Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

CyberArk ACCESS-DEF Dumps

Page: 1 / 6
Total 64 questions

CyberArk Defender Access (ACC-DEF) Questions and Answers

Question 1

Your organization wants to implement passwordless authentication for business critical web applications. CyberArk Identity manages access to these applications.

What can you do to facilitate the enforcement of this passwordless authentication initiative? (Choose two.)

Options:

A.

Configure a certificate-based authentication policy in CyberArk Identity that only allows access to CyberArk Identity or the business critical web applications.

B.

Send an email to the affected users and get them to renew their authentication token(s).

C.

Roll out the CyberArk Windows Cloud Agent to the affected endpoints.

D.

Refresh the endpoint operating system and define the new authentication method.

E.

Roll out Secure Web Sessions to the applicable users.

Question 2

You get the following error: "Not Authorized. You do not have permission to access this feature".

What is most likely the cause of the error?

Options:

A.

A user tried to sign in to the wrong identity tenant.

B.

A user tried to sign in before being created in Active Directory.

C.

A user gave someone else access to his/her laptop.

D.

A non-administrative user tried to access an administrative feature.

Question 3

A customer's IT admin asks you to disable CyberArk Identity Connector auto-update software options.

Which statement is correct?

Options:

A.

Submit a support ticket to the CyberArk support team and ask them to disable the CyberArk Connector auto-update software remotely

B.

Identity does not allow you to disable the Connector software auto-update.

C.

The Connector software auto-update can bedisabled on the CyberArk Identity Connector server under the configuration window.

D.

You can disable the Connector software auto-update on CyberArk Identity SaaS Admin Portal under Settings -> Network -> CyberArk Identity Connectors.

Question 4

When a user enrolls a mobile device (iOS or Android) without enabling mobile device management, what happens? (Choose three.)

Options:

A.

The device is added to the Endpoints page in the Admin and User portals.

B.

The web applications assigned to the user are added to the Web Apps screen in the CyberArk Identity mobile app.

C.

The associated mobile applications are added and available for deployment automatically.

D.

The mobile device policies defined in the CyberArk Cloud Directory policy service policy set are installed.

E.

The device's model name, serial number. OS number, and Network Carrier information will be uploaded to the Identity portal.

F.

The mobile phone can now be used as a MFA Authentication Factor

Question 5

Which predefined roles does CyberArk Identity provide?

Options:

A.

System Administrator and Everybody

B.

Manage Users and Everybody

C.

System Administrator and Business Users

D.

Manage Users and Business Users

Question 6

For each statement listed, indicate if it may be a potential cause of this problem.

as

Options:

Question 7

When logging on to the User Portal, which authentication methods can enable the user to bypass authentication rules and default profile? (Choose two.)

Options:

A.

Certification-Based Authentication (CBA)

B.

Integrated Windows Authentication (IWA)

C.

QR Code Authentication

D.

FIDO2 Authentication

E.

RADIUS Authentication

Question 8

Which statement is true about the app gateway?

Options:

A.

For applications that use the App Gateway, the connection from the user travels the same network pathways you already have and CyberArk Identity connects to the CyberArk Identity Connector through the firewall.

B.

For applications that use the App Gateway, the connection from the user travels different network pathways and CyberArk Identity connects to the CyberArk Identity Connector through a separate connection from the firewall.

C.

On the App Gateway page, you can configure the application to enable users to access it if they are logging in from an external location.

D.

App gateway supports on-premises apps and web applications running on HTTPS only.

Question 9

On which operating systems can the CyberArk Authenticator desktop application be installed? (Choose two.)

Options:

A.

OS

B.

Windows 10

C.

Ubuntu

D.

MacOS

E.

Android

Question 10

Which administrative right is required to manually start a provisioning synchronization job?

Options:

A.

Application Management

B.

User Management

C.

System Enrollment

D.

Register and Administer connectors

Question 11

Match each Web App Connector to the phrase that best describes its service offering.

as

Options:

Question 12

You want to find all events related to the user with the login ID of "ivan.helen@acme".

Which filter do you enter into the UBA portal data explorer?

Options:

A.

user_id = 'ivan.helen@acme'

B.

user_name = 'ivan.helen@acme'

C.

event_user = 'ivan.helen@acme'

D.

entity_name = 'ivan.helen@acme'

Question 13

What is considered an "Identity Provider Initiated" login to an application?

Options:

A.

After signingin to the CyberArk Identity portal, a userlaunches a SAML app by clickingan apptile.

B.

After visitinga third-party web app, a user is redirected to CyberArk Identity for authentication.

C.

A user visits a third party web appdirectly and signs in with local credentials.

D.

A user signs in to the CyberArk Identity portal and takes a screenshot of the portal to send to IT.

Question 14

Refer to the exhibit.

Within the "Allow user notifications on multiple devices", if you leave the setting as Default (--), what happens if a user triggers a MFA Push notification and has enrolled three different devices?

as

Options:

A.

The push notification will be sent to none of the enrolled devices.

B.

The push notification will be sent to the first enrolled device only.

C.

The push notification will be sent to all enrolled devices.

D.

The push notification will be sent to the last enrolled device only.

Question 15

ACME Corporation employees access critical business web applications through CyberArk Identity. You notice a constant high volume of unauthorized traffic from 103.1.200.0/24 trying to gain access to the CyberArk Identity portal. Access to the CyberArk Identity portal is time sensitive. ACME decides to enforce IP restrictions to reduce vulnerability.

Which configuration can help achieve this?

Options:

A.

Loginin to the CyberArk Identity Admin portal and define the IP range of 103 1 200 0/24 into the ACME Corporation IP range.

B.

Login to the CyberArk Identity Admin portal and define the IP range of 103 1 200 0/24 into the blocked IP range.

C.

Implement device trust through the Windows Cloud Agent.

D.

Implement zero trust through the AppGateway.

Question 16

Which settings can help minimize the number of 2FA / MFA prompts? (Choose two.)

Options:

A.

Challenge Pass-Through Duration

B.

RADIUS Connections

C.

OATH OTP

D.

IP Address filter

E.

Port mapping

Question 17

Refer to the exhibit.

If an Authentication Policy is configured as shown in the exhibit, which statement is correct?

as

Options:

A.

The Initial MFA challenge will be sent to the account in CyberArk Cloud Directory (Tarqet).

B.

Upon successful logon, the user will be logged in as the account in CyberArJS Cloud Directory (Target).

C.

Future MFA challenges will be sent to the account in AD (Source).

D.

If there is no matching email between two accounts in AD (Source) and CyberArtCloud Directory (Target), the mapping will then look for a matching User ID.

Question 18

Which 2FA/MFA options can fulfill the "Something you are" requirement? (Choose two.)

Options:

A.

email

B.

CyberArk Identity mobile app

C.

F1D02

D.

phone call

E.

security questions

Question 19

Refer to the exhibit.

This exhibit shows the base authentication policy for ACME Corporation. You must edit the policy to allow users to authenticate once if they fulfill certain authentication criteria.

How should you configure this policy to support BOTH?

as

Options:

A.

Configure "Challenge Pass-Through Duration" to be "always".

B.

ConfigureFID02 authenticator as Challenge 1.

C.

ConfigureFID02 authenticator as Challenge 2.

D.

Configure QR Code as "Single Authentication Mechanism".

Page: 1 / 6
Total 64 questions