Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

The Operations Console allows administrators to modify attributes defined in RADIUS dictionary files.

A.

True

B.

False

What are two elements are involved in Risk-Based Authentication? (Choose two)

A.

a user’s device profile

B.

a user’s Security Level

C.

the length of a user’s PIN

D.

the behavior pattern of a user

E.

the strength of a user’s Passcode

If a Super Admin administrator can view a certain set of user records in the Authentication Manager database but a Help Desk administrator can NOT view the same records,

A.

the Help Desk administrator should be assigned a Super Admin role.

B.

the Help Desk administrator may not have the scope to view these users.

C.

the user accounts have been marked as “hidden” for Help Desk level administrators.

D.

the Help Desk administrator must be a member of the same Security Domain as the users to view them.

Which types of administrative objects are contained within an RSA Authentication Manager Security Domain? (Choose two)

A.

Users

B.

Administrators

C.

Identity Sources

D.

Replica Instances

E.

Security Question Requirements

When assigning a user a Temporary Fixed Tokencode to replace a lost token, what is the default value for the expiration period of that Tokencode?

A.

24 hours

B.

5 days

C.

14 days

D.

30 days

If the option “Automatically delete replaced tokens” is selected, the token records will be deleted when

A.

new tokens are imported.

B.

the token expiration date is reached.

C.

the Administrator unassigns the token from a user.

D.

a user logs in successfully with a new assigned token.

A user password policy can be used to define

A.

Which character strings can not be used for passwords.

B.

The number of password attempts before a user is locked out.

C.

Which RSA SecurID token types can be used with or without PINs.

D.

If Windows Password Integration is used with Authentication Manager.

A “Secured by RSA Security Implementation Guide” document would assist you in

A.

Configuring a third-party Authentication Agent.

B.

Installing RSA Authentication Manager software.

C.

Finding vendors for purchasing RSA SecurID tokens.

D.

Defining a deployment plan for installing Primary and Replica instances.

A user has an RSA SecurID Key Fob. The Key Fob Change Interval is 60 seconds and has been used successfully in the past. If the RSA Authentication Manager is now out of synch with the token by 2 minutes, what will happen when the user tries to authenticate?

A.

Authentication Manager will automatically adjust the token offset value and authenticate the user.

B.

Authentication Manager will reject the PASSCODE and the user will receive an "Access Denied" message.

C.

Authentication Manager will post a "Token Requires Resync" message in the log and deny access to the user.

D.

Authentication Manager will request the user for next tokencode, adjust the user's token offset value, and authenticate the user.

What are three minimal administrative steps that must be taken before a user can authenticate to a new RSA Authentication Manager deployment? (Choose three)

A.

Create a user group

B.

Create a user account

C.

Create a new user administrator

D.

Import a Node Secret from the Agent

E.

Create an Authentication Agent Record

F.

Assign an authentication method to a user