Can multiple Identity Sources be established from the same LDAP directory?
A. Yes, if the mapped Organizational Units (OUs) do not overlap.
B. Yes, if duplicate attribute values do not exist in the LDAP directory.
C. No ?only one LDAP directory can be mapped to one Identity Source.
D. Yes, if no duplicate passwords exist in the LDAP directory (unique password for each user).
What is the maximum number of active tokens and/or user fixed passcodes that can be assigned to a user at one time?
A. one
B. three
C. seven
D. unlimited
What are three steps an administrator can use for reporting past user transactions stored in the RSA Authentication Manager audit database? (Choose three)
A. Run a report job.
B. Edit a report template.
C. View a report job output.
D. View the Audit Monitor utility.
E. Use the 'view-audit-log' command line utility.
F. Export the audit database to a spreadsheet format.
Which of the following services is NOT an option to users through the Self-Service Console?
A. Changing a password or PIN
B. Creating an individual PIN policy
C. Requesting a replacement token
D. Resynchronizing an RSA SecurID token
The "Quick Search" function that allows access to a user's account, token and recent activity is a feature of
A. The User Dashboard.
B. The Self-Service Console.
C. On-Demand Authentication.
D. The Windows MMC Snap-In.
If the option "Automatically delete replaced tokens" is selected, the token records will be deleted when
A. new tokens are imported.
B. the token expiration date is reached.
C. the Administrator unassigns the token from a user.
D. a user logs in successfully with a new assigned token.
When a user authenticates with a token for the first time, what does the user enter when prompted for a PASSCODE?
A. the serial number of the token
B. the tokencode on the token's display
C. a PIN the user creates followed by their tokencode
D. a temporary PASSCODE assigned by the Administrator
A "Secured by RSA Security Implementation Guide" document would assist you in
A. Configuring a third-party Authentication Agent.
B. Installing RSA Authentication Manager software.
C. Finding vendors for purchasing RSA SecurID tokens.
D. Defining a deployment plan for installing Primary and Replica instances.
Offline Authentication capability allows:
A. an On-demand tokencode to be used in place of an RSA SecurID passcode
B. an Authentication Agent to verify user passcodes in the event that an instance is unavailable
C. a list of RSA SecurID passcodes to be stored in a text file in the event that an instance is unavailable
D. user authentication with an RSA SecurID token when their computer is disconnected from a network
The term "Secured by RSA" is most closely associated with
A. An RSA token device.
B. Asecure directory server.
C. An Authentication Agent device.
D. AManaged Security Provider company.