Loading questions...
Updated
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Support Examcademy
Your support keeps this platform running. Become a Supporter to remove all ads and unlock exclusive study tools.
Create a free account to unlock all questions for this exam.
Log In / Sign UpWhere can MFA filters be used? (Choose three.)
Which 2FA/MFA options can be used if users cannot use their mobile device? (Choose two.)
A user's account information required for multi-factor authentication is not set up properly and is preventing the user from logging in.
What should you do?
Which statement is correct about the CyberArk Identity Windows Device Trust enrollment process?
DRAG DROP -
A user wants to install the CyberArk Identity mobile app by using a QR code.
Arrange the steps to do this in the correct sequence.

ACME Corporation employees access critical business web applications through CyberArk Identity. You notice a constant high volume of unauthorized traffic from 103.1.200.0/24 trying to gain access to the CyberArk Identity portal. Access to the CyberArk Identity portal is time sensitive. ACME decides to enforce IP restrictions to reduce vulnerability.
Which configuration can help achieve this?
Refer to the exhibit.
Which statements are correct regarding this Authentication Policy? (Choose two.)

An organization previously allowed users to add their personal apps on the Identity User Portal. This will soon be disabled due to policy changes.
What is the impact to the users for personal apps previously added to the User Portal?
Refer to the exhibit.
Within the "Allow user notifications on multiple devices", if you leave the setting as Default (--), what happens if a user triggers a MFA Push notification and has enrolled three different devices?

Which protocols can CyberArk provide MFA for VPN? (Choose two.)
DRAG DROP -
Your organization wants to automatically create user accounts with different Salesforce licenses (e.g., Salesforce, Identity, Chatter External).
In CyberArk Identity, arrange the steps to achieve this in the correct sequence.

Which device enrollment settings are valid? (Choose two.)
What is considered an "Identity Provider Initiated" login to an application?