Which risk factors contribute to the user behavior risk score? (Choose two.)
Answer : BE
Which browsers are supported for the "Land and Catch" feature? (Choose three.)
Answer : ADE
You are tasked to enforce certificate based authentication onto all the domain-joined Windows machines within your organization. Based on the inventory record, there are 1000 Windows machines, which include 150 standalone Windows machines. The enrollment will be conducted from either the office network or through the Virtual Private Network (VPN).
Which parameter(s) should you define within the enrollment code to ensure the security of the code and that only the authorized endpoints get registered?
Answer : AC
Refer to the exhibit.
This exhibit shows the base authentication policy for ACME Corporation. You must edit the policy to allow users to authenticate once if they fulfill certain authentication criteria.
How should you configure this policy to support BOTH?
Answer : D
Which dashboard can display the applications launched by users, the application type, and the number of times they were launched?
Answer : A
Which feature does the CyberArk Identity Connector provide?
Answer : B
You get the following error: "Not Authorized. You do not have permission to access this feature".
What is most likely the cause of the error?
Answer : D
Refer to the exhibit.
How should you configure this default authentication policy to ensure users must authenticate every time they try to access the CyberArk Identity portal or web applications?
Answer : C
Which Custom Template app connectors are appropriate to use if a website does not require user authentication?
Answer : A
CyberArk Identity has created a CLI integration with which vendor?
Answer : A
What can cause users to be prompted for unrecognized MFA factors, such as a wrong phone number or unregistered MFA factor?
Answer : C
Your Chief Executive Officer lost his phone and cannot perform MFA to log in to work.
How can you enable him to bypass MFA right away and not delay his work?
Answer : D
What is the most likely reason a CyberArk Identity admin would turn on the "Provisioning" feature within a Web App connector?
Answer : A
Your organization wants to implement passwordless authentication for business critical web applications. CyberArk Identity manages access to these applications.
What can you do to facilitate the enforcement of this passwordless authentication initiative? (Choose two.)
Answer : AC
Refer to the exhibit.
If an Authentication Policy is configured as shown in the exhibit, which statement is correct?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us