New Year Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free RSA 050-80-CASECURID01 Practice Exam with Questions & Answers

Questions 1

A user who is enabled for Risk-Based Authentication will likely be associated with what other authentication method?

Options:
A.

PIN-less SecurID token.

B.

On-Demand Authentication.

C.

Emergency Access Passcode.

D.

Digital Certificate Authentication.

Questions 2

If a user forgets his/her PIN and still has possession of his/her token, an Administrator should verify the identity of the user and then

Options:
A.

Clear the user’s old PIN.

B.

Disable the user’s token.

C.

Assign a new token to the user.

D.

Assign a temporary Fixed Passcode.

Questions 3

User authentication:

Options:
A.

always consists of two factors.

B.

requires an RSA SecurID token.

C.

is the same as user identification.

D.

can consist of one or more factors.

Questions 4

If a Super Admin administrator can view a certain set of user records in the Authentication Manager database but a Help Desk administrator can NOT view the same records,

Options:
A.

the Help Desk administrator should be assigned a Super Admin role.

B.

the Help Desk administrator may not have the scope to view these users.

C.

the user accounts have been marked as “hidden” for Help Desk level administrators.

D.

the Help Desk administrator must be a member of the same Security Domain as the users to view them.

Questions 5

If the access time range allowed for a group is specified as 8 AM to 6 PM each weekday, which statement about a group member’s login is true?

Options:
A.

All group members will be logged out automatically at 6 PM.

B.

A user will be prompted to renew their login each day after 8 AM.

C.

A user’s individual access times override a group’s access time range.

D.

Once logged in during the allowed time period, a user can remain logged in indefinitely.

Questions 6

When creating and running RSA Authentication Manager reports, the administrator has the option oF. (Choose two)

Options:
A.

Allowing the report to run with the scope of the administrator who is running the report.

B.

Creating and running reports from a Replica database if the Primary instance is down.

C.

Using the 'rsautil' command-lineutilityto extract report data directly from the database.

D.

Customizing a report template by adding and removing columns and applying data filters.

E.

Previewing the report output before the report is run to make sure the desired data is included.

Questions 7

RSA Authentication Manager audit log records:

Options:
A.

Can be archived using a scheduled job.

B.

Are only accessible by the Super Admin administrator.

C.

Are always deleted from the database when they are archived.

D.

Can be digitally signed by the administrator for archival storage protection.

Questions 8

A user is trying to authenticate to establish a VPN connection but receives an “Access Denied" message. The most recent authentication log entry for the user shows the message: “PIN Rejected”. What should the next action be?

Options:
A.

Clear the user’s PIN.

B.

Resynchronize the user’s token.

C.

Clear the VPN Agent’s Node Secret.

D.

Instruct the user to log in using only a tokencode.

Questions 9

A user password policy can be used to define

Options:
A.

Which character strings can not be used for passwords.

B.

The number of password attempts before a user is locked out.

C.

Which RSA SecurID token types can be used with or without PINs.

D.

If Windows Password Integration is used with Authentication Manager.

Questions 10

Which RSA SecurID authentication method can use alphabetic characters as part of the user’s PASSCODE?

Options:
A.

Key Fob

B.

PINPad

C.

On-demand authentication

D.

Software Token in PINPad mode