CyberArk Defender Access

Here you have the best CyberArk ACCESS-DEF practice exam questions

  • You have 63 total questions to study from
  • Each page has 5 questions, making a total of 13 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 16, 2024
Question 1 of 63

DRAG DROP -

A user wants to install the CyberArk Identity mobile app by using a QR code.

Arrange the steps to do this in the correct sequence.

    Correct Answer:

Question 2 of 63

Where can MFA filters be used? (Choose three.)

    Correct Answer: A, C, F

    MFA filters can be utilized in User and Admin Portal login to ensure secure access, in RADIUS configurations to enforce strong authentication for network access, and in OAuth2 connections to secure the authorization process. These applications of MFA filters help in maintaining stringent security measures across different access points.

Question 3 of 63

Which 2FA/MFA options can be used if users cannot use their mobile device? (Choose two.)

    Correct Answer: A, B

    If users cannot use their mobile device, alternative 2FA/MFA options are necessary. FIDO2 (A) uses physical security keys which do not require a mobile device. Security questions (B) are a basic form of authentication that can be used without needing any mobile device. Options C, D, and E rely on mobile devices or apps in some manner, making them unsuitable under the given constraints.

Question 4 of 63

A user's account information required for multi-factor authentication is not set up properly and is preventing the user from logging in.

What should you do?

    Correct Answer: A

    The best approach to resolve this issue is to use the MFA Unlock command in the Admin Portal to suspend multifactor authentication for 10 minutes. This method allows the user to regain access temporarily while addressing the setup problem without the risk of data loss or service interruptions that could arise from more drastic actions like deleting the account or changing the directory source.

Question 5 of 63

Which statement is correct about the CyberArk Identity Windows Device Trust enrollment process?

    Correct Answer: C

    In the CyberArk Identity Windows Device Trust enrollment process, you have the capability to define the maximum number of joinable endpoints. This ensures that there is a limit to the number of devices that can be enrolled, providing better control and management over the trusted devices within the system.