3 Months Free Update
3 Months Free Update
3 Months Free Update
Which component must be installed on the Vault if Distributed Vaults is used with PSM?
Your customer, ACME Corp, wants to store the Safes Data in Drive D instead of Drive C.
Which file should you edit?
To use PSM connections while in the PVWA, what are the minimum safe permissions a user or group will need?
You are onboarding an account that is not supported out of the box.
What should you do first to obtain a platform to import?
A new domain controller has been added to your domain. You need to ensure the CyberArk infrastructure can use the new domain controller for authentication.
Which locations must you update?
All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group Operations Staff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of Operations Managers never need to be able to use the show, copy or connect buttons themselves.
Which safe permission do you need to grant Operations Staff? Check all that apply.
Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
A newly created platform allows users to access a Linux endpoint. When users click to connect, nothing happens.
Which piece of the platform is missing?
Which of the following PTA detections are included in the Core PAS offering?
Which SMTP address can be set on the Notification Settings page to re-invoke the ENE setup wizard after the initial Vault installation.
You are creating a shared safe for the help desk.
What must be considered regarding the naming convention?
You are creating a new Rest API user that utilizes CyberArk Authentication.
What is a correct process to provision this user?
Which parameter controls how often the CPM looks for Soon-to-be-expired Passwords that need to be changed.
As long as you are a member of the Vault Admins group, you can grant any permission on any safe that you have access to.
It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur
Which browser is supported for PSM Web Connectors developed using the CyberArk Plugin Generator Utility (PGUP
Arrange the steps to install the Password Vault Web Access (PVWA) in the correct sequence
Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?
Vault admins must manually add the auditors group to newly created safes so auditors will have sufficient access to run reports.
When creating Distributed Vault environment architecture, what is the maximum number of Vault servers that can be deployed''
It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.
CyberArk user Neil is trying to connect to the Target Linux server 192.168.1.64 using a domain account ACME/linuxuser01 on Domain Acme.corp using PSM for SSH server 192.168.65.145. What is the correct syntax?
You have been asked to limit a platform called "Wmdows_Servers" to safes called "WindowsDCT and "WindowsDC2" The platform must not be assigned to any other safe What is the correct way to accomplish this?
Which option in the PrivateArk client is used to update users' Vault group memberships?
Match the Status of Service on a DR Vault to what is displayed when it is operating normally in Replication mode.
Arrange the steps to restore a Vault using PARestore for a Backup in the correct sequence.
For Digital Vault Cluster in a high availability configuration, how does the cluster determine if a node is down?
Customers who have the ‘Access Safe without confirmation’ safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.
A customer is moving from an on-premises to a public cloud deployment. What is the best and most cost-effective option to secure the server key?
When a DR Vault Server becomes an active vault, it will automatically fail back to the original state once the Primary Vault comes back online.
Which of the following files must be created or configured m order to run Password Upload Utility? Select all that apply.
You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How should this be configured to allow for password management using least privilege?
One can create exceptions to the Master Policy based on ____________________.
A company requires challenge/response multi-factor authentication for PSMP sessions. Which server must you integrate with the CyberArk vault?
You are installing PSM for SSH with AD-Bridge in CyberArkSSHD mode for your customer. ACME Corp What do you need to install to meet your customer's needs? (Choose 2)
Which statement is correct concerning accounts that are discovered, but cannot be added to the Vault by an automated onboarding rule?
It is possible to control the hours of the day during which a user may log into the vault.
Which Master Policy Setting must be active in order to have an account checked-out by one user for a pre-determined amount of time?
As long as you are a member of the Vault Admins group you can grant any permission on any safe.
Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)
Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests.
You need to enable the PSM for all platforms. Where do you perform this task?