3 Months Free Update
3 Months Free Update
3 Months Free Update
What is the maximum number of levels of authorizations you can set up in Dual Control?
In order to grant a permission to a user, and administrator MUST possess that permission.
Two-factor authentication can be implemented by integrating the Vault with a RADIUS server configured to require PIN and token.
Which Master Policy Setting(s) must be active in order to have an account checked-out by one user for a predetermined amount of time?
In Accounts Discovery, you can configure a Windows discovery to scan______________.
Vault admins must manually add the auditors group to newly created safes so auditors will have sufficient access to run reports.D18912E1457D5D1DDCBD40AB3BF70D5D
What is the purpose of the Allowed Safes parameter in a CPM policy? Select all that apply.
A safe was recently created by a user who is a member of the LDAP Vault Administrators group. Which of the
following users does not have access to the newly created safe by default?
Which of the following Privileged Session Management solutions provide a detailed audit log of session activities?
Using the SSH Key Manager it is possible to allow CPM to manage SSH Keys similarly to passwords.
Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)
Which of the following sends out Simple Network Management Protocol (SNMP) traps?
It is possible to restrict the time of day. or day of week that a change process can occur
Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests?
Which of the following statements are NOT true when enabling PSM recording for a target Windows server? Choose all that apply
A Vault Administrator wants to change the PSM Server ID to comply with a naming standard What is the process for changing the PSM Server ID?
CyberArk creates exceptions for Data Execution Prevention (DEP) on selected executable files. This is done as part of installing which of the following components?
In version 10.7 the correct order of installation for components changed. Make the necessary corrections to the list below to show the new installation order.
Select and Place:
To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers must to be configured to communicate with the Primary Vault and Satellite Vaults. Which file needs to be changed on the PVWA to enable this setup?
Can ITALOG records be forwarded to the monitoring solution via Security Information and Event Management (SIEM) integration?
An Auditor needs to login to the PSM in order to live monitor an active session. Which User ID is used to establish the RDP connection to the PSM server?
After the Vault Server is installed, the Microsoft Windows Firewall is now commandeered by the Vault Can the administrator change these firewall rules?
An SNMP integration allows you to forward audit records from the vault to the SIEM.
Which is the purpose of the interval setting in a Central Policy Manager (CPM) policy?
Which report could show all accounts that are past their expiration dates?
One of your users is receiving the error message “ITATS006E Station is suspended for User jsmith” when
attempting to sign in to the pvwa. Which utility would you use to correct this problem?
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so
that the CPM could resume management automatically?
When a DR Vault Server becomes an active vault, it will automatically revert back to DR mode once the Primary Vault comes back online.
Where does the Vault administrator configure in Password Vault Web Access (PVWA) the Fully Qualified Domain Name (FQDN) of the domain controller during LDAP/S integration?
Which file would you modify to configure your Vault Server to forward Activity Logs to a SIEM or SYSLOG server?
In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.
What conditions must be met in order to log into the vault as the Master user? Select all that apply
When working with the CyberArk High Availability Cluster, which services are running on the passive node?