved support tasks.
Topic: sign-on policy
A policy rule applies to executives but not to contractors. What should an administrator check first?
Best answer: C
Explanation: Policy behavior depends on conditions, group targeting, rule order, and context. Those should be checked before changing broad security settings.
Topic: provisioning
A user is deactivated in Okta but still appears active in a downstream application. What should be investigated?
Best answer: B
Explanation: Deactivation does not always mean downstream removal unless lifecycle provisioning is configured and functioning. Logs and integration settings should be reviewed.
Topic: group conflicts
A user belongs to two groups that assign different app settings. What should the admin review?
Best answer: A
Explanation: Effective settings can be influenced by group priority, assignment order, mappings, and user-level overrides. The administrator should inspect those relationships.
Topic: System Log
Several users report MFA prompts after a policy change. What evidence should be reviewed?
Best answer: C
Explanation: System Log events can show which rules were evaluated and whether an admin change caused the new behavior.
Topic: app ownership
An application owner wants to manage access review without receiving broad tenant rights. What is the better pattern?
Best answer: D
Explanation: Application owners often need review participation, not tenant-wide control. Scoping keeps governance practical and safer.
Topic: directory integration
After a directory integration change, some group memberships no longer update. What should be checked?
Best answer: A
Explanation: Directory-driven group behavior depends on sync, source rules, mappings, and import settings. Recent events show whether updates are flowing.
Topic: factor policy
A security team wants phishing-resistant authentication for high-risk users. Which admin action best fits?
Best answer: C
Explanation: Admins can target stronger authentication requirements by group, context, or application. The control should be scoped and enforceable.
Topic: application integration
An app integration works in test but fails after production cutover. What should be reviewed first?
Best answer: D
Explanation: Production cutover issues often involve endpoint URLs, certificates, metadata, assignment, and policy differences between test and production.
Topic: governance
Why should administrators avoid permanent one-off user assignments when group-based access is available?
Best answer: B
Explanation: Group-based access supports review and lifecycle control. One-off access can become hidden exception risk if not governed.
Topic: troubleshooting scope
Only users from one network zone are blocked from an application. What should the admin check?
Best answer: B
Explanation: Network-based behavior points to policy conditions and context. The admin should confirm rule matching and event evidence before broad changes.
| Area | What to check |
|---|---|
| Lifecycle | Can you connect profile source, group rules, app assignments, and provisioning? |
| Policy | Can you reason through group targeting, rule order, and context conditions? |
| Evidence | Can you use System Log and integration events instead of guessing? |
| Governance | Can you keep admin privileges and exceptions scoped, reviewable, and auditable? |