Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The Policy Management solution enables companies to implement a workflow process that will ensure exceptions to policies are properly documented and reviewed. What is the name of the application that includes this process?

A.

Policies

B.

Question Library

C.

Control Procedures

D.

Exception Requests

At what point should you create user accounts, roles, and groups in Access Control during the Proof-of-Concept build process?

A.

It should be the first step

B.

After the data has been loaded

C.

After reports have been created

D.

After the shells of the applications have been built, but before actual fields have been added

Why is it important that users be able to interact with fields that are being evaluated by a rule within Events?

A.

Only fields that all users can see can be evaluated within a rule.

B.

This is a non-issue, as only administrators are able to configure events.

C.

If a user cannot interact with an evaluated field, he cannot trigger the action included in an event.

D.

If a user cannot interact with all fields, he cannot save the record, and therefore, cannot trigger calculations.

What DBMS (database server product) is used for RSA Archer?

A.

MySQL

B.

Oracle Database

C.

Microsoft SQL Server

D.

Sybase Adaptive Server Enterprise

What three items should be gathered from the customer prior to building a Proof-of-Concept (POC)? (Choose three)

A.

Sample data

B.

Success criteria

C.

Process documentation

D.

List of applications customer is currently using

E.

Customer’s Finance Team contact information

What three phases are included in the Proof-of-Concept build process?

A.

Analyze, Build, Test

B.

Demo, Gather, Build

C.

Scope, Create, Deliver

D.

Discuss, Analyze, Create

In order to begin installing the RSA Archer Platform, you should first copy the installation package to:

A.

Your desktop

B.

A shared network drive

C.

A subfolder within the Archer directory

D.

The webserver that will host the web and application files

The Threat Management solution is primarily used in conjunction with what other RSA Archer administrative feature?

A.

Data Feed Manager

B.

Data Import Manager

C.

Management Reporting

D.

Business Processes Application

In order to create a chart using the Advanced Search functionality, what must a user first do?

A.

Enter at least one keyword to be used to group the dataset into chartable groups.

B.

Configure a filter to be used that will bring back only a subset of the overall data set.

C.

Select the Charting search results format to be used in the Display Options section.

D.

Select the Statistics Mode checkbox at the bottom of the Fields to Display section.

The Audit Management solution includes audit-related applications as well as a set of applications related to what other area?

A.

Risk Management

B.

Vendor Management

C.

Staffing Management

D.

Incident Management