Which Data-Driven Event could be used to conditionally require a field?
A. Apply conditional layout
B. Filter values list
C. Set values list
D. Set conditional requirement
Why is it important to track vendor relationships and behaviors?
A. To establish and communicate security policies and standards
B. To report on audit results in a consistent and timely manner
C. To better scope and document your information security management system
D. To understand the extent of an organization's dependency on third parties and how third party risks affect the organization
Within RSA Archer, data is restored in the following nested sequence of items:
A. Solution> Application>Record>Field
B. Workspace>Dashboard>iView>Report
C. User Account> Workspace>Solution> Application
D. Access role> Group> User Account>User
If a group is associated with an access role and the group contains sub-groups, how will the associated access role affect the sub-groups
A. The sub-groups will be associated with the access role
B. The sub-groups will not be associated with the access role
C. The sub-groups will be inactivated
D. The sub-groups will be removed from the group
If an RSA Archer user cannot see an application that does not exist within the system, what should the administrator check first?
A. The administrator should verify the user has been assigned a role that grants access to the application
B. The administrator should verify the user has been granted access rights to Private fields within the application
C. The administrator should confirm the user is named within a Record Permission field within the application
D. The administrator should verify the user belongs to at least one group
Which of the following Audit Management components would be used to group areas of the business identified for an annual audit?
A. Audit Assessments
B. Audit Plans
C. Audit Engagements
D. Audit Entities
In what way can Issues Management act as a foundation for other Archer solutions?
A. Baseline issues provide a basic understanding of business and IT infrastructure
B. Issues logged by a variety of groups provide a partial inventory of software applications, acting as a foundation for other inventories
C. Issues generated by several groups can be handled in Issues Management, including audit and risk and compliance
D. Issues Management helps to decentralize risk at a high level
When viewing the records returned from an advanced search, what does clicking the "New" icon do?
A. Creates a copy of the first record listed in the search results
B. Opens a new advanced search page and removes any previously applied filters
C. Opens a new advanced search page and returns the search criteria to the default display fields
D. Creates a new record in the application
Which of the following notifications is always required?
A. Subscription Notification for a Leveled Application
B. Generate Notification Action (Data-Driven Event)
C. Subscription Notification for a Standard Application
D. Notification in Digest format
For a user to view a global report, which of the following MUST be true?
A. The user must have access to the application on which the global report was built
B. There can be no private fields in the application on which the global report was built
C. The global report must be displayed in a Report iView the user has access to
D. There can be no Record Permission fields in the application on which the global report was built