rsa 050 6201 archerasc01 practice test

RSA Archer Associate Exam

Last exam update: Nov 28 ,2025
Page 1 out of 5. Viewing questions 1-15 out of 70

Question 1

Which of the following best describes an optimized state of operational processes, as related to the
Operational Risk Management solution?

  • A. Compliance efforts are reactive and just-in-time
  • B. Resilient strategies adapt quickly to threats and disruptions
  • C. Each control deficiency identified in loss event analyses and self-assessments is addressed
  • D. Risk assessments and reporting are limited and inconsistent
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

The RSA Archer Public Sector solution helps organizations to reach compliance with which
regulation?

  • A. FOIA
  • B. Gramm-Leach-Bliley Act
  • C. ADA
  • D. FISMA
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

How might you edit several records from a search results page?

  • A. Update the Display Options to only include editable fields
  • B. Update the searching filters to only include editable fields
  • C. Select Enable Delete from the Options menu
  • D. Select Enable Inline Edit from the Options menu
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

If an application has 10 fields, and a data import file contains values for 12 fields, what will happen
with the remaining 2 columns of data when a Data Import is performed?

  • A. New fields will automatically be created to accommodate the two remaining columns of data
  • B. The extra data will be imported into a text file that can later be attached to records in Archer
  • C. The remaining two columns of data are ignored and not imported into Archer
  • D. The data in the two extra fields are merged into a single field in Archer
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Which Data-Driven Event could be used to conditionally require a field?

  • A. Apply conditional layout
  • B. Filter values list
  • C. Set values list
  • D. Set conditional requirement
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following will trigger a calculation?

  • A. When a report is run
  • B. When a record is opened
  • C. When a user logs into the system, assuming the user has access to the application housing the calculation
  • D. When a record is saved, assuming fields affecting the calculation have been edited
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which of the following application statuses will remove the application from view for all end users?

  • A. Offline
  • B. Retired
  • C. Development
  • D. Archived
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Why is it important to track vendor relationships and behaviors?

  • A. To establish and communicate security policies and standards
  • B. To report on audit results in a consistent and timely manner
  • C. To better scope and document your information security management system
  • D. To understand the extent of an organizations dependency on third parties and how third party risks affect the organization
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Beyond federal organizations, Public Sector might be an appropriate solution for which of the
following?

  • A. Only Federal organizations should implement Public Sector
  • B. Any organization complying with NIST SP 800-53
  • C. Any organization with vendors
  • D. Any organization complying with SOX
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Within RSA Archer, data is stored in the following nested sequence of items:

  • A. Solution > Application > Record > Field
  • B. Workspace > Dashboard > iView > Report
  • C. Access role > Group > User Account > User
  • D. User Account > Workspace > Solution > Application
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

On which page can an administrator enable an option that will allow end users to make their own
personal dashboards?

  • A. Manage iViews
  • B. Manage Dashboards
  • C. Manage Workspaces
  • D. Manage Security Parameters
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

When building an application, why might you use a tab set?

  • A. To group related fields using custom HTML code
  • B. To better organize History Log data
  • C. To group related fields for administrative purposes only
  • D. To group related fields into logical arrangements
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Why might creating role-based groups positively impact the end user experience when working with
user/groups lists?

  • A. It increases the complexity of key tasks
  • B. It eliminates the need to select relevant users individually
  • C. It eliminates the ability to synchronize with your LDAP server
  • D. It simplifies access control by enforcing the one-role, one-group rule
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

If a group is associated with an access role and the group contains sub-groups, how will the
associated access role affect the sub-groups?

  • A. The sub-groups will be inactivated.
  • B. The sub-groups will be removed from the group.
  • C. The sub-groups will be associated with the access role.
  • D. The sub-groups will not be associated with the access role.
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

What is the primary goal of Business Continuity or Disaster Recovery Plans?

  • A. To ensure that employees have a documented escape plan, should a disaster occur
  • B. To ensure that all relevant industry regulations are accounted for in the organization's business plan
  • C. To ensure that testing of plans is done at least annually in order to satisfy auditors
  • D. To ensure that if a crisis were to occur, critical business functions would continue to operate or would be recovered to an operational state within an acceptable amount of time
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2