What is the purpose of the password verify process?

What is the purpose of the password verify process?A . To test that CyberArk is storing accurate credentials for accounts.B . To change the password of an account according to organizationally defined password rules.C . To allow CyberArk to manage unknown or lost credentials.D . To generate a new complex...

May 11, 2022 No Comments READ MORE +

You have associated a logon account to one of your UNIX root accounts in the vault When attempting to verify the root account's password the CPM will...

You have associated a logon account to one of your UNIX root accounts in the vault When attempting to verify the root account's password the CPM will...A . Ignore the logon account and attempt to log in as root.B . Prompt the end user with a dialog box asking for...

May 11, 2022 No Comments READ MORE +

If a transparent user belongs two different directory mappings, how does the system determine which user template to use?

If a transparent user belongs two different directory mappings, how does the system determine which user template to use?A . The system will use the template for the mapping listed first.B . The system will use the template for the mapping listed last.C . The system will grant all of...

May 11, 2022 No Comments READ MORE +

A logon account can be specified in the platform settings.

A logon account can be specified in the platform settings.A . TrueB . FalseView AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Configuring-Accounts-for-Automatic-Management.htm

May 11, 2022 No Comments READ MORE +

A SIEM integration allows you to forward ITALOG records to a monitoring solution.

A SIEM integration allows you to forward ITALOG records to a monitoring solution.A . TRUEB . FALSEView AnswerAnswer: B

May 11, 2022 No Comments READ MORE +

What is the chief benefit of PSM?

What is the chief benefit of PSM?A . Privileged session isolationB . Automatic password managementC . Privileged session recordingD . Privileged session isolation and privileged session recordingView AnswerAnswer: D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20SysReq/System%20Requirements%20-%20PSM.htm

May 10, 2022 No Comments READ MORE +

A SIEM integration allows you to forward audit records to a monitoring solution.

A SIEM integration allows you to forward audit records to a monitoring solution.A . TRUEB . FALSEView AnswerAnswer: A

May 10, 2022 No Comments READ MORE +

When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSM

When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSMA . TrueB . False, when the PSM Gateway is implemented, the user only requires a browser in order launch a connection via the PSMView AnswerAnswer: B

May 10, 2022 No Comments READ MORE +

Is it possible to modify the CyberArk Vault Audit Log?

Is it possible to modify the CyberArk Vault Audit Log?A . Yes, a Vault administrator can modify the Audit logB . No, the audit trail is tamper proof and cannot be edited, not even by MasterC . Yes, but only the Master user can modify the Audit logD . Yes,...

May 10, 2022 No Comments READ MORE +

What is the purpose of the password Change process?

What is the purpose of the password Change process?A . To test that CyberArk is storing accurate credentials for accountsB . To change the password of an account according to organizationally defined password rulesC . To allow CyberArk to manage unknown or lost credentialsD . To generate a new complex...

May 10, 2022 No Comments READ MORE +