When logging on to the User Portal, which authentication methods can enable the user to bypass authentication rules and default profile? (Choose two.)
Answer : B, D
Your Chief Executive Officer lost his phone and cannot perform MFA to log in to work.
How can you enable him to bypass MFA right away and not delay his work?
Answer : D
What can cause users to be prompted for unrecognized MFA factors, such as a wrong phone number or unregistered MFA factor?
Answer : C
CyberArk Identity has created a CLI integration with which vendor?
Answer : A
Refer to the exhibit.
How should you configure this default authentication policy to ensure users must authenticate every time they try to access the CyberArk Identity portal or web applications?
Answer : C
A user's account information required for multi-factor authentication is not set up properly and is preventing the user from logging in.
What should you do?
Answer : A
Which 2FA/MFA options can be used if users cannot use their mobile device? (Choose two.)
Answer : A, B