Free ACCESS-DEF Exam Braindumps (page: 8)

Page 7 of 17

Which statement is true about the app gateway?

  1. For applications that use the App Gateway, the connection from the user travels the same network pathways you already have and CyberArk Identity connects to the CyberArk Identity Connector through the firewall.
  2. For applications that use the App Gateway, the connection from the user travels different network pathways and CyberArk Identity connects to the CyberArk Identity Connector through a separate connection from the firewall.
  3. On the App Gateway page, you can configure the application to enable users to access it if they are logging in from an external location.
  4. App gateway supports on-premises apps and web applications running on HTTPS only.

Answer(s): A



When a user enrolls a mobile device (iOS or Android) without enabling mobile device management, what happens? (Choose three.)

  1. The device is added to the Endpoints page in the Admin and User portals.
  2. The web applications assigned to the user are added to the Web Apps screen in the CyberArk Identity mobile app.
  3. The associated mobile applications are added and available for deployment automatically.
  4. The mobile device policies defined in the CyberArk Cloud Directory policy service policy set are installed.
  5. The device's model name, serial number. OS number, and Network Carrier information will be uploaded to the Identity portal.
  6. The mobile phone can now be used as a MFA Authentication Factor

Answer(s): A,B,F



As part of compliance regulation, ACME Corporation is enforcing MFA for its critical business web- based application. To increase security and MFA compliance, CyberArk recommends selecting mechanisms from different categories. Within the authentication policy, ACME Corporation made the requirement to configure an authentication mechanism with "Something you know".
Which authentication mechanism meets this requirement?

  1. Phone Call
  2. Security Question
  3. Text Message (SMS) Confirmation Code
  4. FID02 Authenticators

Answer(s): B



Your organization wants to limit access to the CyberArk Identity user portal to only corporate issued domain-joined laptops without the use of a VPN.
How can you achieve this?

  1. Use the Windows Device Trust agent with certificate-based authentication.
  2. Use the Windows Cloud Agent and CyberArk Identity Connector with Integrated Windows Authentication
  3. Define a range of internal corporate IP addresses and use them to restrict access.
  4. 'Use the CyberArk Conjur integration.

Answer(s): A






Post your Comments and Discuss CyberArk ACCESS-DEF exam with other Community members:

ACCESS-DEF Discussions & Posts