CyberArk Defender Access ACCESS-DEF Exam Questions

Page: 1 / 14
Total 64 questions
Question 1

Where can MFA filters be used? (Choose three.)



Answer : A, B, D


Question 2

Which 2FA/MFA options can be used if users cannot use their mobile device? (Choose two.)



Answer : A, B


Question 3

A customer's IT admin asks you to disable CyberArk Identity Connector auto-update software options.

Which statement is correct?



Answer : C


Question 4

You get the following error: "Not Authorized. You do not have permission to access this feature".

What is most likely the cause of the error?



Answer : D


Question 5

CyberArk Identity has created a CLI integration with which vendor?



Answer : A


Question 6

Refer to the exhibit.

Within the "Allow user notifications on multiple devices", if you leave the setting as Default (--), what happens if a user triggers a MFA Push notification and has enrolled three different devices?



Answer : B


Question 7

When logging on to the User Portal, which authentication methods can enable the user to bypass authentication rules and default profile? (Choose two.)



Answer : B, D


Page:    1 / 14   
Total 64 questions