Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

RSA 050-80-CASECURID01 Exam -

Free 050-80-CASECURID01 Sample Questions:

Q: 1
A user has an RSA SecurID Key Fob. The Key Fob Change Interval is 60 seconds and has been used successfully in the past. If the RSA Authentication Manager is now out of synch with the token by 2 minutes, what will happen when the user tries to authenticate?
A. Authentication Manager will automatically adjust the token offset value and authenticate the user.
B. Authentication Manager will reject the PASSCODE and the user will receive an "Access Denied" message.
C. Authentication Manager will post a "Token Requires Resync" message in the log and deny access to the user.
D. Authentication Manager will request the user for next tokencode, adjust the user's token offset value, and authenticate the user.
Answer: D

Q: 2
What are three minimal administrative steps that must be taken before a user can authenticate to a new RSA Authentication Manager deployment? (Choose three)
A. Create a user group
B. Create a user account
C. Create a new user administrator
D. Import a Node Secret from the Agent
E. Create an Authentication Agent Record
F. Assign an authentication method to a user
Answer: B, E, F

Q: 3
The Identity Attribute parameter is useful for
A. Ignoring users with duplicate user names.
B. Storing additional information in a user record.
C. Specifying a user’s LDAP CN and account password.
D. Allowing a user to authenticate transparently among multiple domains.
Answer: B

Q: 4
A user who is enabled for Risk-Based Authentication will likely be associated with what other authentication method?
A. PIN-less SecurID token.
B. On-Demand Authentication.
C. Emergency Access Passcode.
D. Digital Certificate Authentication.
Answer: B

Q: 5
When a user authenticates with a token for the first time, what does the user enter when prompted for a PASSCODE?
A. the serial number of the token
B. the tokencode on the token's display
C. a PIN the user creates followed by their tokencode
D. a temporary PASSCODE assigned by the Administrator
Answer: B

Q: 6
RSA SecurID tokens are initially supplied with matching token records. After tokens are assigned, deployed and used by end-users, what information might be overwritten if the original token records are re-imported into the RSA Authentication Manager database? (Choose two)
A. user assignment
B. tokencode values
C. Authentication Agent usage
D. token time offset information
E. system PIN parameter settings
Answer: A, D

Q: 7
One or more Replica RSA Authentication Manager instances can
A. Help load-balance authentication requests.
B. Translate LDAP directory information for the Primary instance.
C. Allow the administrator to add users when the Primary instance is down.
D. Allow a single PASSCODE to be accepted on multiple RSA Authentication Agents.
Answer: A

© 2014, All Rights Reserved