Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CyberArk ACCESS-DEF Practice Exam with Questions & Answers | Set: 2

Questions 11

As part of an ongoing incident investigation, you want to examine all data/events that are relevant to updating user profiles.

Which dataset from the UBA portal should you use?

Options:
A.

Behavior

B.

Configuration

C.

Application

D.

Access Control

CyberArk ACCESS-DEF Premium Access
Questions 12

An organization previously allowed users to add their personal apps on the Identity User Portal. This will soon be disabled due to policy changes.

What is the impact to the users for personal apps previously added to the User Portal?

Options:
A.

They will continue to function normally; however, users cannot add new apps.

B.

They will continue to display on the Apps screen and user devices; however, they will be greyed out and unavailable for any form of interaction.

C.

They will be deleted from the Apps screen and user devices.

D.

They will continue to display on the Apps screen and user devices; however, an error message will display when users try to open the application.

Questions 13

For each option listed, identify if it is a CyberArk Identity connector function.

ACCESS-DEF Question 13

Options:
Questions 14

What does the CyberArk Identity App Gateway work with? (Choose three.)

Options:
A.

SAML-Compliant Apps

B.

WS-Fed Enabled Apps

C.

OIDC Web Apps

D.

Thick Client (non-web-based Apps)

E.

Terminal Services

F.

Telnet

Questions 15

Which administrative right is required to manually start a provisioning synchronization job?

Options:
A.

Application Management

B.

User Management

C.

System Enrollment

D.

Register and Administer connectors

Questions 16

You get the following error: "Not Authorized. You do not have permission to access this feature".

What is most likely the cause of the error?

Options:
A.

A user tried to sign in to the wrong identity tenant.

B.

A user tried to sign in before being created in Active Directory.

C.

A user gave someone else access to his/her laptop.

D.

A non-administrative user tried to access an administrative feature.

Questions 17

Refer to the exhibit.

If an Authentication Policy is configured as shown in the exhibit, which statement is correct?

ACCESS-DEF Question 17

Options:
A.

The Initial MFA challenge will be sent to the account in CyberArk Cloud Directory (Tarqet).

B.

Upon successful logon, the user will be logged in as the account in CyberArJS Cloud Directory (Target).

C.

Future MFA challenges will be sent to the account in AD (Source).

D.

If there is no matching email between two accounts in AD (Source) and CyberArtCloud Directory (Target), the mapping will then look for a matching User ID.

Questions 18

Which Custom Template app connectors are appropriate to use if a website does not require user authentication?

Options:
A.

Bookmark

B.

Browser Extension

C.

SAML

D.

Connect

Questions 19

What can cause users to be prompted for unrecognized MFA factors, such as a wrong phone number or unregistered MFA factor?

Options:
A.

Someone installed the CyberArk Identity mobile app on a different phone with their credentials.

B.

The administrator switched authentication profiles.

C.

They mistyped their username.

D.

Someone registered their phone number to the wrong username.