Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following application statuses will remove the application from view for all end users?

A.

Offline

B.

Retired

C.

Development

D.

Archived

On which page can an administrator enable an option that will allow end users to make their own personal dashboards?

A.

Manage iViews

B.

Manage Dashboards

C.

Manage Workspaces

D.

Manage Security Parameters

What is the overarching goal of IT Security Risk Management?

A.

To catalog IT risks

B.

To reduce the risk of today’s security threats, poor security practices, and operational security compliance failures

C.

To give the SCA confidence in the organization's breach response procedures

D.

To reduce bottlenecks in threat analysis

Which is true about Advanced Workflow?

A.

It completely eliminates the need for data-driven events

B.

It should only be used for self-assessments

C.

It limits the capabilities of calculated fields

D.

It leverages data-driven events, calculations, and email notifications

On the Manage Workspaces page, what does selecting the "Configure Display Order" link allow an administrator to do?

A.

Alter the layout of iViews as they appear on a dashboard.

B.

Alter the layout of iViews as they appear on a workspace.

C.

Alter the left to right order of dashboards underneath a specific workspace.

D.

Alter the left to right order of workspaces as they appear across the top of the system.

If an Archer user needs to send the content of an Archer record to a person who does not have an Archer user account, which of the following options is their best course of action?

A.

Share the Archer user's login information with the non-Archer user through encrypted Email.

B.

Use the Email icon to send the non-Archer user an email that contains the content of the record.

C.

Send the non-Archer user the URL shown in the browser address bar when the Archer user has the report open.

D.

Export the record to an output file (such as .rtf) and then attach that file to an email to send to the non-Archer user.

If an application has 10 fields, and a data import file contains values for 12 fields, what will happen with the remaining 2 columns of data when a Data Import is performed?

A.

New fields will automatically be created to accommodate the two remaining columns of data

B.

The extra data will be imported into a text file that can later be attached to records in Archer

C.

The remaining two columns of data are ignored and not imported into Archer

D.

The data in the two extra fields are merged into a single field in Archer

Which of the following is true about Application Owners?

A.

They can delete a Solution.

B.

They can add new user accounts to the platform.

C.

They can see all records within their assigned applications.

D.

They can see all records in all applications across the system.

Events can be used to trigger a number of different layout effects, based on a user’s interaction with other fields in the application. Which of the following actions CANNOT be triggered by an Event?

A.

Delete a record

B.

Generate an email notification

C.

Make a field conditionally required

D.

Populate a values list with a selected value

Which Data-Driven Event could be used to conditionally require a field?

A.

Apply conditional layout

B.

Filter values list

C.

Set values list

D.

Set conditional requirement