What circumstance would allow an administrator to have read/write access to an RSA Authentication Manager database on a Replica instance?
A. The Replica is first promoted to a Primary instance.
B. The Replica instance is in a different domain from the Primary instance.
C. The database service on the Replica instance is running in Offline mode.
D. The Replica does not have a network connection to the Primary instance.
Of the following RSA Authentication Manager components, which one is most likely to be located in a network DMZ?
A. Web Tier
B. Risk Engine
C. Replica Server
D. Authentication Agent
What are three steps an administrator can use for reporting past user transactions stored in the RSA Authentication Manager audit database? (Choose three)
A. Run a report job.
B. Edit a report template.
C. View a report job output.
D. View the Audit Monitor utility.
E. Use the 'view-audit-log' command line utility.
F. Export the audit database to a spreadsheet format.
A user is trying to authenticate to establish a VPN connection but receives an "Access Denied" message. The most recent authentication log entry for the user shows the message: "PIN Rejected".
What should the next action be?
A. Clear the user's PIN.
B. Resynchronize the user's token.
C. Clear the VPN Agent's Node Secret.
D. Instruct the user to log in using only a tokencode.
An RSA Authentication Manager deployment must have at least one Authentication Agent record in the database in order to
A. Add time-restricted user accounts to the database.
B. Perform user authentications with an RSA SecurID token.
C. Configure a Authentication Sources through the Self-Service Console.
D. Establish logon policies related to Authentication Agent time restrictions.
When a user authenticates with a token for the first time, what does the user enter when prompted for a PASSCODE?
A. the serial number of the token
B. the tokencode on the token's display
C. a PIN the user creates followed by their tokencode
D. a temporary PASSCODE assigned by the Administrator
RSA Authentication Manager audit log records:
A. Can be archived using a scheduled job.
B. Are only accessible by the Super Admin administrator.
C. Are always deleted from the database when they are archived.
D. Can be digitally signed by the administrator for archival storage protection.
If a user is seeking help after receiving an `Access Denied' message, which Security Console function would help locate the activity?
A. Reporting
B. Token record
C. User activation record
D. Administrative Activity Monitor
A user password policy can be used to define
A. Which character strings can not be used for passwords.
B. The number of password attempts before a user is locked out.
C. Which RSA SecurID token types can be used with or without PINs.
D. If Windows Password Integration is used with Authentication Manager.
What are two elements are involved in Risk-Based Authentication? (Choose two)
A. a user's device profile
B. a user's Security Level
C. the length of a user's PIN
D. the behavior pattern of a user
E. the strength of a user's Passcode