Which of these accounts onboarding methods is considered proactive?

Which of these accounts onboarding methods is considered proactive?A . Accounts DiscoveryB . Detecting accounts with PTAC . A Rest API integration with account provisioning softwareD . A DNA scanView AnswerAnswer: B

May 13, 2022 No Comments READ MORE +

According to the default web options settings, which group grants access to the reports page?

According to the default web options settings, which group grants access to the reports page? A. PVWAMonitor B. PVWAUsers C. Auditors D. Vault administratorsView AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ReportsInPVWA.htm

May 12, 2022 No Comments READ MORE +

What file needs to be changed on the PVWA to enable this setup?

To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers need to be configured to communicate with the Primary Vault and Satellite Vaults. What file needs to be changed on the PVWA to enable this setup?A . Vault.iniB . dbparm.iniC . pvwa.iniD . Satellite.iniView AnswerAnswer:...

May 12, 2022 No Comments READ MORE +

The ACME Company has been a CyberArk customer for many years. ACME Management has asked you to perform a “Health Check" review of the CyberArk deployment. During your analysis you discover that the PSM Component server is fully functional. The RDP SSL certificate is self-signed and the CyberArk Privileged Session Management Service is running under the Local Service. SSL 3.0 is enabled in the Registry.

The ACME Company has been a CyberArk customer for many years. ACME Management has asked you to perform a “Health Check" review of the CyberArk deployment. During your analysis you discover that the PSM Component server is fully functional. The RDP SSL certificate is self-signed and the CyberArk Privileged Session...

May 12, 2022 No Comments READ MORE +

When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?

When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?A . CyberArk Vault Disaster Recovery (DR), PrivateArk DatabaseB . CyberArk Vault Disaster RecoveryC . CyberArk Vault Disaster Recovery, PrivateArk Database, PrivateArk ServerD . CyberArk Vault Disaster Recovery, PrivateArk Database, CyberArk Event Notification...

May 12, 2022 No Comments READ MORE +

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests?

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests?A . HeadStartIntervalB . IntervalC . ImmediateIntervalD . The CPM does not change the password under this circumstanceView AnswerAnswer: C

May 12, 2022 No Comments READ MORE +

Name two ways of viewing the ITAlog:

Name two ways of viewing the ITAlog:A . Log into the vault locally and navigate to the Server folder under the PrivateArk install location.B . Log into the PVWA and go to the Reports tab.C . Access the System Safe from the PrivateArk client.D . Go to the Thirdpary log...

May 12, 2022 No Comments READ MORE +

What is the BEST way to allow CPM to manage root accounts?

In accordance with best practice. SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow CPM to manage root accounts?A . Create a privileged account on the target server Allow this account the ability to SSH directly from the CPM machine Configure this...

May 11, 2022 No Comments READ MORE +

Which Master Policy?

Which Master Policy?A . Password Expiration TimeB . Enabling and Disabling of the Connection Through the PSMC . Password ComplexityD . The use of "One-Time-Passwords"View AnswerAnswer: C

May 11, 2022 No Comments READ MORE +

What is the purpose of the password Reconcile process?

What is the purpose of the password Reconcile process?A . To test that CyberArk is storing accurate credentials for accounts.B . To change the password of an account according to organizationally defined password rules.C . To allow CyberArk to manage unknown or lost credentials.D . To generate a new complex...

May 11, 2022 No Comments READ MORE +