Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ACCESS-DEF Exam Dumps - CyberArk Defender Access

Question # 4

Which Custom Template app connectors are appropriate to use if a website does not require user authentication?

A.

Bookmark

B.

Browser Extension

C.

SAML

D.

Connect

Full Access
Question # 5

Which dashboard can display the applications launched by users, the application type, and the number of times they were launched?

A.

Admin Portal: Applications Dashboard

B.

User Portal: Activity

C.

Admin Portal: Overview Dashboard

D.

User Behavioral Analytics Portal: Insights Application User Login Summary Dashboard

Full Access
Question # 6

As part of an ongoing incident investigation, you want to examine all data/events that are relevant to updating user profiles.

Which dataset from the UBA portal should you use?

A.

Behavior

B.

Configuration

C.

Application

D.

Access Control

Full Access
Question # 7

Which 2FA/MFA options can be used if users cannot use their mobile device? (Choose two.)

A.

FID02

B.

Security questions

C.

OAUTH2

D.

QRcode

E.

Push notification app

Full Access
Question # 8

Your team is deploying endpoint authentication onto the corporate endpoints within an organization. Enrollment details include when the enrollment must be completed, and the enrollment code was sent out to the users. Enrollment can be performed in the office or remotely (without the assistance of an IT support engineer). You received feedback that many users are unable to enroll into the system using the enrollment code.

What can you do to resolve this? (Choose two.)

A.

Set maximum number of joinable endpointsto "unlimited".

B.

Set Expiry Date to "Never".

C.

Set the IP Address range to the user's" home network range.

D.

Set a description within the enrollment code.

E.

Reinstall Windows Device Trust.

Full Access
Question # 9

Refer to the exhibit.

Within the "Allow user notifications on multiple devices", if you leave the setting as Default (--), what happens if a user triggers a MFA Push notification and has enrolled three different devices?

A.

The push notification will be sent to none of the enrolled devices.

B.

The push notification will be sent to the first enrolled device only.

C.

The push notification will be sent to all enrolled devices.

D.

The push notification will be sent to the last enrolled device only.

Full Access
Question # 10

As part of compliance regulation, ACME Corporation is enforcing MFA for its critical business web-based application. To increase security and MFA compliance, CyberArk recommends selecting mechanisms from different categories. Within the authentication policy, ACME Corporation made the requirement to configure an authentication mechanism with "Something you know".

Which authentication mechanism meets this requirement?

A.

Phone Call

B.

Security Question

C.

Text Message (SMS) Confirmation Code

D.

FID02 Authenticators

Full Access
Question # 11

You want to find all events related to the user with the login ID of "ivan.helen@acme".

Which filter do you enter into the UBA portal data explorer?

A.

user_id = 'ivan.helen@acme'

B.

user_name = 'ivan.helen@acme'

C.

event_user = 'ivan.helen@acme'

D.

entity_name = 'ivan.helen@acme'

Full Access
Question # 12

What does enabling "Workflow" allow within an app connector?

A.

ability to enable approval workflows for a user request to access the app

B.

ability for workflows to link one app with another app

C.

ability for a workflow to create, update, and delete users within a 3rd party app

D.

workflows that automatically notify admins when a user logs in to the app

Full Access
Question # 13

A user's account information required for multi-factor authentication is not set up properly and is preventing the user from logging in.

What should you do?

A.

Use the MFA Unlock command in the Admin Portal to suspend multifactor authentication for 10 minutes.

B.

Delete the user's account and create a new one.

C.

Ask the user to delete all browser cookies, then try again.

D.

Change the user's director/ source from Active Directory to LDAP for authentication.

Full Access
Question # 14

What can cause users to be prompted for unrecognized MFA factors, such as a wrong phone number or unregistered MFA factor?

A.

Someone installed the CyberArk Identity mobile app on a different phone with their credentials.

B.

The administrator switched authentication profiles.

C.

They mistyped their username.

D.

Someone registered their phone number to the wrong username.

Full Access
Question # 15

Where can MFA filters be used? (Choose three.)

A.

User and Admin Portal login

B.

App level 2FA/MFA

C.

RADIUS

D.

Self-service password reset

E.

Editing personal profile attributes

F.

OAUTH2 connections

Full Access
Question # 16

Refer to the exhibit.

Which statement is correct about this configuration shown?

A.

Users are allowed to answer security questions as part of the multi-factor authentication process.

B.

There is no requirement to configure at least one user-defined question.

C.

You can choose to answer at least one admin-defined question.

D.

It is optional to keep the minimum number of characters required in answers to three.

Full Access
Question # 17

Refer to the exhibit.

How should you configure this default authentication policy to ensure users must authenticate every time they try to access the CyberArk Identity portal or web applications?

A.

Check and enable QR Code under the "Single Authentication Mechanism" section.

B.

Check and enable Security Questions and set the number to "1".

C.

Check and Select "Challenge Pass-Through Duration" to be "No Pass Through".

D.

Check and Select QR Code under Challenge 1.

Full Access
Question # 18

Cindy just joined a company's IT Audit Department and needs CyberArk Identity access to perform her daily job activities.

Which administrative right(s) should she be assigned to match her job requirement?

A.

Everybody + IT Admin + Auditor

B.

Everybody + IT Admin

C.

Everybody

D.

Everybody + Auditor

Full Access
Question # 19

Which HR system supports synchronization to both Active Directory and CyberArk Identity Cloud Directory?

A.

BambooHR

B.

Workday

C.

SAP SuccessFactors

D.

Prosoft HRMS (Unit4)

Full Access