Where can MFA filters be used? (Choose three.)
Answer : A, B, D
Which 2FA/MFA options can be used if users cannot use their mobile device? (Choose two.)
Answer : A, B
A customer's IT admin asks you to disable CyberArk Identity Connector auto-update software options.
Which statement is correct?
Answer : C
You get the following error: "Not Authorized. You do not have permission to access this feature".
What is most likely the cause of the error?
Answer : D
CyberArk Identity has created a CLI integration with which vendor?
Answer : A
Refer to the exhibit.
Within the "Allow user notifications on multiple devices", if you leave the setting as Default (--), what happens if a user triggers a MFA Push notification and has enrolled three different devices?

Answer : B
When logging on to the User Portal, which authentication methods can enable the user to bypass authentication rules and default profile? (Choose two.)
Answer : B, D