RSA SecurID Certified Administrator 8.0 Exam v6.0 (050-80-CASECURID01)

Page:    1 / 5   
Total 74 questions

RSA SecurID tokens are initially supplied with matching token records. After tokens are assigned, deployed and used by end-users, what information might be overwritten if the original token records are re-imported into the RSA Authentication Manager database?
(Choose two)

  • A. user assignment
  • B. tokencode values
  • C. Authentication Agent usage
  • D. token time offset information
  • E. system PIN parameter settings


Answer : A,D

One or more Replica RSA Authentication Manager instances can

  • A. Help load-balance authentication requests.
  • B. Translate LDAP directory information for the Primary instance.
  • C. Allow the administrator to add users when the Primary instance is down.
  • D. Allow a single PASSCODE to be accepted on multiple RSA Authentication Agents.


Answer : A

What action will allow an Authentication Agent to register automatically with RSA
Authentication Manager?

  • A. Edit the Authentication Agent Access Policy to allow auto-registration
  • B. Enable "Allow authentication agent auto-registration" in the Agent record
  • C. Select the option to “Allow Auto Registration” during installation of the Agent
  • D. Add “Auto-Registration=ALLOW" as a parameter value in the sdconf.rec file


Answer : B

If all users are denied access when they attempt to authenticate to an RSA Authentication
Manager instance, the problem might be that

  • A. the licensed number of users has been exceeded.
  • B. the Authentication Manager services are not running.
  • C. all Agent node secrets have been cleared by the users.
  • D. the Super Admin administrator has left the instance in debug mode.


Answer : B

If the RSA Authentication Manager places a token into Next Tokencode Mode, and the user waits for three minutes (three tokencode increments) to enter his/her next tokencode, what will be the expected result?

  • A. Authentication Manager will not accept the value because it is not sequential.
  • B. The authentication will be successful even though the input was delayed.
  • C. Authentication Manager will ask for a third tokencode, so that it has two sequential codes.
  • D. Authentication Manager will assume that the token has been stolen, and disable the token.


Answer : A

If a Super Admin administrator can view a certain set of user records in the Authentication
Manager database but a Help Desk administrator can NOT view the same records,

  • A. the Help Desk administrator should be assigned a Super Admin role.
  • B. the Help Desk administrator may not have the scope to view these users.
  • C. the user accounts have been marked as “hidden” for Help Desk level administrators.
  • D. the Help Desk administrator must be a member of the same Security Domain as the users to view them.


Answer : B

A feature of the RADIUS protocol is

  • A. The ability to track a user's login and logout time (RADIUS accounting).
  • B. Auser's default login name becomes their password (RADIUS login synchronization).
  • C. The computer time setting is verified remotely by the RADIUS client (remote time service).
  • D. The user Profile and Attribute Value Pair matches their tokencode (RADIUS token matching).


Answer : A

A “Secured by RSA Security Implementation Guide” document would assist you in

  • A. Configuring a third-party Authentication Agent.
  • B. Installing RSA Authentication Manager software.
  • C. Finding vendors for purchasing RSA SecurID tokens.
  • D. Defining a deployment plan for installing Primary and Replica instances.


Answer : A

RSA Authentication Manager audit log records:

  • A. Can be archived using a scheduled job.
  • B. Are only accessible by the Super Admin administrator.
  • C. Are always deleted from the database when they are archived.
  • D. Can be digitally signed by the administrator for archival storage protection.


Answer : A

User authentication:

  • A. always consists of two factors.
  • B. requires an RSA SecurID token.
  • C. is the same as user identification.
  • D. can consist of one or more factors.


Answer : D

Offline Authentication capability allows:

  • A. an On-demand tokencode to be used in place of an RSA SecurID passcode
  • B. an Authentication Agent to verify user passcodes in the event that an instance is unavailable
  • C. a list of RSA SecurID passcodes to be stored in a text file in the event that an instance is unavailable
  • D. user authentication with an RSA SecurID token when their computer is disconnected from a network


Answer : D

The term "Secured by RSA” is most closely associated with

  • A. An RSA token device.
  • B. Asecure directory server.
  • C. An Authentication Agent device.
  • D. AManaged Security Provider company.


Answer : C

Which one of the following statements concerning an RSA Authentication Manager Identity
Source is true?

  • A. An Identity Source can only be assigned to one user.
  • B. An Identity Source can only be associated with one User Group.
  • C. Multiple Identity Sources can be mapped to Authentication Manager.
  • D. An Identity Source must include at least one external Security Domain.


Answer : C

Settings for the Lockout Policy affect which of the following?

  • A. User attempts to log in to the Self-service console
  • B. Administrator login to the RSA Operations Console
  • C. User authentication attempts using an RSA SecurID token
  • D. User login to a Windows environment with Windows Password Integration


Answer : C

Allowing only certain users to authenticate on a given Authentication Agent (Restricted

Agent) is accomplished with -

  • A. Agent APIs.
  • B. User Policies.
  • C. Node Secrets.
  • D. Group Associations.


Answer : D

Page:    1 / 5   
Total 74 questions