New Year Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CyberArk ACCESS-DEF CyberArk Defender Access (ACC-DEF) Exam Practice Test

Page: 1 / 6
Total 64 questions

CyberArk Defender Access (ACC-DEF) Questions and Answers

Question 1

Which protocols can CyberArk provide MFA for VPN? (Choose two.)

Options:

A.

SAML

B.

RADIUS

C.

IMAP

D.

TACACS

E.

LDAP

Question 2

You get the following error: "Not Authorized. You do not have permission to access this feature".

What is most likely the cause of the error?

Options:

A.

A user tried to sign in to the wrong identity tenant.

B.

A user tried to sign in before being created in Active Directory.

C.

A user gave someone else access to his/her laptop.

D.

A non-administrative user tried to access an administrative feature.

Question 3

When can 2FA/MFA be prompted? (Choose two.)

Options:

A.

when clicking on an app file while in the User Portal

B.

after clicking on the Forgot Your Password link

C.

when making changes to a policy while in the Admin Portal

D.

when exporting a compliance report while in the Admin Portal

E.

when adding a newwebapp

Question 4

Admins can enable self-service for users to unlock their accounts. There are four options under the Admin Portal Core Services > Policies > User Security Policies > Self Service > Account Unlock options.

Match each option to the correct description.

Question # 4

Options:

Question 5

Your organization wants to implement passwordless authentication for business critical web applications. CyberArk Identity manages access to these applications.

What can you do to facilitate the enforcement of this passwordless authentication initiative? (Choose two.)

Options:

A.

Configure a certificate-based authentication policy in CyberArk Identity that only allows access to CyberArk Identity or the business critical web applications.

B.

Send an email to the affected users and get them to renew their authentication token(s).

C.

Roll out the CyberArk Windows Cloud Agent to the affected endpoints.

D.

Refresh the endpoint operating system and define the new authentication method.

E.

Roll out Secure Web Sessions to the applicable users.

Question 6

Which dashboard can display the applications launched by users, the application type, and the number of times they were launched?

Options:

A.

Admin Portal: Applications Dashboard

B.

User Portal: Activity

C.

Admin Portal: Overview Dashboard

D.

User Behavioral Analytics Portal: Insights Application User Login Summary Dashboard

Question 7

Which options are available with Self-Service Password Reset? (Choose three.)

Options:

A.

Enable users with Active Directory accounts who have forgotten their password to log in and reset it.

B.

Perform Self-Service Password Reset for the Organization's corporate accounts, suchas Twitter, Facebook, or Instagram.

C.

Users must log in after a password reset.

D.

A maximum number of times can be specified that users can reset their password within a specific timeframe.

E.

Users must respond to a CAPTCHA before resettingtheir password.

F.

Use Helpdesk Caller Identity (Identity Verification) to confirm user identity.

Question 8

Which device enrollment settings are valid? (Choose two.)

Options:

A.

Send notification on device enrollment

B.

Enable invite based enrollment

C.

Minimum number of devices a user can enroll

D.

Reassign the device to another user

E.

E.Permanently delete device

Question 9

CyberArk Identity has created a CLI integration with which vendor?

Options:

A.

Amazon Web Services

B.

Salesforce

C.

Microsoft

D.

Zoom

Question 10

Where can you download the CyberArk Identity mobile app? (Choose two.)

Options:

A.

Download section of the Admin Portal

B.

Support portal

C.

Apple Agp Store

D.

email attachment

E.

Google Play Store

Question 11

As part of an ongoing incident investigation, you want to examine all data/events that are relevant to updating user profiles.

Which dataset from the UBA portal should you use?

Options:

A.

Behavior

B.

Configuration

C.

Application

D.

Access Control

Question 12

Refer to the exhibit.

Which statements are correct regarding this Authentication Policy? (Choose two.)

Question # 12

Options:

A.

Users will still be asked for their MFA even if they mistyped their username.

B.

If users have set up CyberArk Mobile Authenticator as an MFA, they will still receive the Push Notification to confirm the request even if they mistyped their password.

C.

Users will not be notified which challenge they failed if their login attempt failed.

D.

If users have set up a Security Question as an MFA, the Security Question will not be displayed to the user to answer even if they mistyped their password.

E.

If the first factor is password and the user is an Active Directory user and the Active Directory is unavailable, this setting does not matter because the user will not be able to authenticate through Active Directory credentials and will see the message "Active Directory not available".

Question 13

Which browsers are supported for the "Land and Catch" feature? (Choose three.)

Options:

A.

Google Chrome

B.

Apple Safari

C.

[Microsoft Internet Explorer

D.

Firefox

E.

Microsoft Edge

F.

Opera

Question 14

Cindy just joined a company's IT Audit Department and needs CyberArk Identity access to perform her daily job activities.

Which administrative right(s) should she be assigned to match her job requirement?

Options:

A.

Everybody + IT Admin + Auditor

B.

Everybody + IT Admin

C.

Everybody

D.

Everybody + Auditor

Question 15

Match each User Portal tab to the correct description.

Question # 15

Options:

Question 16

Your organization wants to limit access to the CyberArk Identity user portal to only corporate issued domain-joined laptops without the use of a VPN.

How can you achieve this?

Options:

A.

Use the Windows Device Trust agent with certificate-based authentication.

B.

Use the Windows Cloud Agent and CyberArk Identity Connector with Integrated Windows Authentication

C.

Define a range of internal corporate IP addresses and use them to restrict access.

D.

'Use the CyberArk Conjur integration.

Question 17

What can cause users to be prompted for unrecognized MFA factors, such as a wrong phone number or unregistered MFA factor?

Options:

A.

Someone installed the CyberArk Identity mobile app on a different phone with their credentials.

B.

The administrator switched authentication profiles.

C.

They mistyped their username.

D.

Someone registered their phone number to the wrong username.

Question 18

ACME Corporation employees access critical business web applications through CyberArk Identity. You notice a constant high volume of unauthorized traffic from 103.1.200.0/24 trying to gain access to the CyberArk Identity portal. Access to the CyberArk Identity portal is time sensitive. ACME decides to enforce IP restrictions to reduce vulnerability.

Which configuration can help achieve this?

Options:

A.

Loginin to the CyberArk Identity Admin portal and define the IP range of 103 1 200 0/24 into the ACME Corporation IP range.

B.

Login to the CyberArk Identity Admin portal and define the IP range of 103 1 200 0/24 into the blocked IP range.

C.

Implement device trust through the Windows Cloud Agent.

D.

Implement zero trust through the AppGateway.

Question 19

When a user enrolls a mobile device (iOS or Android) without enabling mobile device management, what happens? (Choose three.)

Options:

A.

The device is added to the Endpoints page in the Admin and User portals.

B.

The web applications assigned to the user are added to the Web Apps screen in the CyberArk Identity mobile app.

C.

The associated mobile applications are added and available for deployment automatically.

D.

The mobile device policies defined in the CyberArk Cloud Directory policy service policy set are installed.

E.

The device's model name, serial number. OS number, and Network Carrier information will be uploaded to the Identity portal.

F.

The mobile phone can now be used as a MFA Authentication Factor

Page: 1 / 6
Total 64 questions