<< Prev Question Next Question >>

Question 22/32

ACME Corporation employees access critical business web applications through CyberArk Identity. You notice a constant high volume of unauthorized traffic from 103.1.200.0/24 trying to gain access to the CyberArk Identity portal. Access to the CyberArk Identity portal is time sensitive. ACME decides to enforce IP restrictions to reduce vulnerability.
Which configuration can help achieve this?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (32q)
Question 1: Which options are available with Self-Service Password Reset...
Question 2: For each option listed, identify if it is a CyberArk Identit...
Question 3: For each statement listed, indicate if it may be a potential...
Question 4: What is the most likely reason a CyberArk Identity admin wou...
Question 5: On which operating systems can the CyberArk Authenticator de...
Question 6: Your Chief Executive Officer lost his phone and cannot perfo...
Question 7: Match each listed task to indicate if an administrator can p...
Question 8: Which feature does the CyberArk Identity Connector provide?...
Question 9: When configuring an application to use the App Gateway, you ...
Question 10: Which HR system supports synchronization to both Active Dire...
Question 11: Which 2FA/MFA options can fulfill the "Something you are" re...
Question 12: Where can MFA filters be used? (Choose three.)...
Question 13: Refer to the exhibit. This exhibit shows the base authentica...
Question 14: Which risk factors contribute to the user behavior risk scor...
Question 15: A user wants to install the CyberArk Identity mobile app by ...
Question 16: Which 2FA/MFA options can be used if users cannot use their ...
Question 17: What does enabling "Workflow" allow within an app connector?...
Question 18: Where can you download the CyberArk Identity mobile app? (Ch...
Question 19: Which protocols can CyberArk provide MFA for VPN? (Choose tw...
Question 20: Your organization wants to implement passwordless authentica...
Question 21: Which Custom Template app connectors are appropriate to use ...
Question 22: ACME Corporation employees access critical business web appl...
Question 23: Refer to the exhibit. Within the "Allow user notifications o...
Question 24: Which administrative right is required to manually start a p...
Question 25: Which predefined roles does CyberArk Identity provide?...
Question 26: The Security Operation Team requested a report to show users...
Question 27: Cindy just joined a company's IT Audit Department and needs ...
Question 28: You get the following error: "Not Authorized. You do not hav...
Question 29: Admins can enable self-service for users to unlock their acc...
Question 30: What is considered an "Identity Provider Initiated" login to...
Question 31: As part of an ongoing incident investigation, you want to ex...
Question 32: When a user enrolls a mobile device (iOS or Android) without...