Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

ACCESS-DEF CyberArk Defender Access Questions and Answers

Questions 4

Refer to the exhibit.

Which statement is correct about this configuration shown?

Options:

A.

Users are allowed to answer security questions as part of the multi-factor authentication process.

B.

There is no requirement to configure at least one user-defined question.

C.

You can choose to answer at least one admin-defined question.

D.

It is optional to keep the minimum number of characters required in answers to three.

Buy Now
Questions 5

Which settings can help minimize the number of 2FA / MFA prompts? (Choose two.)

Options:

A.

Challenge Pass-Through Duration

B.

RADIUS Connections

C.

OATH OTP

D.

IP Address filter

E.

Port mapping

Buy Now
Questions 6

Which statement is true about the app gateway?

Options:

A.

For applications that use the App Gateway, the connection from the user travels the same network pathways you already have and CyberArk Identity connects to the CyberArk Identity Connector through the firewall.

B.

For applications that use the App Gateway, the connection from the user travels different network pathways and CyberArk Identity connects to the CyberArk Identity Connector through a separate connection from the firewall.

C.

On the App Gateway page, you can configure the application to enable users to access it if they are logging in from an external location.

D.

App gateway supports on-premises apps and web applications running on HTTPS only.

Buy Now
Questions 7

Cindy just joined a company's IT Audit Department and needs CyberArk Identity access to perform her daily job activities.

Which administrative right(s) should she be assigned to match her job requirement?

Options:

A.

Everybody + IT Admin + Auditor

B.

Everybody + IT Admin

C.

Everybody

D.

Everybody + Auditor

Buy Now
Questions 8

A user wants to install the CyberArk Identity mobile app by using a QR code.

Arrange the steps to do this in the correct sequence.

Options:

Buy Now
Questions 9

Which risk factors contribute to the user behavior risk score? (Choose two.)

Options:

A.

operating system

B.

geolocation

C.

device certificate

D.

session cookie

E.

AD joined status of device

Buy Now
Questions 10

Which 2FA/MFA options can fulfill the "Something you are" requirement? (Choose two.)

Options:

A.

email

B.

CyberArk Identity mobile app

C.

F1D02

D.

phone call

E.

security questions

Buy Now
Questions 11

Your team is deploying endpoint authentication onto the corporate endpoints within an organization. Enrollment details include when the enrollment must be completed, and the enrollment code was sent out to the users. Enrollment can be performed in the office or remotely (without the assistance of an IT support engineer). You received feedback that many users are unable to enroll into the system using the enrollment code.

What can you do to resolve this? (Choose two.)

Options:

A.

Set maximum number of joinable endpointsto "unlimited".

B.

Set Expiry Date to "Never".

C.

Set the IP Address range to the user's" home network range.

D.

Set a description within the enrollment code.

E.

Reinstall Windows Device Trust.

Buy Now
Questions 12

You get the following error: "Not Authorized. You do not have permission to access this feature".

What is most likely the cause of the error?

Options:

A.

A user tried to sign in to the wrong identity tenant.

B.

A user tried to sign in before being created in Active Directory.

C.

A user gave someone else access to his/her laptop.

D.

A non-administrative user tried to access an administrative feature.

Buy Now
Questions 13

An organization previously allowed users to add their personal apps on the Identity User Portal. This will soon be disabled due to policy changes.

What is the impact to the users for personal apps previously added to the User Portal?

Options:

A.

They will continue to function normally; however, users cannot add new apps.

B.

They will continue to display on the Apps screen and user devices; however, they will be greyed out and unavailable for any form of interaction.

C.

They will be deleted from the Apps screen and user devices.

D.

They will continue to display on the Apps screen and user devices; however, an error message will display when users try to open the application.

Buy Now
Questions 14

What does the CyberArk Identity App Gateway work with? (Choose three.)

Options:

A.

SAML-Compliant Apps

B.

WS-Fed Enabled Apps

C.

OIDC Web Apps

D.

Thick Client (non-web-based Apps)

E.

Terminal Services

F.

Telnet

Buy Now
Questions 15

Match each Web App Connector to the phrase that best describes its service offering.

Options:

Buy Now
Questions 16

As part of an ongoing incident investigation, you want to examine all data/events that are relevant to updating user profiles.

Which dataset from the UBA portal should you use?

Options:

A.

Behavior

B.

Configuration

C.

Application

D.

Access Control

Buy Now
Questions 17

What does enabling "Workflow" allow within an app connector?

Options:

A.

ability to enable approval workflows for a user request to access the app

B.

ability for workflows to link one app with another app

C.

ability for a workflow to create, update, and delete users within a 3rd party app

D.

workflows that automatically notify admins when a user logs in to the app

Buy Now
Questions 18

When logging on to the User Portal, which authentication methods can enable the user to bypass authentication rules and default profile? (Choose two.)

Options:

A.

Certification-Based Authentication (CBA)

B.

Integrated Windows Authentication (IWA)

C.

QR Code Authentication

D.

FIDO2 Authentication

E.

RADIUS Authentication

Buy Now
Questions 19

Your organization wants to implement passwordless authentication for business critical web applications. CyberArk Identity manages access to these applications.

What can you do to facilitate the enforcement of this passwordless authentication initiative? (Choose two.)

Options:

A.

Configure a certificate-based authentication policy in CyberArk Identity that only allows access to CyberArk Identity or the business critical web applications.

B.

Send an email to the affected users and get them to renew their authentication token(s).

C.

Roll out the CyberArk Windows Cloud Agent to the affected endpoints.

D.

Refresh the endpoint operating system and define the new authentication method.

E.

Roll out Secure Web Sessions to the applicable users.

Buy Now
Exam Code: ACCESS-DEF
Exam Name: CyberArk Defender Access
Last Update: May 2, 2024
Questions: 64
ACCESS-DEF pdf

ACCESS-DEF PDF

$28  $80
ACCESS-DEF Engine

ACCESS-DEF Testing Engine

$33.25  $95
ACCESS-DEF PDF + Engine

ACCESS-DEF PDF + Testing Engine

$45.5  $130