Q1. If a user is seeking help after receiving an 'Access Denied' message, which Security Console function would help locate the activity?
A.Reporting
B. Token record
C. User activation record
D. Administrative Activity Monitor
Correct Answer: A
Q2. A user password policy can be used to define
A.Which character strings can not be used for passwords.
B. The number of password attempts before a user is locked out.
C. Which RSA SecurID token types can be used with or without PINs.
D. If Windows Password Integration is used with Authentication Manager.
Correct Answer: A
Q3. What are two elements are involved in Risk-Based Authentication? (Choose two)
A.a user's device profile
B. a user's Security Level
C. the length of a user's PIN
D. the behavior pattern of a user
E. the strength of a user's Passcode
Correct Answer: A, D
Q4. The RSA SecurID Software token calculates tokencodes using the time value
A.Of the Remote Access or VPN server computer.
B. Obtained from the Authentication Manager instance.
C. Obtained from the Authentication Agent host computer.
D. Of the host device on which the software token is installed.
Correct Answer: D
Q5. When using the ''Resynchronize Token'' function, after an administrator enters two consecutive tokencodes, the token clock time is displayed.
A.False
B. True
Correct Answer: B
$ 39
Reviews
There are no reviews yet.