Which of the following functions is NOT a use for Security Parameters?
Answer : C
On the Manage Users page, what can an administrator use to quickly locate information on an RSA Archer user with the last name of "Jones?"
Answer : B
Which of the following statements does NOT apply to RSA Archer groups?
Answer : D
If a group is associated with an access role and the group containssub-groups, how will the associated access role affect the sub-groups?
Answer : D
Which ofthe following is NOT a page-level privilege that can be granted to a user/group through an Access Role?
Answer : B
Which of the following statements about the system administrator role is NOT true?
Answer : A
Which of the following actions would a user NOT be able to do if they were assigned only
Read, Update and Delete rights to the Contacts application?
Answer : C
Which of the following is NOT a method for granting record-level access to users and groups?
Answer : D
Which of the following access control elements CAN NOT be copied?
Answer : A
All system users automatically belong to a built-in group named
Answer : B
Which of the following is NOT a required attribute for a user account?
Answer : D
What must an access control administrator do to inactivate a user account?
A. Delete the user -
B. Remove all access rights -
C. Change the account status to Locked
D. Change the account status to Inactive
Answer : D Topic 3, Communication and Data Presentation
Which of the following statements best summarizes what happens when executing an advanced search that filters on the Policy Owner field using the Current User filter?
Answer : D
Which of the following actions do NOT have the possibility of triggering a subscription notification?
Answer : C
Which of the following options CAN NOT be used to determine a recipient for a subscription notification?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us