New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

CyberArk ACCESS-DEF CyberArk Defender Access (ACC-DEF) Exam Practice Test

Page: 1 / 6
Total 64 questions

CyberArk Defender Access (ACC-DEF) Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which Custom Template app connectors are appropriate to use if a website does not require user authentication?

Options:

A.

Bookmark

B.

Browser Extension

C.

SAML

D.

Connect

Question 2

For each statement listed, indicate if it may be a potential cause of this problem.

Options:

Question 3

You are tasked to enforce certificate based authentication onto all the domain-joined Windows machines within your organization. Based on the inventory record, there are 1000 Windows machines, which include 150 standalone Windows machines. The enrollment will be conducted from either the office network or through the Virtual Private Network (VPN).

Which parameter(s) should you define within the enrollment code to ensure the security of the code and that only the authorized endpoints get registered?

Options:

A.

Set an expiration date defining when the code should expire.

B.

Specify the maximum number of devices that can be enrolled.

C.

Define the enrollment code to only the specific office/VPN IP network segment.

D.

Define that only Linux machines may be enrolled.

Question 4

When logging on to the User Portal, which authentication methods can enable the user to bypass authentication rules and default profile? (Choose two.)

Options:

A.

Certification-Based Authentication (CBA)

B.

Integrated Windows Authentication (IWA)

C.

QR Code Authentication

D.

FIDO2 Authentication

E.

RADIUS Authentication

Question 5

For each option listed, identify if it is a CyberArk Identity connector function.

Options:

Question 6

Refer to the exhibit.

Which statement is correct about this configuration shown?

Options:

A.

Users are allowed to answer security questions as part of the multi-factor authentication process.

B.

There is no requirement to configure at least one user-defined question.

C.

You can choose to answer at least one admin-defined question.

D.

It is optional to keep the minimum number of characters required in answers to three.

Question 7

Which statement is correct about the CyberArk Identity Windows Device Trust enrollment process?

Options:

A.

An enrollment code is optional.

B.

The endpoint does not need to be a domain-joined machine.

C.

You can define the maximum number of joinable endpoints.

D.

You can define the minimum number of joinable endpoints.

Question 8

Your team is deploying endpoint authentication onto the corporate endpoints within an organization. Enrollment details include when the enrollment must be completed, and the enrollment code was sent out to the users. Enrollment can be performed in the office or remotely (without the assistance of an IT support engineer). You received feedback that many users are unable to enroll into the system using the enrollment code.

What can you do to resolve this? (Choose two.)

Options:

A.

Set maximum number of joinable endpointsto "unlimited".

B.

Set Expiry Date to "Never".

C.

Set the IP Address range to the user's" home network range.

D.

Set a description within the enrollment code.

E.

Reinstall Windows Device Trust.

Question 9

Which 2FA/MFA options can fulfill the "Something you are" requirement? (Choose two.)

Options:

A.

email

B.

CyberArk Identity mobile app

C.

F1D02

D.

phone call

E.

security questions

Question 10

A user wants to install the CyberArk Identity mobile app by using a QR code.

Arrange the steps to do this in the correct sequence.

Options:

Question 11

Which CyberArk Identity supported web standard is commonly used for enterprise Single Sign-On and issues XML tokens for authentication?

Options:

A.

SAML2.0

B.

QAuth

C.

RADIUS

D.

LDAP

Question 12

When can 2FA/MFA be prompted? (Choose two.)

Options:

A.

when clicking on an app file while in the User Portal

B.

after clicking on the Forgot Your Password link

C.

when making changes to a policy while in the Admin Portal

D.

when exporting a compliance report while in the Admin Portal

E.

when adding a newwebapp

Question 13

Which protocols can CyberArk provide MFA for VPN? (Choose two.)

Options:

A.

SAML

B.

RADIUS

C.

IMAP

D.

TACACS

E.

LDAP

Question 14

Match each User Portal tab to the correct description.

Options:

Question 15

You want to find all events related to the user with the login ID of "ivan.helen@acme".

Which filter do you enter into the UBA portal data explorer?

Options:

A.

user_id = 'ivan.helen@acme'

B.

user_name = 'ivan.helen@acme'

C.

event_user = 'ivan.helen@acme'

D.

entity_name = 'ivan.helen@acme'

Question 16

What does the CyberArk Identity App Gateway work with? (Choose three.)

Options:

A.

SAML-Compliant Apps

B.

WS-Fed Enabled Apps

C.

OIDC Web Apps

D.

Thick Client (non-web-based Apps)

E.

Terminal Services

F.

Telnet

Question 17

Which feature does the CyberArk Identity Connector provide?

Options:

A.

web server with SAML federation to internal web applications

B.

secured, mutually authenticated, inbound communication with CyberArk Identity SaaS

C.

SCIM server for connecting to CyberArk Vault

D.

remote access lo internal web applications

Question 18

ACME Corporation employees access critical business web applications through CyberArk Identity. You notice a constant high volume of unauthorized traffic from 103.1.200.0/24 trying to gain access to the CyberArk Identity portal. Access to the CyberArk Identity portal is time sensitive. ACME decides to enforce IP restrictions to reduce vulnerability.

Which configuration can help achieve this?

Options:

A.

Loginin to the CyberArk Identity Admin portal and define the IP range of 103 1 200 0/24 into the ACME Corporation IP range.

B.

Login to the CyberArk Identity Admin portal and define the IP range of 103 1 200 0/24 into the blocked IP range.

C.

Implement device trust through the Windows Cloud Agent.

D.

Implement zero trust through the AppGateway.

Question 19

Which statement is true about the app gateway?

Options:

A.

For applications that use the App Gateway, the connection from the user travels the same network pathways you already have and CyberArk Identity connects to the CyberArk Identity Connector through the firewall.

B.

For applications that use the App Gateway, the connection from the user travels different network pathways and CyberArk Identity connects to the CyberArk Identity Connector through a separate connection from the firewall.

C.

On the App Gateway page, you can configure the application to enable users to access it if they are logging in from an external location.

D.

App gateway supports on-premises apps and web applications running on HTTPS only.

Page: 1 / 6
Total 64 questions