Which of the Following can be configured in the Master Policy? Choose all that apply.

Which of the Following can be configured in the Master Policy? Choose all that apply.A . Dual ControlB . One Time PasswordsC . Exclusive PasswordsD . Password ReconciliationE . Ticketing IntegrationF . Required PropertiesG . Custom Connection ComponentsH . Password Aging RulesView AnswerAnswer: ABGH

September 25, 2020 1 Comment READ MORE +

What should you check first?

You are successfully managing passwords in the alpha.cyberark.com domain; however, when you attempt to manage a password in the beta.cyberark.com domain, you receive the ‘network path not found’ error. What should you check first?A . That the username and password are correct.B . That the CPM can successfully resolve addresses...

September 25, 2020 No Comments READ MORE +

An SMTP integration allows you to forward audit records to a monitoring solution.

An SMTP integration allows you to forward audit records to a monitoring solution.A . TRUEB . FALSEView AnswerAnswer: B

September 25, 2020 No Comments READ MORE +

In an SIEM integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SIEM server address(es).

In an SIEM integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SIEM server address(es).A . TRUEB . FALSEView AnswerAnswer: B

September 25, 2020 No Comments READ MORE +

What is the PRIMARY reason for installing more than 1 active CPM?

What is the PRIMARY reason for installing more than 1 active CPM?A . Installing CPMs in multiple sites prevents complex firewall rules to manage devices at remote sites.B . Multiple instances create fault tolerance.C . Multiple instances increase response time.D . Having additional CPMs increases the maximum number of devices...

September 24, 2020 No Comments READ MORE +

The Vault supports multiple instances of the following components. Choose all that Apply.

The Vault supports multiple instances of the following components. Choose all that Apply.A . PVWAB . CPMC . PSMD . AIM ProviderView AnswerAnswer: ABC

September 24, 2020 No Comments READ MORE +

What is the BEST way to allow CPM to manage root accounts?

In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow CPM to manage root accounts?A . Create a privileged account on the target server. Allow this account the ability to SSH directly from the CPM machine. Configure this...

September 24, 2020 No Comments READ MORE +

The Vault Internal safe contains all of the configuration for the vault.

The Vault Internal safe contains all of the configuration for the vault.A . TRUEB . FALSEView AnswerAnswer: A

September 24, 2020 No Comments READ MORE +

It is impossible to override Mater Policy settings for a Platform

It is impossible to override Mater Policy settings for a PlatformA . TRUEB . FALSEView AnswerAnswer: B

September 23, 2020 No Comments READ MORE +

The vault server uses a modified version of the Microsoft Windows firewall.

The vault server uses a modified version of the Microsoft Windows firewall.A . TRUEB . FALSEView AnswerAnswer: B

September 23, 2020 No Comments READ MORE +