Match the log file name with the CyberArk Component that generates the log

DRAG DROP Match the log file name with the CyberArk Component that generates the log. View AnswerAnswer:

May 13, 2022 No Comments READ MORE +

The System safe allows access to the Vault configuration files.

The System safe allows access to the Vault configuration files.A . TRUEB . FALSEView AnswerAnswer: A

May 13, 2022 No Comments READ MORE +

The Vault supports multiple instances of the following components Choose all that Apply

The Vault supports multiple instances of the following components Choose all that ApplyA . PVWAB . CPMC . PSMD . AIM ProviderView AnswerAnswer: A,B,C

May 13, 2022 No Comments READ MORE +

Which one of the following reports is NOT generated by using the PVWA?

Which one of the following reports is NOT generated by using the PVWA?A . Accounts InventoryB . Application InventoryC . Active/Non-Active UsersD . Compliance StatusView AnswerAnswer: C

May 13, 2022 No Comments READ MORE +

What is the purpose of a password group?

What is the purpose of a password group?A . To ensure that a particular collection of accounts all have the same passwordB . To ensure a particular set of accounts all change at the same timeC . To connect the CPM to a target systemD . To allow more than...

May 13, 2022 No Comments READ MORE +

Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)

Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)A . Suspected Credential TheftB . Over-Pass-The-HashC . Golden TicketD . Unmanaged Privileged AccessView AnswerAnswer: A,B

May 13, 2022 No Comments READ MORE +

Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.

Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.A . Server KeyB . Recovery Public KeyC . Recovery Private KeyD . Safe KeyView AnswerAnswer: A Explanation: Reference: https://www.reddit.com/r/CyberARk/comments/8s96n8/certificat_problem_with_ my_vault/

May 13, 2022 No Comments READ MORE +

What is the purpose of EVD?

What is the purpose of EVD?A . To extract vault metadata into an open database platform.B . To allow editing of vault metadata.C . To create a backup of the MySQL database.D . To extract audit data from the vault.View AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/Landing%20Pages/lpExportVaultDataUtility.htm

May 13, 2022 No Comments READ MORE +

One can create exceptions to the Master Policy based on_________.

One can create exceptions to the Master Policy based on_________.A . SafesB . PlatformsC . PoliciesD . AccountsView AnswerAnswer: B

May 13, 2022 No Comments READ MORE +

Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?

Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?A . TRUEB . FALSEView AnswerAnswer: B

May 13, 2022 No Comments READ MORE +