What are two elements are involved in Risk-Based Authentication? (Choose two)
A. a user's device profile
B. a user's Security Level
C. the length of a user's PIN
D. the behavior pattern of a user
E. the strength of a user's Passcode
The RSA SecurID Software token calculates tokencodes using the time value
A. Of the Remote Access or VPN server computer.
B. Obtained from the Authentication Manager instance.
C. Obtained from the Authentication Agent host computer.
D. Of the host device on which the software token is installed.
Dynamic Seed Provisioning allows secure distribution of:
A. Node Secret files to Authentication Agents.
B. RSA SecurID hardware tokens to end users.
C. Software token information to end user devices.
D. Configuration information to Authentication Agents.
If a user is seeking help after receiving an `Access Denied' message, which Security Console function would help locate the activity?
A. Reporting
B. Token record
C. User activation record
D. Administrative Activity Monitor
Allowing only certain users to authenticate on a given Authentication Agent ("Restricted" Agent) is accomplished with
A. Agent APIs.
B. User Policies.
C. Node Secrets.
D. Group Associations.
If an administrator creates a new administrative user,
A. by default, the new administrator must use a SecurID token to log in.
B. the administrator creating the new user must have at least a Super Admin role.
C. by default, the new user has permissions identical to the administrator creating the new user.
D. permissions granted to the new user can not exceed those of the administrator creating the new user.
The term "Secured by RSA" is most closely associated with
A. An RSA token device.
B. Asecure directory server.
C. An Authentication Agent device.
D. AManaged Security Provider company.
Which one of the following statements concerning an RSA Authentication Manager Identity Source is true?
A. An Identity Source can only be assigned to one user.
B. An Identity Source can only be associated with one User Group.
C. Multiple Identity Sources can be mapped to Authentication Manager.
D. An Identity Source must include at least one external Security Domain.
Settings for the Lockout Policy affect which of the following?
A. User attempts to log in to the Self-service console
B. Administrator login to the RSA Operations Console
C. User authentication attempts using an RSA SecurID token
D. User login to a Windows environment with Windows Password Integration
Offline Authentication capability allows:
A. an On-demand tokencode to be used in place of an RSA SecurID passcode
B. an Authentication Agent to verify user passcodes in the event that an instance is unavailable
C. a list of RSA SecurID passcodes to be stored in a text file in the event that an instance is unavailable
D. user authentication with an RSA SecurID token when their computer is disconnected from a network
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only RSA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your 050-80-CASECURID01 exam preparations and RSA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.