New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ACCESS-DEF Questions and Answers

Question # 6

Which risk factors contribute to the user behavior risk score? (Choose two.)

A.

operating system

B.

geolocation

C.

device certificate

D.

session cookie

E.

AD joined status of device

Full Access
Question # 7

When logging on to the User Portal, which authentication methods can enable the user to bypass authentication rules and default profile? (Choose two.)

A.

Certification-Based Authentication (CBA)

B.

Integrated Windows Authentication (IWA)

C.

QR Code Authentication

D.

FIDO2 Authentication

E.

RADIUS Authentication

Full Access
Question # 8

For each option listed, identify if it is a CyberArk Identity connector function.

Full Access
Question # 9

Refer to the exhibit.

This exhibit shows the base authentication policy for ACME Corporation. You must edit the policy to allow users to authenticate once if they fulfill certain authentication criteria.

How should you configure this policy to support BOTH?

A.

Configure "Challenge Pass-Through Duration" to be "always".

B.

ConfigureFID02 authenticator as Challenge 1.

C.

ConfigureFID02 authenticator as Challenge 2.

D.

Configure QR Code as "Single Authentication Mechanism".

Full Access
Question # 10

Which statement is true about the app gateway?

A.

For applications that use the App Gateway, the connection from the user travels the same network pathways you already have and CyberArk Identity connects to the CyberArk Identity Connector through the firewall.

B.

For applications that use the App Gateway, the connection from the user travels different network pathways and CyberArk Identity connects to the CyberArk Identity Connector through a separate connection from the firewall.

C.

On the App Gateway page, you can configure the application to enable users to access it if they are logging in from an external location.

D.

App gateway supports on-premises apps and web applications running on HTTPS only.

Full Access
Question # 11

CyberArk Identity has created a CLI integration with which vendor?

A.

Amazon Web Services

B.

Salesforce

C.

Microsoft

D.

Zoom

Full Access
Question # 12

What does enabling "Workflow" allow within an app connector?

A.

ability to enable approval workflows for a user request to access the app

B.

ability for workflows to link one app with another app

C.

ability for a workflow to create, update, and delete users within a 3rd party app

D.

workflows that automatically notify admins when a user logs in to the app

Full Access
Question # 13

Refer to the exhibit.

Which statements are correct regarding this Authentication Policy? (Choose two.)

A.

Users will still be asked for their MFA even if they mistyped their username.

B.

If users have set up CyberArk Mobile Authenticator as an MFA, they will still receive the Push Notification to confirm the request even if they mistyped their password.

C.

Users will not be notified which challenge they failed if their login attempt failed.

D.

If users have set up a Security Question as an MFA, the Security Question will not be displayed to the user to answer even if they mistyped their password.

E.

If the first factor is password and the user is an Active Directory user and the Active Directory is unavailable, this setting does not matter because the user will not be able to authenticate through Active Directory credentials and will see the message "Active Directory not available".

Full Access
Question # 14

Which CyberArk Identity service do you use to find a list of pre-built app connectors?

A.

AppCatalogue

B.

User Directory

C.

Reports

D.

CyberArk Identity Downloads

Full Access
Question # 15

Match each User Portal tab to the correct description.

Full Access
Question # 16

Refer to the exhibit.

Which statement is correct about this configuration shown?

A.

Users are allowed to answer security questions as part of the multi-factor authentication process.

B.

There is no requirement to configure at least one user-defined question.

C.

You can choose to answer at least one admin-defined question.

D.

It is optional to keep the minimum number of characters required in answers to three.

Full Access
Question # 17

Which browsers are supported for the "Land and Catch" feature? (Choose three.)

A.

Google Chrome

B.

Apple Safari

C.

[Microsoft Internet Explorer

D.

Firefox

E.

Microsoft Edge

F.

Opera

Full Access
Question # 18

As part of an ongoing incident investigation, you want to examine all data/events that are relevant to updating user profiles.

Which dataset from the UBA portal should you use?

A.

Behavior

B.

Configuration

C.

Application

D.

Access Control

Full Access
Question # 19

CyberArk Identity's App Gateway can be used to protect and access which option?

A.

on-premises Oracle web app

B.

cloud-hosted Salesforce environment

C.

a corporate laptop

D.

a web browser

Full Access