Accounts Discovery allows secure connections to domain controllers.

Accounts Discovery allows secure connections to domain controllers.A . TRUC . FALSEView AnswerAnswer: A

February 23, 2022 No Comments READ MORE +

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests?

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests?A . HeadStartIntervalB . IntervalC . ImmediateIntervalD . The CPM does not change the password under this circumstanceView AnswerAnswer: C

February 23, 2022 No Comments READ MORE +

Which file needs to be changed on the PVWA to enable this setup?

To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers must to be configured to communicate with the Primary Vault and Satellite Vaults. Which file needs to be changed on the PVWA to enable this setup?A . Vault.iniB . dbparm.iniC . pvwa.iniD . Satellite.iniView AnswerAnswer:...

February 23, 2022 No Comments READ MORE +

The ACME Company has been a CyberArk customer for many years. ACME Management has asked you to perform a “Health Check" review of the CyberArk deployment. During your analysis you discover that the PSM Component server is fully functional. The RDP SSL certificate is self-signed and the CyberArk Privileged Session Management Service is running under the Local Service. SSL 3.0 is enabled in the Registry.

The ACME Company has been a CyberArk customer for many years. ACME Management has asked you to perform a “Health Check" review of the CyberArk deployment. During your analysis you discover that the PSM Component server is fully functional. The RDP SSL certificate is self-signed and the CyberArk Privileged Session...

February 23, 2022 No Comments READ MORE +

Which of the following logs contain information about errors related to PTA?

Which of the following logs contain information about errors related to PTA?A . ITAlog.logB . diamond.logC . pm_error.logD . WebApplication.logView AnswerAnswer: B

February 22, 2022 No Comments READ MORE +

Which combination of safe member permissions will allow End Users to log in to a remote machine transparently but NOT show or copy the password?

Which combination of safe member permissions will allow End Users to log in to a remote machine transparently but NOT show or copy the password?A . Use Accounts, Retrieve Accounts, List AccountsB . Use Accounts, List AccountsC . Use AccountsD . List Accounts, Retrieve AccountsView AnswerAnswer: D

February 22, 2022 1 Comment READ MORE +

tsparm.ini is the main configuration file for the vault.

tsparm.ini is the main configuration file for the vault.A . TRUEB . FALSEView AnswerAnswer: B

February 22, 2022 No Comments READ MORE +

Is it possible to modify the CyberArk Vault Audit Log?

Is it possible to modify the CyberArk Vault Audit Log?A . Yes, a Vault administrator can modify the Audit logB . No, the audit trail is tamper proof and cannot be edited, not even by MasterC . Yes, but only the Master user can modify the Audit logD . Yes,...

February 22, 2022 No Comments READ MORE +

Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)

Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)A . Suspected Credential TheftB . Over-Pass-The-HashC . Golden TicketD . Unmanaged Privileged AccessView AnswerAnswer: A,B

February 22, 2022 1 Comment READ MORE +

Multiple PVWA servers provide automatic load balancing.

Multiple PVWA servers provide automatic load balancing.A . TRUEB . FALSEView AnswerAnswer: B

February 22, 2022 No Comments READ MORE +