3 Months Free Update
3 Months Free Update
3 Months Free Update
Refer to the exhibit.
How should you configure this default authentication policy to ensure users must authenticate every time they try to access the CyberArk Identity portal or web applications?
A customer's IT admin asks you to disable CyberArk Identity Connector auto-update software options.
Which statement is correct?
ACME Corporation employees access critical business web applications through CyberArk Identity. You notice a constant high volume of unauthorized traffic from 103.1.200.0/24 trying to gain access to the CyberArk Identity portal. Access to the CyberArk Identity portal is time sensitive. ACME decides to enforce IP restrictions to reduce vulnerability.
Which configuration can help achieve this?
The Security Operation Team requested a report to show users who have logged in the last seven days.
Which report in the Builtin Reports Library should you use?
The Security Operation Team requested a report to show users who have logged in the last seven days.
Which report in the Builtin Reports Library should you use?
Which statement is correct about the CyberArk Identity Windows Device Trust enrollment process?
CyberArk Identity's App Gateway can be used to protect and access which option?
Refer to the exhibit.
This exhibit shows the base authentication policy for ACME Corporation. You must edit the policy to allow users to authenticate once if they fulfill certain authentication criteria.
How should you configure this policy to support BOTH?
What is considered an "Identity Provider Initiated" login to an application?
What is the most likely reason a CyberArk Identity admin would turn on the "Provisioning" feature within a Web App connector?
Which Custom Template app connectors are appropriate to use if a website does not require user authentication?
An organization previously allowed users to add their personal apps on the Identity User Portal. This will soon be disabled due to policy changes.
What is the impact to the users for personal apps previously added to the User Portal?
On which operating systems can the CyberArk Authenticator desktop application be installed? (Choose two.)
Your organization wants to limit access to the CyberArk Identity user portal to only corporate issued domain-joined laptops without the use of a VPN.
How can you achieve this?