3 Months Free Update
3 Months Free Update
3 Months Free Update
You want to improve performance on the CPM by restricting accounts for the CYBRWINDAD platform to only the WINDEMEA and WINDEMEA_Admin safes.
How do you set this in CyberArk?
The vault server uses a modified version of the Microsoft Windows firewall.
Your customer wants to store the Safes Data on Vault Drive D instead of Drive C.
Which file should you edit?
When performing “In Domain” hardening of a PSM server, which steps must be performed? (Choose two.)
You are installing multiple PVWAs behind a load balancer.
Which statement is correct?
To enable LDAP over SSL for a Vault when DNS lookups are blocked, which step must be completed?
-
The installCyberArkSSHD parameter on the PSM for SSH can be set to multiple values.
Match each value to the correct condition.
As a member of a PAM Level-2 support team, you are troubleshooting an issue related to load balancing four PVWA servers at two data centers. You received a note from your Level-1 support team stating “When testing PVWA website from a workstation, we noticed that the “Source IP of last sign-in” was shown as the VIP (Virtual IP address) assigned to the four PVWA servers instead of the workstation IP where the PVWA site was launched from.”
Which step should you take?
Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.
You are designing the number of PVWAs a customer must deploy. The customer has three data centers with a distributed Vault in each, requires high availability, and wants to use all Vaults at all times.
How many PVWAs does the customer need?
Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? Choose all that apply
What authentication methods can be implemented to enforce Two-Factor Authentication (2FA) for users authenticating to CyberArk using both the PVWA (through the browser) and the PrivateArk Client?
Which service must be set to Automatic (delayed start) after the Vault is installed and configured?
When configuring RADIUS authentication, which utility is used to create a file containing an encrypted version of the RADIUS secret?
A customer has three data centers distributed globally and wants highly-available PSM connections in each segmented zone. In addition, the customer needs a highly-available PSM connection for the CyberArk Admins.
What will best satisfy this customer's needs?
Which of the following protocols need to be installed on a standalone vault server? Check all that apply.
In which configuration file on the Vault can filters be configured to either include or exclude log messages that are sent through SNMP?
What is the default username for the PSM for SSH maintenance user when InstallCyberarkSSHD is set to yes?
What is a prerequisite step before CyberArk can be configured to support RADIUS authentication?
You need to add a new PSM server to an existing CyberArk environment.
What is the best way to determine the sizing of this server?
You are configuring the Vault to send syslog audit data to your organization’s SIEM solution.
What is a valid value for the SyslogServerProtocol parameter in DBPARM.INI file?
You are successfully managing passwords in the alpha cyberark com domain; however, when you attempt to manage a password in the beta cyberark com domain, you receive the 'network path not found' error. What should you check first?
Which configuration file and Vault utility are used to migrate the server key to an HSM?
After installing the first PSM server and before installing additional PSM servers, you must ensure the user performing the installation is not a direct owner of which safe?
After installing the Vault, you need to allow Firewall Access for Windows Time service to sync with NTP servers 10.1.1.1 and 10.2.2.2.
What should you do?
Which file would you modify to configure the vault to send SNMP traps to your monitoring solution?