Free ACCESS-DEF Sample Questions — CyberArk Defender Access

Free ACCESS-DEF sample questions for the CyberArk Defender Access exam. No account required: study at your own pace.

Want an interactive quiz? Take the full ACCESS-DEF practice test

Looking for more? Click here to get the full PDF with 50+ practice questions for $10 for offline study and deeper preparation.

Question 1

What does the CyberArk Identity App Gateway work with? (Choose three.)

  • A. SAML-Compliant Apps
  • B. WS-Fed Enabled Apps
  • C. OIDC Web Apps
  • D. Thick Client (non-web-based Apps)
  • E. Terminal Services
  • F. Telnet
Show Answer
Correct Answer:
  • A. SAML-Compliant Apps
  • B. WS-Fed Enabled Apps
  • C. OIDC Web Apps
Question 2

When logging on to the User Portal, which authentication methods can enable the user to bypass authentication rules and default profile? (Choose two.)

  • A. Certification-Based Authentication (CBA)
  • B. Integrated Windows Authentication (IWA)
  • C. QR Code Authentication
  • D. FIDO2 Authentication
  • E. RADIUS Authentication
Show Answer
Correct Answer:
  • B. Integrated Windows Authentication (IWA)
  • C. QR Code Authentication
Question 3

Which predefined roles does CyberArk Identity provide?

  • A. System Administrator and Everybody
  • B. Manage Users and Everybody
  • C. System Administrator and Business Users
  • D. Manage Users and Business Users
Show Answer
Correct Answer:
A. System Administrator and Everybody
Question 4

CyberArk Identity has created a CLI integration with which vendor?

  • A. Amazon Web Services (AWS)
  • B. Salesforce
  • C. Microsoft
  • D. Zoom
Show Answer
Correct Answer:
A. Amazon Web Services (AWS)
Question 5

What can cause users to be prompted for unrecognized MFA factors, such as a wrong phone number or unregistered MFA factor?

  • A. Someone installed the CyberArk Identity mobile app on a different phone with their credentials
  • B. The administrator switched authentication profiles
  • C. They mistyped their username
  • D. Someone registered their phone number to the wrong username
Show Answer
Correct Answer:
C. They mistyped their username
Question 6

You get the following error: "Not Authorized. You do not have permission to access this feature". What is most likely the cause of the error?

  • A. user tried to sign in to the wrong identity tenant
  • B. user tried to sign in before being created in Active Directory
  • C. user gave someone else access to his/her laptop
  • D. non-administrative user tried to access an administrative feature
Show Answer
Correct Answer:
D. non-administrative user tried to access an administrative feature
Question 7

Which administrative right is required to manually start a provisioning synchronization job?

  • A. Application Management
  • B. User Management
  • C. System Enrollment
  • D. Register and Administer connectors
Show Answer
Correct Answer:
A. Application Management
Question 8

When a user enrolls a mobile device (iOS or Android) without enabling mobile device management, what happens? (Choose three.)

  • A. The device is added to the Endpoints page in the Admin and User portals
  • B. The web applications assigned to the user are added to the Web Apps screen in the CyberArk Identity mobile app
  • C. The associated mobile applications are added and available for deployment automatically
  • D. The mobile device policies defined in the CyberArk Cloud Directory policy service policy set are installed
  • E. The device's model name, serial number, OS number, and Network Carrier information will be uploaded to the Identity portal
  • F. The mobile phone can now be used as a MFA Authentication Factor
Show Answer
Correct Answer:
  • B. The web applications assigned to the user are added to the Web Apps screen in the CyberArk Identity mobile app
  • E. The device's model name, serial number, OS number, and Network Carrier information will be uploaded to the Identity portal
  • F. The mobile phone can now be used as a MFA Authentication Factor
Question 9

The Security Operation Team requested a report to show users who have logged in the last seven days. Which report in the Builtin Reports Library should you use?

  • A. Active Users
  • B. MFA Summary
  • C. Logins Map
  • D. Top User Logins
Show Answer
Correct Answer:
C. Logins Map
Question 10

Which 2FA/MFA options can be used if users cannot use their mobile device? (Choose two.)

  • A. FIDO2
  • B. Security questions
  • C. OAUTH2
  • D. QR code
  • E. Push notification app
Show Answer
Correct Answer:
  • A. FIDO2
  • B. Security questions
Question 11

An organization previously allowed users to add their personal apps on the Identity User Portal. This will soon be disabled due to policy changes. What is the impact to the users for personal apps previously added to the User Portal?

  • A. They will continue to function normally; however, users cannot add new apps
  • B. They will continue to display on the Apps screen and user devices; however, they will be greyed out and unavailable for any form of interaction
  • C. They will be deleted from the Apps screen and user devices
  • D. They will continue to display on the Apps screen and user devices; however, an error message will display when users try to open the application
Show Answer
Correct Answer:
D. They will continue to display on the Apps screen and user devices; however, an error message will display when users try to open the application
Question 12

Which browsers are supported for the "Land and Catch" feature? (Choose three.)

  • A. Google Chrome
  • B. Apple Safari
  • C. Microsoft Internet Explorer
  • D. Firefox
  • E. Microsoft Edge
  • F. Opera
Show Answer
Correct Answer:
  • A. Google Chrome
  • D. Firefox
  • E. Microsoft Edge
Question 13

Within a Web App connector, which feature does an admin use to grant users access?

  • A. Trust
  • B. Workflow
  • C. Provisioning
  • D. Permissions
Show Answer
Correct Answer:
C. Provisioning
Question 14

Where can you download the CyberArk Identity mobile app? (Choose two.)

  • A. Download section of the Admin Portal
  • B. CyberArk Support portal
  • C. Apple App Store
  • D. email attachment
  • E. Google Play Store
Show Answer
Correct Answer:
  • C. Apple App Store
  • E. Google Play Store
Question 15

Which options are available with Self-Service Password Reset? (Choose three.)

  • A. Enable users with Active Directory accounts who have forgotten their password to log in and reset it
  • B. Perform Self-Service Password Reset for the Organization's corporate accounts, such as Twitter, Facebook, or Instagram
  • C. Users must log in after a password reset
  • D. maximum number of times can be specified that users can reset their password within a specific timeframe
  • E. Users must respond to a CAPTCHA before resetting their password
  • F. Use Helpdesk Caller Identity (Identity Verification) to confirm user identity
Show Answer
Correct Answer:
  • A. Enable users with Active Directory accounts who have forgotten their password to log in and reset it
  • C. Users must log in after a password reset
  • D. maximum number of times can be specified that users can reset their password within a specific timeframe

Aced these? Get the Full Exam

Download the complete ACCESS-DEF study bundle with 50+ questions in a single printable PDF.