Bullseye Flashcards
- Which of the following options will allow a field to be displayed in search results, but not be selected by default?
A. Unique
B. Search Results
C. Auditing Information
D. Search Default Field
B. Search Results
- Why might you designate certain fields as required fields?
A. To ensure values are added to those fields before the record is initially saved
B. To allow users to opt out of those fields
C. To ensure those fields appear by default in search results
D. To ensure values in those fields serve as hyperlinks into the record
A. To ensure values are added to those fields before the record is initially saved
- Which of the following steps would be the best approach for temporarily stopping a subscription notification from sending email notifications?
A. Delete the subscription notification
B. Inactivate the subscription notification
C. Delete the application associated with the subscription notification
D. Disable notifications for the application associated with the subscription notification
B. Inactivate the subscription notification
- Events can be used to trigger a number of different layout effects, based on a user’s interaction with other fields in the application. Which of the following actions CANNOT be triggered by an Event?
A. Delete a record
B. Generate an email notification
C. Make a field conditionally required
D. Populate a values list with a selected value
A. Delete a record
- The RSA Archer Public Sector solution helps organizations to reach compliance with which regulation?
A. FOIA
B. Gramm-Leach-Bliley Act
C. ADA
D. FISMA
D. FISMA
- In what way can Issues Management act as a foundation for other Archer solutions?
A. Baseline issues provide a basic understanding of business and IT infrastructure
B. Issues logged by a variety of groups provide a partial inventory of software applications, acting as a foundation for other inventories
C. Issues generated by several groups can be handled in Issues Management, including audit and risk and compliance
D. Issues Management helps to decentralize risk at a high level
C. Issues generated by several groups can be handled in Issues Management, including audit and risk and compliance
- What is the first step in addressing the issue of Regulatory Compliance?
A. Identifying owners for regulation-related controls
B. Clearly and consistently documenting corporate policies, including mapping those policies to industry regulations
C. Implementing a policy lifecycle maintenance process
D. Testing corporate controls to identify current gaps in compliance
B. Clearly and consistently documenting corporate policies, including mapping those policies to industry regulations
- Which of the following is true about Security Parameters?
A. A Security Parameter cannot be assigned by default
B. A user can only be assigned one Security Parameter
C. Only Application Owners can be assigned a Security Parameter
D. A user can be assigned up to three Security Parameters
B. A user can only be assigned one Security Parameter
- A RSA Archer user cannot see an application that does exist within the system. What should the administrator check first?
A. The administrator should verify the user has been assigned a role that grants access to the application
B. The administrator should verify the user has been granted access rights to Private fields within the application
C. The administrator should confirm the user is named within a Record Permissions field within the application
D. The administrator should verify the user belongs to at least one group
A. The administrator should verify the user has been assigned a role that grants access to the application
- Which of the following best describes RSA Archer?
A. RSA Archer is a platform which allows you to adapt solutions to specific requirements and build new applications without touching code
B. RSA Archer is a software solution which requires you to hard code changes to out-of-the-box solution functionality
C. RSA Archer is a platform which allows you to adapt solutions by hard coding new features into the program
D. RSA Archer is a software solution best used for Audit and Operational Risk Management
A. RSA Archer is a platform which allows you to adapt solutions to specific requirements and build new applications without touching code
- Which of the following list of frequencies contains correct options for subscription notifications?
A. Hourly, Daily, Weekly, Monthly
B. Daily, Weekly, Monthly, Quarterly
C. Weekly, Monthly, Quarterly, Annually
D. Minutely, Hourly, Daily, Weekly
B. Daily, Weekly, Monthly, Quarterly
- Which Data-Driven Event could be used to conditionally require a field?
A. Apply conditional layout
B. Filter values list
C. Set values list
D. Set conditional requirement
A. Apply conditional layout
- When building an application, why might you use a tab set?
A. To group related fields using custom HTML code
B. To better organize History Log data
C. To group related fields for administrative purposes only
D. To group related fields into logical arrangements
C. To group related fields for administrative purposes only
- How are Personal Reports different from Global Reports?
