3 Months Free Update
3 Months Free Update
3 Months Free Update
You are concerned about the Windows Domain password changes occurring during business hours.
Which settings must be updated to ensure passwords are only rotated outside of business hours?
Before failing back to the production infrastructure after a DR exercise, what must you do to maintain audit history during the DR event?
You need to recover an account localadmin02 for target server 10.0.123.73 stored in Safe Team1.
What do you need to recover and decrypt the object? (Choose three.)
A password compliance audit found:
1) One-time password access of 20 domain accounts that are members of Domain Admins group in Active Directory are not being enforced.
2) All the sessions of connecting to domain controllers are not being recorded by CyberArk PSM.
What should you do to address these findings?
When onboarding multiple accounts from the Pending Accounts list, which associated setting must be the same across the selected accounts?
Where can a user with the appropriate permissions generate a report? (Choose two.)
As long as you are a member of the Vault Admins group you can grant any permission on any safe.
Which of the following logs contains information about errors related to PTA?
When an account is unable to change its own password, how can you ensure that password reset with the reconcile account is performed each time instead of a change?
What are the mandatory fields when onboarding from Pending Accounts? (Choose two.)
CyberArk recommends implementing object level access control on all Safes.
An auditor initiates a live monitoring session to PSM server to view an ongoing live session. When the auditor’s machine makes an RDP connection the PSM server, which user will be used?
Time of day or day of week restrictions on when password verifications can occur configured in ____________________.
When a DR Vault Server becomes an active vault, it will automatically fail back to the original state once the Primary Vault comes back online.
Which of the following PTA detections require the deployment of a Network Sensor or installing the PTA Agent on the domain controller?
To ensure all sessions are being recorded, a CyberArk administrator goes to the master policy and makes configuration changes.
Which configuration is correct?
Which methods can you use to add a user directly to the Vault Admin Group? (Choose three.)
In your organization the “click to connect” button is not active by default.
How can this feature be activated?
Which statement is correct concerning accounts that are discovered, but cannot be added to the Vault by an automated onboarding rule?
A new domain controller has been added to your domain. You need to ensure the CyberArk infrastructure can use the new domain controller for authentication.
Which locations must you update?
In addition to add accounts and update account contents, which additional permission on the safe is required to add a single account?
Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?
An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?
Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?
A Vault Administrator team member can log in to CyberArk, but for some reason, is not given Vault Admin rights.
Where can you check to verify that the Vault Admins directory mapping points to the correct AD group?
When a group is granted the 'Authorize Account Requests' permission on a safe Dual Control requests must be approved by
A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request.
What is the correct location to identify users or groups who can approve?
PTA can automatically suspend sessions if suspicious activities are detected in a privileged session, but only if the session is made via the CyberArk PSM.
Which service should NOT be running on the DR Vault when the primary Production Vault is up?
In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX system. What is the BEST way to allow CPM to manage root accounts.
Which authorizations are required in a recording safe to allow a group to view recordings?
Which parameter controls how often the CPM looks for Soon-to-be-expired Passwords that need to be changed.
Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire?
The Active Directory User configured for Windows Discovery needs which permission(s) or membership?
You have been asked to identify the up or down status of Vault services.
Which CyberArk utility can you use to accomplish this task?
In the Private Ark client under the Tools menu > Administrative Tools > Users and Groups, which option do you use to update users’ Vault group memberships?
Which change could CyberArk make to the REST API that could cause existing scripts to fail?
Due to network activity, ACME Corp’s PrivateArk Server became active on the OR Vault while the Primary Vault was also running normally. All the components continued to point to the Primary Vault.
Which steps should you perform to restore DR replication to normal?
Which keys are required to be present in order to start the PrivateArk Server service?
One can create exceptions to the Master Policy based on ____________________.
How much disk space do you need on a server to run a full replication with PAReplicate?
Which report could show all accounts that are past their expiration dates?
When running a “Privileged Accounts Inventory” Report through the Reports page in PVWA on a specific safe, which permission/s are required on that safe to show complete account inventory information?
Match the Status of Service on a DR Vault to what is displayed when it is operating normally in Replication mode.
What is the maximum number of levels of authorization you can set up in Dual Control?
Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”?
What is required to enable access over SSH to a Unix account through both PSM and PSMP?
Which CyberArk group does a user need to be part of to view recordings or live monitor sessions?
You created a new platform by duplicating the out-of-box Linux through the SSH platform.
Without any change, which Text Recorder Type(s) will the new platform support? (Choose two.)