Access control to passwords is implemented by __________.

Access control to passwords is implemented by __________.A . Vault authorizationsB . Safe authorizationsC . Master PolicyD . platform settingsView AnswerAnswer: B Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Object­Level-Access-Control.htm

March 8, 2022 No Comments READ MORE +

What are the functions of the Remote Control Agent service? (Choose three.)

What are the functions of the Remote Control Agent service? (Choose three.)A . Allows remote monitoring the VaultB . Sends SNMP traps from the VaultC . Maintains audit dataD . Allows CyberArk services to be managed (start/stop/status) remotelyView AnswerAnswer: ABD Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Privileged-Account-Security-Remote-Administration.htm#:~:text=The%20CyberArk%20Vault%20Remote%20Control,and%20the%20Disaster%20Recovery%20Server

March 7, 2022 No Comments READ MORE +

Any user can monitor live sessions in real time when initiating RDP connection via Secure Connect through PSM.

Any user can monitor live sessions in real time when initiating RDP connection via Secure Connect through PSM.A . TrueB . FalseView AnswerAnswer: B Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Configuring-the-Privileged-Session-Management-Interface.htm

March 6, 2022 No Comments READ MORE +

The PSM requires the Remote Desktop Web Access role service.

The PSM requires the Remote Desktop Web Access role service.A . TrueB . FalseView AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Before-Installing-PSM.htm

March 6, 2022 No Comments READ MORE +

Which of the following features are provided by Ad-Hoc Access (formerly Secure Connect)? (Choose three.)

Which of the following features are provided by Ad-Hoc Access (formerly Secure Connect)? (Choose three.)A . PSM connections to target devices that are not managed by CyberArkB . session recordingC . real-time live session monitoringD . PSM connections from a terminal without the need to login to the Password Vault...

March 6, 2022 No Comments READ MORE +

For which purpose are these credentials used?

During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault. For which purpose are these credentials used?A . The credentials will be used later by the CPM to retrieve passwords from the Vault.B...

March 5, 2022 No Comments READ MORE +

Which file is used to open up a non-standard firewall port to the Vault?

Which file is used to open up a non-standard firewall port to the Vault?A . dbparm.iniB . PARagent.iniC . passparm.iniD . Vault.iniView AnswerAnswer: A

March 5, 2022 No Comments READ MORE +

Which is the purpose of a linked account?

Which is the purpose of a linked account?A . To ensure that a particular collection of accounts all have the same password.B . To ensure a particular set of accounts all change at the same time.C . To connect the CPM to a target system.D . To allow the use...

March 4, 2022 No Comments READ MORE +

When using multiple Central Policy Managers (CPM), which one of the following Safes is shared by all CPMs?

When using multiple Central Policy Managers (CPM), which one of the following Safes is shared by all CPMs?A . PasswordManagerB . PasswordManager_PendingC . PasswordManager_workspaceD . PasswordManager_ADIntemalView AnswerAnswer: A Explanation: Reference: https://www.niap-ccevs.org/MMO/Product/st_vid11006-agd4.pdf (558)

March 4, 2022 No Comments READ MORE +

Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?

Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?A . Password changeB . Password reconciliationC . Session suspensionD . Session terminationView AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PTA/Security­Configuration.htm

March 3, 2022 No Comments READ MORE +