CertsChief Best IT Certification practice test material provider with thousands of professional it certification Exams, like as CompTIA, Microsoft, Vmware, IBM and more. CertsChief Pass Your Exam with 100% Guarantee with CertsChief Preparation Material. Please visit at: http://www.certschief.com
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
RSA Archer Certified Administrator 5.x Exam
Demo Product - For More Information - Visit:
Edition = DEMO
ProductFull Version Features:
90 Days Free Updates
30 Days Money Back Guarantee
Instant Download Once Purchased
24/7 Online Chat Support
Page | 1
If a History Log field is deleted from an application, what will happen to the data stored within that History Log field?
A. All data previously stored in that field is deleted.
B. All data previously stored in that field is still maintained by the database.
C. The user data stored within that field is saved, but all other data is deleted.
D. Nothing; it is not possible to delete a History Log field once it has been populated within a single record.
If an application has 10 fields, and a data import file contains values for 12 fields, what will happen with the
remaining 2 columns of data when a Data Import is performed?
A. The data in the two extra fields are merged into a single field in Archer.
B. The remaining two columns of data are ignored and not imported into Archer.
C. New fields will automatically be created to accommodate the two remaining columns of data.
D. The extra data will be imported into a text file that can later be attached to records in Archer.
Which of the following options is NOT available when performing a Data Import?
A. The user can specify the locale to be used for date fields.
B. The user can choose to ignore any invalid cross-references.
C. The user can specify the type of encoding used in the external file.
D. The user can filter out some of the data in order to import a subset of the data contained in the external file.
Which page allows end users to change their passwords?
A. Manage Users
B. View Your User Profile
C. View Your Login History
D. Update Your Workspace Display
Page | 2
Which of the following describes what must be performed before pasting non-English text into an RSA Archer
A. No additional tasks need to be performed.
B. The application must be set to "Production" status.
C. The user’s locale setting must match the language type.
D. The Spell Check option for the application must be disabled.
Which of the following is NOT an action type for a data-driven event?
A. Set Date
B. Generate Notification
C. Set Values List Items
D. Set Required Field Status
When importing data using the Data Import feature, which of the following options is a valid file type?
C. Microsoft Word
D. Flat, delimited-values data file
Which of the following statement is NOT true about solutions?
A. Solutions are groups of related applications.
B. A single application can be grouped into multiple solutions.
C. Deleting a solution also deletes the applications related to that solution.
D. A solution can be exported from an RSA Archer environment as part of a package.
Which of the following is NOT a category for RSA Archer field types?
Page | 3
Which of the following attributes CAN NOT be configured for a value within a Values List field?
B. Text color
C. Numeric value
D. Left/Right alignment
Which of the following access control elements CAN NOT be copied?
B. Security Parameters
C. Access Roles allowing application access
D. Access Roles allowing questionnaire access
On the Manage Users page, what can an administrator use to quickly locate information on an RSA Archer user with
the last name of "Jones?"
A. Help link
B. Column filter
C. User lookup field
D. Advanced Search page
Which of the following is NOT a required attribute for a user account?
A. User Name
B. Access Role
C. First and Last Name
D. Notification Subscriptions
Page | 4
Which of the following functions is NOT a use for Security Parameters?
A. Enforcing password change intervals
B. Specifying rules for password creation
C. Defining application-level access rights
D. Enforcing permitted session time frames
Page | 5
Demo Product - For More Information - Visit:
20% Discount Coupon Code:
Page | 6