Within which RSA Authentication Manager menu would you configure the number of incorrect PASSCODES that will invoke Next Tokencode Mode?
A. Policies
B. System Setup
C. Identity Settings
D. RADIUS Lockout
Token expiration dates:
A. Appear on the token display thirty days prior to expiration.
B. Are programmed into a token record at the time of manufacture.
C. Vary according to the date set by the administrator when assigning the token.
D. Depend on the clock in the Authentication Agent to determine if the token is active.
If the access time range allowed for a group is specified as 8 AM to 6 PM each weekday, which statement about a group member's login is true?
A. All group members will be logged out automatically at 6 PM.
B. A user will be prompted to renew their login each day after 8 AM.
C. A user's individual access times override a group's access time range.
D. Once logged in during the allowed time period, a user can remain logged in indefinitely.
When is the user PIN established?
A. when the useraccountis first created
B. at the time a token is first assigned to a user
C. upon the first successful authentication with the token
D. after the user successfully enters two sequential tokencodes
When using the "Resynchronize Token" function, after an administrator enters two consecutive tokencodes, the token clock time is displayed.
A. False
B. True
If Windows Password Integration is enabled and a Fixed Passcode is assigned to a user, it is important that the Fixed Passcode have the same number of characters as the user's Windows password.
A. False
B. True
The term “Silent Collection” refers to gathering information about a user's access and authentication patterns.
A. True
B. False
An On-Demand authentication involves:
A. Entering two sequential RSA SecurID tokencodes.
B. Manually assigning a temporary tokencode to a user.
C. Sending a tokencode to a user via mobile phone SMS message or email.
D. Connecting an RSA SecurID token directly to the USB port of an Authentication Agent computer.
When creating and running RSA Authentication Manager reports, the administrator has the option of . (Choose two)
A. Allowing the report to run with the scope of the administrator who is running the report.
B. Creating and running reports from a Replica database if the Primary instance is down.
C. Using the 'rsautil' command-lineutilityto extract report data directly from the database.
D. Customizing a report template by adding and removing columns and applying data filters.
E. Previewing the report output before the report is run to make sure the desired data is included.
A user password policy can be used to define
A. Which character strings can not be used for passwords.
B. The number of password attempts before a user is locked out.
C. Which RSA SecurID token types can be used with or without PINs.
D. If Windows Password Integration is used with Authentication Manager.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only RSA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 050-80-CASECURID01 exam preparations and RSA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.