Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What should you do if you forget your CyberArk Authenticator PIN?

A.

Click on the Reset PIN code button.

B.

Submit a support case to request a new PIN.

C.

Contact the Administrator to unlock the CvberArk Authenticator.

D.

Reinstall CyberArk Authenticator on top of the existinginstallation.

You want to find all events related to the user with the login ID of "ivan.helen@acme".

Which filter do you enter into the UBA portal data explorer?

A.

user_id = 'ivan.helen@acme'

B.

user_name = 'ivan.helen@acme'

C.

event_user = 'ivan.helen@acme'

D.

entity_name = 'ivan.helen@acme'

Your organization wants to implement passwordless authentication for business critical web applications. CyberArk Identity manages access to these applications.

What can you do to facilitate the enforcement of this passwordless authentication initiative? (Choose two.)

A.

Configure a certificate-based authentication policy in CyberArk Identity that only allows access to CyberArk Identity or the business critical web applications.

B.

Send an email to the affected users and get them to renew their authentication token(s).

C.

Roll out the CyberArk Windows Cloud Agent to the affected endpoints.

D.

Refresh the endpoint operating system and define the new authentication method.

E.

Roll out Secure Web Sessions to the applicable users.

What does enabling "Workflow" allow within an app connector?

A.

ability to enable approval workflows for a user request to access the app

B.

ability for workflows to link one app with another app

C.

ability for a workflow to create, update, and delete users within a 3rd party app

D.

workflows that automatically notify admins when a user logs in to the app

Which risk factors contribute to the user behavior risk score? (Choose two.)

A.

operating system

B.

geolocation

C.

device certificate

D.

session cookie

E.

AD joined status of device

Refer to the exhibit.

Which statement is correct about this configuration shown?

A.

Users are allowed to answer security questions as part of the multi-factor authentication process.

B.

There is no requirement to configure at least one user-defined question.

C.

You can choose to answer at least one admin-defined question.

D.

It is optional to keep the minimum number of characters required in answers to three.

A customer's IT admin asks you to disable CyberArk Identity Connector auto-update software options.

Which statement is correct?

A.

Submit a support ticket to the CyberArk support team and ask them to disable the CyberArk Connector auto-update software remotely

B.

Identity does not allow you to disable the Connector software auto-update.

C.

The Connector software auto-update can bedisabled on the CyberArk Identity Connector server under the configuration window.

D.

You can disable the Connector software auto-update on CyberArk Identity SaaS Admin Portal under Settings -> Network -> CyberArk Identity Connectors.

Which administrative right is required to manually start a provisioning synchronization job?

A.

Application Management

B.

User Management

C.

System Enrollment

D.

Register and Administer connectors

Which settings can help minimize the number of 2FA / MFA prompts? (Choose two.)

A.

Challenge Pass-Through Duration

B.

RADIUS Connections

C.

OATH OTP

D.

IP Address filter

E.

Port mapping

Which options are available with Self-Service Password Reset? (Choose three.)

A.

Enable users with Active Directory accounts who have forgotten their password to log in and reset it.

B.

Perform Self-Service Password Reset for the Organization's corporate accounts, suchas Twitter, Facebook, or Instagram.

C.

Users must log in after a password reset.

D.

A maximum number of times can be specified that users can reset their password within a specific timeframe.

E.

Users must respond to a CAPTCHA before resettingtheir password.

F.

Use Helpdesk Caller Identity (Identity Verification) to confirm user identity.