An RSA Authentication Manager Enterprise license will allow which of the following to be added to a Primary instance?
A. multiple Replica instances
B. Risk-Based authentication capability
C. On-Demand authentication capability
D. Business Continuity Option (BCO) capability
What circumstance would allow an administrator to have read/write access to an RSA Authentication Manager database on a Replica instance?
A. The Replica is first promoted to a Primary instance.
B. The Replica instance is in a different domain from the Primary instance.
C. The database service on the Replica instance is running in Offline mode.
D. The Replica does not have a network connection to the Primary instance.
Which types of administrative objects are contained within an RSA Authentication Manager Security Domain? (Choose two)
A. Users
B. Administrators
C. Identity Sources
D. Replica Instances
E. Security Question Requirements
If a user has both a Fixed Passcode and an RSA SecurID token assigned,
A. the Fixed Passcode becomes the user's PIN by default.
B. either the Fixed Passcode or the token may be used for authentication.
C. the Fixed Passcode can only be used if the token status is set to `disabled'.
D. the user must supply their secret PIN in addition to the Fixed Passcode when authenticating.
Within which RSA Authentication Manager menu would you configure the number of incorrect PASSCODES that will invoke Next Tokencode Mode?
A. Policies
B. System Setup
C. Identity Settings
D. RADIUS Lockout
Token expiration dates:
A. Appear on the token display thirty days prior to expiration.
B. Are programmed into a token record at the time of manufacture.
C. Vary according to the date set by the administrator when assigning the token.
D. Depend on the clock in the Authentication Agent to determine if the token is active.
The RSA Authentication Manager Report options can assist you in
A. Troubleshooting network logout problems.
B. Determining how long users are logged in.
C. Troubleshooting Authentication Agent activity.
D. Determining when audit log encryption is compromised.
What are three minimal administrative steps that must be taken before a user can authenticate to a new RSA Authentication Manager deployment? (Choose three)
A. Create a user group
B. Create a user account
C. Create a new user administrator
D. Import a Node Secret from the Agent
E. Create an Authentication Agent Record
F. Assign an authentication method to a user
A "Secured by RSA Security Implementation Guide" document would assist you in
A. Configuring a third-party Authentication Agent.
B. Installing RSA Authentication Manager software.
C. Finding vendors for purchasing RSA SecurID tokens.
D. Defining a deployment plan for installing Primary and Replica instances.
Allowing only certain users to authenticate on a given Authentication Agent ("Restricted" Agent) is accomplished with
A. Agent APIs.
B. User Policies.
C. Node Secrets.
D. Group Associations.