050-v71x-CSESECURID Dumps

050-v71x-CSESECURID Braindumps 050-v71x-CSESECURID Real Questions 050-v71x-CSESECURID Practice Test

050-v71x-CSESECURID Actual Questions


killexams.com


RSA


050-v71x-CSESECURID


RSA SecurID Certified Systems Engineer 7.1x


https://killexams.com/pass4sure/exam-detail/050-v71x-CSESECURID


QUESTION: 61

What default ports need to be opened if a company wants to implement and/or administer RSA SecurID behind a firewall? (Choose two)


  1. 5500 UDP

  2. 5500 TCP

  3. 5510 TCP

  4. 5520 UDP

E. 1024 -65535 UDP


Answer: A E


QUESTION: 62

The RSA Credential Manager function allows


  1. users to self-register for RSA SecurID tokens.

  2. managers to control the deployment of Replica servers.

  3. administrators to install software token packages remotely.

  4. Agents to determine what credentials are valid for authentication.


Answer: A


QUESTION: 63

RSA Authentication Manager installation on a UNIX platform is similar to installation on a Linux platform because both platforms require


  1. an Enterprise license

  2. the installer to run as 'root'

  3. internet access to download security patch files

  4. the use of a command line console during installation


Answer: B


QUESTION: 64

Planning the installation of RSA Authentication Manager software or an RSA SecurID Appliance should


  1. include planning what Agents are required at network access points.

  2. take place after Agent devices and softwar2e0have been installed and configured.


  3. determine how to add the logout time of any authenticated users to the Agent audit log.

  4. include how to generate and securely distribute Node Secret values for Agents in the system.


Answer: A


QUESTION: 65

The value of an on-demand tokencode is


  1. its ability to be re-used for login up to 5 times before expiration.

  2. that it can be supplied to users who have no assigned authenticator.

  3. that multiple users can share the same tokencode in an emergency.

  4. the added security of a token that only displays a tokencode when activated.


Answer: B


QUESTION: 66

After installation of RSA Authentication Manager software or RSA SecurID Appliance, it is important to ensure


  1. the correct UTC time is set in the Server host or Appliance.

  2. that Agents and the Server host or Appliance are on the same network subnet.

  3. that DHCP is enabled to assign a valid IP address to the Server host or Appliance.

  4. the correct sdconf.rec file is moved from any installed Agent to the Server or Appliance.


Answer: A


QUESTION: 67

For what installation situations is creating a 'package' file necessary before installation can begin? (Choose two)


  1. for RADIUS client installation

  2. for a RADIUS server installation

  3. for an Authentication Agent installation

  4. for a Replica database server installation

  5. for a Primary database server installation


Answer: B D


QUESTION: 68

RSA Authentication Manager software AND the RSA SecurID Appliance BOTH allow the use of a separate, and standalone


  1. RADIUS server

  2. ORACLE database

  3. LDAP user data source

  4. Credential Manager server


Answer: C


QUESTION: 69

If an LDAP directory is arranged with the Organizational Units shown in the exhibit, how can two Authentication Manager Realms be structured such that Realm 1 contains the users in ou=B and Realm 2 contains the users in ou=C?


  1. Create an Identity Source for all ou=A users in the default SystemDomain realm then move the desired users to Realm 1 and Realm 2.

  2. Create an Identity Source for ou=B and associate it with Realm 1; create another Identity Source for ou=C and associate it with Realm 2.

  3. Create an Identity Source for all ou=A users, create separate Security Domains for ou=B and ou=C users,

    and associate each Security Domain with a realm.

  4. Create an Identity Source for ou=A and associate it with both Realm 1 and Realm 2 then filter each realm to include only the desired users for ou=B and ou=C .


Answer: B


QUESTION: 70

In a Primary/Replica environment, administrative changes can be made only on a server in the Primary instance.


  1. True

  2. False


Answer: A


QUESTION: 71

Which of the following statements is true regarding restriction of user access by time of day?


  1. Restricted times can only be set by using an Access Time template.

  2. Time restrictions are established according to user group membership.

  3. Fractional times zones can be selected for setting allowed access times.

  4. Time restrictions are enforced for both restricted and unrestricted Agents.


Answer: B