RSA SecurID tokens are initially supplied with matching token records. After tokens are assigned, deployed and used by end-users, what information might be overwritten if the original token records are re-imported into the RSA Authentication Manager database?
(Choose two)
Answer : A,D
One or more Replica RSA Authentication Manager instances can
Answer : A
What action will allow an Authentication Agent to register automatically with RSA
Authentication Manager?
Answer : B
If all users are denied access when they attempt to authenticate to an RSA Authentication
Manager instance, the problem might be that
Answer : B
If the RSA Authentication Manager places a token into Next Tokencode Mode, and the user waits for three minutes (three tokencode increments) to enter his/her next tokencode, what will be the expected result?
Answer : A
If a Super Admin administrator can view a certain set of user records in the Authentication
Manager database but a Help Desk administrator can NOT view the same records,
Answer : B
A feature of the RADIUS protocol is
Answer : A
A “Secured by RSA Security Implementation Guide” document would assist you in
Answer : A
RSA Authentication Manager audit log records:
Answer : A
User authentication:
Answer : D
Offline Authentication capability allows:
Answer : D
The term "Secured by RSA” is most closely associated with
Answer : C
Which one of the following statements concerning an RSA Authentication Manager Identity
Source is true?
Answer : C
Settings for the Lockout Policy affect which of the following?
Answer : C