Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

RSA 050-80-CASECURID01 - RSA SecurID Certified Administrator 8.0 Exam

Page: 1 / 3
Total 70 questions

Within which RSA Authentication Manager menu would you configure the number of incorrect PASSCODES that will invoke Next Tokencode Mode?

A.

Policies

B.

System Setup

C.

Identity Settings

D.

RADIUS Lockout

If the access time range allowed for a group is specified as 8 AM to 6 PM each weekday, which statement about a group member’s login is true?

A.

All group members will be logged out automatically at 6 PM.

B.

A user will be prompted to renew their login each day after 8 AM.

C.

A user’s individual access times override a group’s access time range.

D.

Once logged in during the allowed time period, a user can remain logged in indefinitely.

Can multiple Identity Sources be established from the same LDAP directory?

A.

Yes, if the mapped Organizational Units (OUs) do not overlap.

B.

Yes, if duplicate attribute values do not exist in the LDAP directory.

C.

No – only one LDAP directory can be mapped to one Identity Source.

D.

Yes, if no duplicate passwords exist in the LDAP directory (unique password for each user).

A user has an RSA SecurID Key Fob. The Key Fob Change Interval is 60 seconds and has been used successfully in the past. If the RSA Authentication Manager is now out of synch with the token by 2 minutes, what will happen when the user tries to authenticate?

A.

Authentication Manager will automatically adjust the token offset value and authenticate the user.

B.

Authentication Manager will reject the PASSCODE and the user will receive an "Access Denied" message.

C.

Authentication Manager will post a "Token Requires Resync" message in the log and deny access to the user.

D.

Authentication Manager will request the user for next tokencode, adjust the user's token offset value, and authenticate the user.

The term "Secured by RSA” is most closely associated with

A.

An RSA token device.

B.

Asecure directory server.

C.

An Authentication Agent device.

D.

AManaged Security Provider company.

RSA SecurID tokens are initially supplied with matching token records. After tokens are assigned, deployed and used by end-users, what information might be overwritten if the original token records are re-imported into the RSA Authentication Manager database? (Choose two)

A.

user assignment

B.

tokencode values

C.

Authentication Agent usage

D.

token time offset information

E.

system PIN parameter settings

Using the ‘Generate Configuration File' function of the Security Console helps to establish

A.

RADIUS client profiles.

B.

Aconnection to a Replica instance.

C.

Aconnection to external Identity Sources.

D.

Communication with Authentication Agents.

If all users are denied access when they attempt to authenticate to an RSA Authentication Manager instance, the problem might be that

A.

the licensed number of users has been exceeded.

B.

the Authentication Manager services are not running.

C.

all Agent node secrets have been cleared by the users.

D.

the Super Admin administrator has left the instance in debug mode.

Three consecutive log entries for one user contain the message "Authentication Method Failed". When the user contacts the Help Desk, what administrative action would NOT be appropriate?

A.

attempt to resynchronize the token through the Security Console

B.

set the user's PIN to Next Tokencode through the Manage Tokens menu

C.

verify the correct system time of the RSA Authentication Manager instance

D.

assign a Temporary Fixed Passcode for troubleshooting through the User menu

A user password policy can be used to define

A.

Which character strings can not be used for passwords.

B.

The number of password attempts before a user is locked out.

C.

Which RSA SecurID token types can be used with or without PINs.

D.

If Windows Password Integration is used with Authentication Manager.