Which of the following can cause the error message "Node Secret Mismatch?" (Choose two)
A. A user is not activated on the Agent Host.
B. The Agent is not certified as "Secured by RSA"
C. The Agent has been uninstalled then re-installed.
D. The Agent is installed on an unreachable remote network node.
E. The Node Secret file has been cleared or deleted on the Agent host.
A User Group can include which of the following as members?
A. other User Groups
B. user Identity Attributes
C. LDAP Identity Sources
D. tokens assigned to users
If a user is NOT a member of an Authentication Manager user group, which of the following statements is true?
A. The user can not be restricted to certain login times.
B. The user can not be forced to adhere to password polices.
C. The user can not take advantage of Risk-Based authentication.
D. The user can not log on to an unrestricted Authentication Agent.
What are three steps an administrator can use for reporting past user transactions stored in the RSA Authentication Manager audit database? (Choose three)
A. Run a report job.
B. Edit a report template.
C. View a report job output.
D. View the Audit Monitor utility.
E. Use the 'view-audit-log' command line utility.
F. Export the audit database to a spreadsheet format.
Which of the following services is NOT an option to users through the Self-Service Console?
A. Changing a password or PIN
B. Creating an individual PIN policy
C. Requesting a replacement token
D. Resynchronizing an RSA SecurID token
A user is trying to authenticate to establish a VPN connection but receives an "Access Denied" message. The most recent authentication log entry for the user shows the message: "PIN Rejected".
What should the next action be?
A. Clear the user's PIN.
B. Resynchronize the user's token.
C. Clear the VPN Agent's Node Secret.
D. Instruct the user to log in using only a tokencode.
Universal Coordinated Time (UTC) is a critical component of which type of authentication method?
A. Fixed Passcode
B. Risk-Based Authentication
C. On-Demand Authentication
D. RSA SecurID hardware token
When is the user PIN established?
A. when the useraccountis first created
B. at the time a token is first assigned to a user
C. upon the first successful authentication with the token
D. after the user successfully enters two sequential tokencodes
RSA Authentication Manager audit log records:
A. Can be archived using a scheduled job.
B. Are only accessible by the Super Admin administrator.
C. Are always deleted from the database when they are archived.
D. Can be digitally signed by the administrator for archival storage protection.
Allowing only certain users to authenticate on a given Authentication Agent ("Restricted" Agent) is accomplished with
A. Agent APIs.
B. User Policies.
C. Node Secrets.
D. Group Associations.