Which of the following best describes an optimized state of operational processes, as related to the Operational Risk Management solution?
A.
Compliance efforts are reactive and just-in-time
B.
Resilient strategies adapt quickly to threats and disruptions
C.
Each control deficiency identified in loss event analyses and self-assessments is addressed
D.
Risk assessments and reporting are limited and inconsistent
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
The RSA Archer Public Sector solution helps organizations to reach compliance with which regulation?
A.
FOIA
B.
Gramm-Leach-Bliley Act
C.
ADA
D.
FISMA
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
How might you edit several records from a search results page?
A.
Update the Display Options to only include editable fields
B.
Update the searching filters to only include editable fields
C.
Select Enable Delete from the Options menu
D.
Select Enable Inline Edit from the Options menu
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
If an application has 10 fields, and a data import file contains values for 12 fields, what will happen with the remaining 2 columns of data when a Data Import is performed?
A.
New fields will automatically be created to accommodate the two remaining columns of data
B.
The extra data will be imported into a text file that can later be attached to records in Archer
C.
The remaining two columns of data are ignored and not imported into Archer
D.
The data in the two extra fields are merged into a single field in Archer
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
Which Data-Driven Event could be used to conditionally require a field?
A.
Apply conditional layout
B.
Filter values list
C.
Set values list
D.
Set conditional requirement
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
Which of the following will trigger a calculation?
A.
When a report is run
B.
When a record is opened
C.
When a user logs into the system, assuming the user has access to the application housing the calculation
D.
When a record is saved, assuming fields affecting the calculation have been edited
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
Which of the following application statuses will remove the application from view for all end users?
A.
Offline
B.
Retired
C.
Development
D.
Archived
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
Why is it important to track vendor relationships and behaviors?
A.
To establish and communicate security policies and standards
B.
To report on audit results in a consistent and timely manner
C.
To better scope and document your information security management system
D.
To understand the extent of an organizations dependency on third parties and how third party risks affect the organization
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
Beyond federal organizations, Public Sector might be an appropriate solution for which of the following?
A.
Only Federal organizations should implement Public Sector
B.
Any organization complying with NIST SP 800-53
C.
Any organization with vendors
D.
Any organization complying with SOX
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
Within RSA Archer, data is stored in the following nested sequence of items:
A.
Solution > Application > Record > Field
B.
Workspace > Dashboard > iView > Report
C.
Access role > Group > User Account > User
D.
User Account > Workspace > Solution > Application
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 11
On which page can an administrator enable an option that will allow end users to make their own personal dashboards?
A.
Manage iViews
B.
Manage Dashboards
C.
Manage Workspaces
D.
Manage Security Parameters
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 12
When building an application, why might you use a tab set?
A.
To group related fields using custom HTML code
B.
To better organize History Log data
C.
To group related fields for administrative purposes only
D.
To group related fields into logical arrangements
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 13
Why might creating role-based groups positively impact the end user experience when working with user/groups lists?
A.
It increases the complexity of key tasks
B.
It eliminates the need to select relevant users individually
C.
It eliminates the ability to synchronize with your LDAP server
D.
It simplifies access control by enforcing the one-role, one-group rule
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 14
If a group is associated with an access role and the group contains sub-groups, how will the associated access role affect the sub-groups?
A.
The sub-groups will be inactivated.
B.
The sub-groups will be removed from the group.
C.
The sub-groups will be associated with the access role.
D.
The sub-groups will not be associated with the access role.
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 15
What is the primary goal of Business Continuity or Disaster Recovery Plans?
A.
To ensure that employees have a documented escape plan, should a disaster occur
B.
To ensure that all relevant industry regulations are accounted for in the organization's business plan
C.
To ensure that testing of plans is done at least annually in order to satisfy auditors
D.
To ensure that if a crisis were to occur, critical business functions would continue to operate or would be recovered to an operational state within an acceptable amount of time