Winter Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CyberArk ACCESS-DEF CyberArk Defender Access (ACC-DEF) Exam Practice Test

Demo: 19 questions
Total 64 questions

CyberArk Defender Access (ACC-DEF) Questions and Answers

Question 1

When configuring an application to use the App Gateway, you do not have to change any configurations in the application directly. You enable the application for App Gateway access in the Admin Portal and input the existing URL that users enter to open the application. You can either use an external URL that CyberArk Identity automatically generates, or you can continue using an existing internal URL.

What is a disadvantage of using an existing internal URL for App Gateway connections?

Options:

A.

Existing links and bookmarks do not work outside of the corporate network.

B.

Users must use different URLs depending on whether they access the application internally or externally.

C.

More configuration is needed because you must upload the URL certificate and private key, and edit DNS settings.

D.

Users must use the same URLs regardless of whether they access the application internally or externally and this may confuse them.

Question 2

Within a Web App connector, which feature does an admin use to grant users access?

Options:

A.

Trust

B.

Workflow

C.

Provisioning

D.

Permissions

Question 3

On which operating systems can the CyberArk Authenticator desktop application be installed? (Choose two.)

Options:

A.

OS

B.

Windows 10

C.

Ubuntu

D.

MacOS

E.

Android

Question 4

Which HR system supports synchronization to both Active Directory and CyberArk Identity Cloud Directory?

Options:

A.

BambooHR

B.

Workday

C.

SAP SuccessFactors

D.

Prosoft HRMS (Unit4)

Question 5

You want to find all events related to the user with the login ID of "ivan.helen@acme".

Which filter do you enter into the UBA portal data explorer?

Options:

A.

user_id = 'ivan.helen@acme'

B.

user_name = 'ivan.helen@acme'

C.

event_user = 'ivan.helen@acme'

D.

entity_name = 'ivan.helen@acme'

Question 6

Which feature does the CyberArk Identity Connector provide?

Options:

A.

web server with SAML federation to internal web applications

B.

secured, mutually authenticated, inbound communication with CyberArk Identity SaaS

C.

SCIM server for connecting to CyberArk Vault

D.

remote access lo internal web applications

Question 7

Refer to the exhibit.

Which statement is correct about this configuration shown?

Options:

A.

Users are allowed to answer security questions as part of the multi-factor authentication process.

B.

There is no requirement to configure at least one user-defined question.

C.

You can choose to answer at least one admin-defined question.

D.

It is optional to keep the minimum number of characters required in answers to three.

Question 8

When a user enrolls a mobile device (iOS or Android) without enabling mobile device management, what happens? (Choose three.)

Options:

A.

The device is added to the Endpoints page in the Admin and User portals.

B.

The web applications assigned to the user are added to the Web Apps screen in the CyberArk Identity mobile app.

C.

The associated mobile applications are added and available for deployment automatically.

D.

The mobile device policies defined in the CyberArk Cloud Directory policy service policy set are installed.

E.

The device's model name, serial number. OS number, and Network Carrier information will be uploaded to the Identity portal.

F.

The mobile phone can now be used as a MFA Authentication Factor

Question 9

What can cause users to be prompted for unrecognized MFA factors, such as a wrong phone number or unregistered MFA factor?

Options:

A.

Someone installed the CyberArk Identity mobile app on a different phone with their credentials.

B.

The administrator switched authentication profiles.

C.

They mistyped their username.

D.

Someone registered their phone number to the wrong username.

Question 10

What does enabling "Workflow" allow within an app connector?

Options:

A.

ability to enable approval workflows for a user request to access the app

B.

ability for workflows to link one app with another app

C.

ability for a workflow to create, update, and delete users within a 3rd party app

D.

workflows that automatically notify admins when a user logs in to the app

Question 11

Which 2FA/MFA options can fulfill the "Something you are" requirement? (Choose two.)

Options:

A.

email

B.

CyberArk Identity mobile app

C.

F1D02

D.

phone call

E.

security questions

Question 12

When can 2FA/MFA be prompted? (Choose two.)

Options:

A.

when clicking on an app file while in the User Portal

B.

after clicking on the Forgot Your Password link

C.

when making changes to a policy while in the Admin Portal

D.

when exporting a compliance report while in the Admin Portal

E.

when adding a newwebapp

Question 13

A user's account information required for multi-factor authentication is not set up properly and is preventing the user from logging in.

What should you do?

Options:

A.

Use the MFA Unlock command in the Admin Portal to suspend multifactor authentication for 10 minutes.

B.

Delete the user's account and create a new one.

C.

Ask the user to delete all browser cookies, then try again.

D.

Change the user's director/ source from Active Directory to LDAP for authentication.

Question 14

Refer to the exhibit.

How should you configure this default authentication policy to ensure users must authenticate every time they try to access the CyberArk Identity portal or web applications?

Options:

A.

Check and enable QR Code under the "Single Authentication Mechanism" section.

B.

Check and enable Security Questions and set the number to "1".

C.

Check and Select "Challenge Pass-Through Duration" to be "No Pass Through".

D.

Check and Select QR Code under Challenge 1.

Question 15

Match each listed task to indicate if an administrator can perform it in the Admin Portal.

Options:

Question 16

CyberArk Identity has created a CLI integration with which vendor?

Options:

A.

Amazon Web Services

B.

Salesforce

C.

Microsoft

D.

Zoom

Question 17

What does the CyberArk Identity App Gateway work with? (Choose three.)

Options:

A.

SAML-Compliant Apps

B.

WS-Fed Enabled Apps

C.

OIDC Web Apps

D.

Thick Client (non-web-based Apps)

E.

Terminal Services

F.

Telnet

Question 18

Match each User Portal tab to the correct description.

Options:

Question 19

For each statement listed, indicate if it may be a potential cause of this problem.

Options:

Demo: 19 questions
Total 64 questions