rsa 050 6201 archerasc01 practice test

Exam Title: RSA Archer Associate Exam

Last update: Nov 27 ,2025
Question 1

On which page can an administrator enable an option that will allow end users to make their own
personal dashboards?

  • A. Manage iViews
  • B. Manage Dashboards
  • C. Manage Workspaces
  • D. Manage Security Parameters
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

When building an application, why might you use a tab set?

  • A. To group related fields using custom HTML code
  • B. To better organize History Log data
  • C. To group related fields for administrative purposes only
  • D. To group related fields into logical arrangements
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

Why might creating role-based groups positively impact the end user experience when working with
user/groups lists?

  • A. It increases the complexity of key tasks
  • B. It eliminates the need to select relevant users individually
  • C. It eliminates the ability to synchronize with your LDAP server
  • D. It simplifies access control by enforcing the one-role, one-group rule
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

If a group is associated with an access role and the group contains sub-groups, how will the
associated access role affect the sub-groups?

  • A. The sub-groups will be inactivated.
  • B. The sub-groups will be removed from the group.
  • C. The sub-groups will be associated with the access role.
  • D. The sub-groups will not be associated with the access role.
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

What is the primary goal of Business Continuity or Disaster Recovery Plans?

  • A. To ensure that employees have a documented escape plan, should a disaster occur
  • B. To ensure that all relevant industry regulations are accounted for in the organization's business plan
  • C. To ensure that testing of plans is done at least annually in order to satisfy auditors
  • D. To ensure that if a crisis were to occur, critical business functions would continue to operate or would be recovered to an operational state within an acceptable amount of time
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

What is the first step in addressing the issue of Regulatory Compliance?

  • A. Identifying owners for regulation-related controls
  • B. Clearly and consistently documenting corporate policies, including mapping those policies to industry regulations
  • C. Implementing a policy lifecycle maintenance process
  • D. Testing corporate controls to identify current gaps in compliance
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

RSA Archer user cannot see an application that does exist within the system, what should the
administrator check first?

  • A. The administrator should verity the user has been assigned a role that grants access to the application
  • B. The administrator should verify the user has been granted access rights to Private fields within the application
  • C. The administrator should confirm the user is named within a Record Permissions field within the application
  • D. The administrator should verify the user belongs to at least one group
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Which of the following areas of capability are covered by IT Security Risk Management?

  • A. Establishing security policies and standards, testing Business Continuity Plans
  • B. Establishing business context for security, detecting and responding to attacks
  • C. Developing Plans of Action & Milestones, managing Crisis Events
  • D. Identifying and meeting regulatory obligations, defining and implementing policies and standards
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

Users can be granted access to record data at what three levels?

  • A. Field, Record, Application
  • B. Form, Page, Application
  • C. Field, Application, Workspace
  • D. Form, Page, Workspace
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

If a History Log field is deleted from an application, what will happen to the data stored within that
History Log field?

  • A. All data previously stored in that field is deleted.
  • B. All data previously stored in that field is still maintained by the database.
  • C. The user data stored within that field is saved, but all other data is deleted.
  • D. Nothing; it is not possible to delete a History Log field once it has been populated within a single record.
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 6
Viewing questions 1-10 out of 70
Go To
page 2