Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

RSA 050-SEPROGRC-01 - RSA Certified SE Professional in Governance, Risk and Compliance

Page: 2 / 3
Total 70 questions

Which solution includes a library of response procedures that can be used in the context of multiple events?

A.

Policy Management

B.

Incident Management

C.

Compliance Management

D.

Business Continuity Management

When importing data using the Data Import feature, which of the following options is a valid file type?

A.

XML

B.

RTF

C.

HTML

D.

Flat, delimited-values data file

How do you launch a rebuild of the RSA Archer search index file?

A.

Restart the Archer Queuing Service.

B.

Go to Windows System Control Panel > Indexing Options.

C.

Go to the Archer Control Panel and click the Rebuild Search Index link.

D.

A rebuild of the search index is done automatically each evening without admin intervention.

Administrators can access features on the Administration tab to do all of the following EXCEPT:

A.

Create new records

B.

Configure questionnaires

C.

Add new fields to applications

D.

Change the colors of the system

The Enterprise Management solution is split into which two sub-solutions?

A.

Asset Management and Company Hierarchy

B.

Business Infrastructure and Enterprise Hierarchy

C.

Organizational Structure and Asset Management

D.

Business Hierarchy and Enterprise Infrastructure

What will happen if you attempt to import data into a values list in RSA Archer, and the imported values do not already exist in the values list in the system?

A.

The data import will fail.

B.

The new values will overwrite the existing values in the list.

C.

A new values list field will be created with the imported values.

D.

The new values will be added to the list, including potentially unwanted values.

When will a calculated field’s value be recalculated?

A.

When a report is run

B.

When a record is opened

C.

When a record is saved, assuming fields affecting the calculation have been edited

D.

When a user logs into the system, assuming the user has access to the application housing the calculation

At what point should you create user accounts, roles, and groups in Access Control during the Proof-of-Concept build process?

A.

It should be the first step

B.

After the data has been loaded

C.

After reports have been created

D.

After the shells of the applications have been built, but before actual fields have been added

The Preferences menu in the top frame of the system allows users to do all of the following EXCEPT:

A.

Select workspaces for display

B.

Update user profile information

C.

Subscribe to email notifications

D.

Update records within applications

What is the purpose of the X.509 certificate in the RSA Archer installation?

A.

It verifies the system is SCORM compliant.

B.

It allows the system to be read by a screen reader.

C.

It ensures the Platform can be run on any operating system.

D.

It is used for authentication between the Configuration Service and other Archer components.