Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

ACCESS-DEF Sample Questions Answers

Questions 4

Within a Web App connector, which feature does an admin use to grant users access?

Options:

A.

Trust

B.

Workflow

C.

Provisioning

D.

Permissions

Buy Now
Questions 5

Which CyberArk Identity supported web standard is commonly used for enterprise Single Sign-On and issues XML tokens for authentication?

Options:

A.

SAML2.0

B.

QAuth

C.

RADIUS

D.

LDAP

Buy Now
Questions 6

Which CyberArk Identity service do you use to find a list of pre-built app connectors?

Options:

A.

AppCatalogue

B.

User Directory

C.

Reports

D.

CyberArk Identity Downloads

Buy Now
Questions 7

What should you do if you forget your CyberArk Authenticator PIN?

Options:

A.

Click on the Reset PIN code button.

B.

Submit a support case to request a new PIN.

C.

Contact the Administrator to unlock the CvberArk Authenticator.

D.

Reinstall CyberArk Authenticator on top of the existinginstallation.

Buy Now
Questions 8

Which HR system supports synchronization to both Active Directory and CyberArk Identity Cloud Directory?

Options:

A.

BambooHR

B.

Workday

C.

SAP SuccessFactors

D.

Prosoft HRMS (Unit4)

Buy Now
Questions 9

What does the CyberArk Identity App Gateway work with? (Choose three.)

Options:

A.

SAML-Compliant Apps

B.

WS-Fed Enabled Apps

C.

OIDC Web Apps

D.

Thick Client (non-web-based Apps)

E.

Terminal Services

F.

Telnet

Buy Now
Questions 10

You get the following error: "Not Authorized. You do not have permission to access this feature".

What is most likely the cause of the error?

Options:

A.

A user tried to sign in to the wrong identity tenant.

B.

A user tried to sign in before being created in Active Directory.

C.

A user gave someone else access to his/her laptop.

D.

A non-administrative user tried to access an administrative feature.

Buy Now
Questions 11

The Security Operation Team requested a report to show users who have logged in the last seven days.

Which report in the Builtin Reports Library should you use?

The Security Operation Team requested a report to show users who have logged in the last seven days.

Which report in the Builtin Reports Library should you use?

Options:

A.

Active Users

B.

MFA Summary

C.

Logins Map

D.

Top User Logins

Buy Now
Questions 12

CyberArk Identity has created a CLI integration with which vendor?

Options:

A.

Amazon Web Services

B.

Salesforce

C.

Microsoft

D.

Zoom

Buy Now
Questions 13

What is the most likely reason a CyberArk Identity admin would turn on the "Provisioning" feature within a Web App connector?

Options:

A.

to ensure users are automatically on-boarded and off-boarded in a third-party application

B.

to ensure users are provisioned with the appropriate devices when they start

C.

to ensure the web app appears in the users' CyberArk Identity portal when they first sign in

D.

to create an audit log of everytime users sign into the web app

Buy Now
Questions 14

As part of an ongoing incident investigation, you want to examine all data/events that are relevant to updating user profiles.

Which dataset from the UBA portal should you use?

Options:

A.

Behavior

B.

Configuration

C.

Application

D.

Access Control

Buy Now
Questions 15

Refer to the exhibit.

This exhibit shows the base authentication policy for ACME Corporation. You must edit the policy to allow users to authenticate once if they fulfill certain authentication criteria.

How should you configure this policy to support BOTH?

Options:

A.

Configure "Challenge Pass-Through Duration" to be "always".

B.

ConfigureFID02 authenticator as Challenge 1.

C.

ConfigureFID02 authenticator as Challenge 2.

D.

Configure QR Code as "Single Authentication Mechanism".

Buy Now
Questions 16

When a user enrolls a mobile device (iOS or Android) without enabling mobile device management, what happens? (Choose three.)

Options:

A.

The device is added to the Endpoints page in the Admin and User portals.

B.

The web applications assigned to the user are added to the Web Apps screen in the CyberArk Identity mobile app.

C.

The associated mobile applications are added and available for deployment automatically.

D.

The mobile device policies defined in the CyberArk Cloud Directory policy service policy set are installed.

E.

The device's model name, serial number. OS number, and Network Carrier information will be uploaded to the Identity portal.

F.

The mobile phone can now be used as a MFA Authentication Factor

Buy Now
Questions 17

When can 2FA/MFA be prompted? (Choose two.)

Options:

A.

when clicking on an app file while in the User Portal

B.

after clicking on the Forgot Your Password link

C.

when making changes to a policy while in the Admin Portal

D.

when exporting a compliance report while in the Admin Portal

E.

when adding a newwebapp

Buy Now
Questions 18

Which protocols can CyberArk provide MFA for VPN? (Choose two.)

Options:

A.

SAML

B.

RADIUS

C.

IMAP

D.

TACACS

E.

LDAP

Buy Now
Questions 19

An organization previously allowed users to add their personal apps on the Identity User Portal. This will soon be disabled due to policy changes.

What is the impact to the users for personal apps previously added to the User Portal?

Options:

A.

They will continue to function normally; however, users cannot add new apps.

B.

They will continue to display on the Apps screen and user devices; however, they will be greyed out and unavailable for any form of interaction.

C.

They will be deleted from the Apps screen and user devices.

D.

They will continue to display on the Apps screen and user devices; however, an error message will display when users try to open the application.

Buy Now
Exam Code: ACCESS-DEF
Exam Name: CyberArk Defender Access (ACC-DEF)
Last Update: Apr 27, 2024
Questions: 64
$64  $159.99
$48  $119.99
$40  $99.99
buy now ACCESS-DEF