Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?

Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?A . Use Accounts, Retrieve Accounts, List Accounts B. Use Accounts, List Accounts C. Use Accounts D. List Accounts, Retrieve AccountsView AnswerAnswer: D

May 19, 2023 No Comments READ MORE +

Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”?

Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”?A . Add to Pending B. Rotate Credentials C. Reconcile Credentials D. Disable AccountView AnswerAnswer: B

May 19, 2023 No Comments READ MORE +

Target account platforms can be restricted to accounts that are stored m specific Safes using the Allowed Safes property.

Target account platforms can be restricted to accounts that are stored m specific Safes using the Allowed Safes property.A . TRUE B. FALSEView AnswerAnswer: A

May 19, 2023 No Comments READ MORE +

What is the easiest way to duplicate an existing platform?

What is the easiest way to duplicate an existing platform?A . From PrivateArk, copy/paste the appropriate Policy.ini file: then rename it. B. from the PVWA, navigate to the platforms page, select the existing platform that is similar to the new target account platform and click Duplicate, name the new platform....

May 19, 2023 No Comments READ MORE +

How are these keys managed?

The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys. How are these keys managed?A . CyberArk stores Private keys in the Vault and updates Public keys on target systems. B. CyberArk stores Public keys in the Vault and updates Private...

May 18, 2023 No Comments READ MORE +

Match each component to its respective Log File location

DRAG DROP Match each component to its respective Log File location. View AnswerAnswer:

May 18, 2023 No Comments READ MORE +

What is the maximum number of levels of authorization you can set up in Dual Control?

What is the maximum number of levels of authorization you can set up in Dual Control?A . 1 B. 2 C. 3 D. 4View AnswerAnswer: B

May 18, 2023 No Comments READ MORE +

A Logon Account can be specified in the Master Policy.

A Logon Account can be specified in the Master Policy.A . TRUE B. FALSEView AnswerAnswer: B

May 18, 2023 No Comments READ MORE +

According to the DEFAULT Web Options settings, which group grants access to the REPORTS page?

According to the DEFAULT Web Options settings, which group grants access to the REPORTS page?A . PVWAUsers B. Vault Admins C. Auditors D. PVWAMonitorView AnswerAnswer: D

May 17, 2023 No Comments READ MORE +

Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire?

Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire? A. Privileged Accounts Inventory B. Privileged Accounts Compliance Status C. Activity Log D. Privileged Accounts CPM StatusView AnswerAnswer: B Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ReportsInPVWA.htm?TocPath=End%20U ser%7CReports%20and%20Audits%7C_____1

May 17, 2023 No Comments READ MORE +