Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

On which operating systems can the CyberArk Authenticator desktop application be installed? (Choose two.)

A.

OS

B.

Windows 10

C.

Ubuntu

D.

MacOS

E.

Android

Full Access
Question # 5

Match each Web App Connector to the phrase that best describes its service offering.

Full Access
Question # 6

Your organization wants to automatically create user accounts with different Salesforce licenses (e.g., Salesforce, Identity, Chatter External).

In CyberArk Identity, arrange the steps to achieve this in the correct sequence.

Full Access
Question # 7

What is the purpose of the Infinite Apps feature offered by CyberArk Identity?

A.

It provides an easy way to find all the SAML-enabled apps that exist online.

B.

It automatically downloads the desktop version of all your web apps.

C.

Itprovides the ability to launch apps in any web browser

D.

If facilitates addingUser-Password web apps not in the CyberArk Identity App Catalog.

Full Access
Question # 8

Match each User Portal tab to the correct description.

Full Access
Question # 9

You want to find all events related to the user with the login ID of "ivan.helen@acme".

Which filter do you enter into the UBA portal data explorer?

A.

user_id = 'ivan.helen@acme'

B.

user_name = 'ivan.helen@acme'

C.

event_user = 'ivan.helen@acme'

D.

entity_name = 'ivan.helen@acme'

Full Access
Question # 10

What does the CyberArk Identity App Gateway work with? (Choose three.)

A.

SAML-Compliant Apps

B.

WS-Fed Enabled Apps

C.

OIDC Web Apps

D.

Thick Client (non-web-based Apps)

E.

Terminal Services

F.

Telnet

Full Access
Question # 11

When a user enrolls a mobile device (iOS or Android) without enabling mobile device management, what happens? (Choose three.)

A.

The device is added to the Endpoints page in the Admin and User portals.

B.

The web applications assigned to the user are added to the Web Apps screen in the CyberArk Identity mobile app.

C.

The associated mobile applications are added and available for deployment automatically.

D.

The mobile device policies defined in the CyberArk Cloud Directory policy service policy set are installed.

E.

The device's model name, serial number. OS number, and Network Carrier information will be uploaded to the Identity portal.

F.

The mobile phone can now be used as a MFA Authentication Factor

Full Access
Question # 12

Which CyberArk Identity supported web standard is commonly used for enterprise Single Sign-On and issues XML tokens for authentication?

A.

SAML2.0

B.

QAuth

C.

RADIUS

D.

LDAP

Full Access
Question # 13

Which administrative right is required to manually start a provisioning synchronization job?

A.

Application Management

B.

User Management

C.

System Enrollment

D.

Register and Administer connectors

Full Access
Question # 14

Refer to the exhibit.

This exhibit shows the base authentication policy for ACME Corporation. You must edit the policy to allow users to authenticate once if they fulfill certain authentication criteria.

How should you configure this policy to support BOTH?

A.

Configure "Challenge Pass-Through Duration" to be "always".

B.

ConfigureFID02 authenticator as Challenge 1.

C.

ConfigureFID02 authenticator as Challenge 2.

D.

Configure QR Code as "Single Authentication Mechanism".

Full Access
Question # 15

What can cause users to be prompted for unrecognized MFA factors, such as a wrong phone number or unregistered MFA factor?

A.

Someone installed the CyberArk Identity mobile app on a different phone with their credentials.

B.

The administrator switched authentication profiles.

C.

They mistyped their username.

D.

Someone registered their phone number to the wrong username.

Full Access
Question # 16

Which 2FA/MFA options can be used if users cannot use their mobile device? (Choose two.)

A.

FID02

B.

Security questions

C.

OAUTH2

D.

QRcode

E.

Push notification app

Full Access
Question # 17

Which settings can help minimize the number of 2FA / MFA prompts? (Choose two.)

A.

Challenge Pass-Through Duration

B.

RADIUS Connections

C.

OATH OTP

D.

IP Address filter

E.

Port mapping

Full Access
Question # 18

For each option listed, identify if it is a CyberArk Identity connector function.

Full Access
Question # 19

Your team is deploying endpoint authentication onto the corporate endpoints within an organization. Enrollment details include when the enrollment must be completed, and the enrollment code was sent out to the users. Enrollment can be performed in the office or remotely (without the assistance of an IT support engineer). You received feedback that many users are unable to enroll into the system using the enrollment code.

What can you do to resolve this? (Choose two.)

A.

Set maximum number of joinable endpointsto "unlimited".

B.

Set Expiry Date to "Never".

C.

Set the IP Address range to the user's" home network range.

D.

Set a description within the enrollment code.

E.

Reinstall Windows Device Trust.

Full Access