Which usage can be added as a service account platform?

Which usage can be added as a service account platform?A . Kerberos Tokens B. IIS Application Pools C. PowerShell Libraries D. Loosely Connected DevicesView AnswerAnswer: D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.3/en/Content/PASIMP/LooselyConnectedDevices.htm

May 21, 2023 No Comments READ MORE +

Which safe permissions must you grant to the Approvers group?

You are creating a Dual Control workflow for a team’s safe. Which safe permissions must you grant to the Approvers group?A . List accounts, Authorize account request B. Retrieve accounts, Access Safe without confirmation C. Retrieve accounts, Authorize account request D. List accounts, Unlock accountsView AnswerAnswer: C Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/PVWA-Dual-Control.htm...

May 21, 2023 No Comments READ MORE +

Which components support fault tolerance.

Which components support fault tolerance.A . CPM and PVWA B. PVWA and PSM C. PSM and PTA D. CPM and PTAView AnswerAnswer: B

May 21, 2023 No Comments READ MORE +

It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occur

It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occurA . TRUE B. FALSView AnswerAnswer: A Explanation: Password reconciliation can be restricted to specific days. This means that the CPM will only reconcile passwords on the days of the week specified...

May 20, 2023 No Comments READ MORE +

Which user ID is used to establish the RDP connection to the PSM server?

An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?A . PSMConnect B. PSMMaster C. PSMGwUser D. PSMAdminConnectView AnswerAnswer: D

May 20, 2023 No Comments READ MORE +

Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?

Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?A . Yes, when using the connect button, CyberArk uses the PMTerminal.exe process which bypasses the root SSH restriction. B. Yes, only if a logon account is...

May 20, 2023 No Comments READ MORE +

What is a requirement for setting fault tolerance for PSMs?

What is a requirement for setting fault tolerance for PSMs?A . Use a load balancer B. use a backup solution C. CPM must be in all data centers D. Install the Vault in an HA ClusterView AnswerAnswer: A

May 20, 2023 No Comments READ MORE +

It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur

It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occurA . TRUE B. FALSEView AnswerAnswer: A Explanation: Password verification can be restricted to specific days. This means that the CPM will only verify passwords on the days of the week specified...

May 20, 2023 No Comments READ MORE +

CyberArk recommends implementing object level access control on all Safes.

CyberArk recommends implementing object level access control on all Safes.A . True B. FalseView AnswerAnswer: B

May 20, 2023 No Comments READ MORE +

If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?

If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?A . Configure the Provider to change the password to match the Vault’s Password B. Associate a reconcile account and configure the platform to reconcile...

May 19, 2023 No Comments READ MORE +