On which operating systems can the CyberArk Authenticator desktop application be installed? (Choose two.)
ACME Corporation employees access critical business web applications through CyberArk Identity. You notice a constant high volume of unauthorized traffic from 103.1.200.0/24 trying to gain access to the CyberArk Identity portal. Access to the CyberArk Identity portal is time sensitive. ACME decides to enforce IP restrictions to reduce vulnerability.
Which configuration can help achieve this?
A customer's IT admin asks you to disable CyberArk Identity Connector auto-update software options.
Which statement is correct?
You want to find all events related to the user with the login ID of "ivan.helen@acme".
Which filter do you enter into the UBA portal data explorer?
Admins can enable self-service for users to unlock their accounts. There are four options under the Admin Portal Core Services > Policies > User Security Policies > Self Service > Account Unlock options.
Match each option to the correct description.
Which dashboard can display the applications launched by users, the application type, and the number of times they were launched?
As part of an ongoing incident investigation, you want to examine all data/events that are relevant to updating user profiles.
Which dataset from the UBA portal should you use?
Refer to the exhibit.
This exhibit shows the base authentication policy for ACME Corporation. You must edit the policy to allow users to authenticate once if they fulfill certain authentication criteria.
How should you configure this policy to support BOTH?
Match each Web App Connector to the phrase that best describes its service offering.
Within a Web App connector, which feature does an admin use to grant users access?
Refer to the exhibit.
How should you configure this default authentication policy to ensure users must authenticate every time they try to access the CyberArk Identity portal or web applications?