For each option listed, identify if it is a CyberArk Identity connector function.
Which 2FA/MFA options can be used if users cannot use their mobile device? (Choose two.)
ACME Corporation employees access critical business web applications through CyberArk Identity. You notice a constant high volume of unauthorized traffic from 103.1.200.0/24 trying to gain access to the CyberArk Identity portal. Access to the CyberArk Identity portal is time sensitive. ACME decides to enforce IP restrictions to reduce vulnerability.
Which configuration can help achieve this?
Enter your email address to download CyberArk.ACCESS-DEF.v2024-06-07.q21 Dumps