A. Personal Reports can only be created by System Administrators, Application Owners, and Report Administrators
B. Personal Reports are the reports available on public Dashboards
C. Personal Reports are the only report type that can be emailed to a non-Archer user
D. Personal Reports can be created by anyone and are only accessible by the user who created them
D. Personal Reports can be created by anyone and are only accessible by the user who created them
- Why is it important that users be able to interact with fields that are being evaluated by a rule within Events?
A. Only fields that all users can see can be evaluated within a rule.
B. This is a non-issue, as only administrators are able to configure events.
C. If a user cannot interact with an evaluated field, he cannot trigger the action included in an event.
D. If a user cannot interact with all fields, he cannot save the record, and therefore, cannot trigger calculations.
C. If a user cannot interact with an evaluated field, he cannot trigger the action included in an event.
- Which of the following Audit Management components would be used to group areas of the business identified for an annual audit?
A. Audit Assessments
B. Audit Plans
C. Audit Engagements
D. Audit Entities
D. Audit Entities
- Why are Business Resiliency plans and programs recognized as mission-critical?
A. Business Resiliency programs reduce the risk from exposure to third-party suppliers
B. Policies change too often for Business Process Owners to maintain
C. Business Continuity Plans are the only way to harness risk
D. Organizational revenue and reputation depend on the availability of services, business processes, and technologies
D. Organizational revenue and reputation depend on the availability of services, business processes, and technologies
- Which of the following application statuses will remove the application from view for all end users?
A. Offline
B. Retired
C. Development
D. Archived
B. Retired
- Users can be granted access to record data at what three levels?
A. Field, Record, Application
B. Form, Page, Application
C. Field, Application, Workspace
D. Form, Page, Workspace
A. Field, Record, Application
- In order to create a chart using the Advanced Search functionality, what must a user first do?
A. Enter at least one keyword to be used to group the dataset into chartable groups.
B. Configure a filter to be used that will bring back only a subset of the overall data set.
C. Select the Charting search results format to be used in the Display Options section.
D. Select the Statistics Mode checkbox at the bottom of the Fields to Display section.
D. Select the Statistics Mode checkbox at the bottom of the Fields to Display section.
- If a History Log field is deleted from an application, what will happen to the data stored within that History Log field?
A. All data previously stored in that field is deleted.
B. All data previously stored in that field is still maintained by the database.
C. The user data stored within that field is saved, but all other data is deleted.
D. Nothing; it is not possible to delete a History Log field once it has been populated within a single record.
A. All data previously stored in that field is deleted.
- If you have multiple searching relationships in your search, which search results format is best for a non-grouped format?
A. Row
B. Summary
C. Column - Flat
D. Column - Hierarchical
C. Column - Flat
- Which of the following is true about Application Owners?
A. They can delete a Solution.
B. They can add new user accounts to the platform.
C. They can see all records within their assigned applications.
D. They can see all records in all applications across the system.
C. They can see all records within their assigned applications.
- Which of the following best describes an optimized state of operational processes, as related to the Operational Risk Management solution?
A. Compliance efforts are reactive and just-in-time
B. Resilient strategies adapt quickly to threats and disruptions
C. Each control deficiency identified in loss event analyses and self-assessments is addressed
D. Risk assessments and reporting are limited and inconsistent
C. Each control deficiency identified in loss event analyses and self-assessments is addressed
- Which one of the following statements about key fields in RSA Archer is true?
A. Key fields must be unique.
B. Any field can be configured to be a key field.
C. Applications can have an unlimited number of key fields.
D. Key fields are displayed as a hyperlink to the record within search results.
D. Key fields are displayed as a hyperlink to the record within search results
- Which is true about Advanced Workflow?
A. It completely eliminates the need for data-driven events
B. It should only be used for self-assessments
C. It limits the capabilities of calculated fields
D. It leverages data-driven events, calculations, and email notifications
D. It leverages data-driven events, calculations, and email notifications
- What does Archer use to match components, e.g. applications and fields, between two instances during the packaging process?
A. System IDs
B. GUIDs (Globally Unique Identifiers)
C. Key Fields
D. Tracking IDs
B. GUIDs (Globally Unique Identifiers)
- If an organization had an XML file from a single, consistent location to import monthly, which of the following would you recommend?
A. Data Transformation Manager
B. Data Import Manager
C. Data Retrieval Manager
D. Data Feed Manager
D. Data Feed Manager