What should you check first?

You are successfully managing passwords in the alpha.cyberark com domain; however when you attempt to manage a password in the beta.cyberark.com domain, you receive the 'network path not found* error. What should you check first?A . That the username and password are correct.B . That the CPM can successfully resolve...

April 14, 2021 No Comments READ MORE +

What is the primary purpose of Dual Control?

What is the primary purpose of Dual Control?A . Reduced risk of credential theftB . More frequent password changesC . Non-repudiation (individual accountability)D . To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorizationView AnswerAnswer: D

April 14, 2021 No Comments READ MORE +

PSM captures a record of each command that was executed in Unix.

PSM captures a record of each command that was executed in Unix.A . TRUEB . FALSEView AnswerAnswer: A

April 14, 2021 No Comments READ MORE +

Which of the following sends out Simple Network Management Protocol (SNMP) traps?

Which of the following sends out Simple Network Management Protocol (SNMP) traps?A . PrivateArk Remote Control AgentB . PrivateArk ServerC . CyberArk Event Notification EngineD . CyberArk SNMP agentView AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Configuring-Remote-Monitoring.htm#_Ref364686578

April 14, 2021 No Comments READ MORE +

Which combination of safe member permissions will allow End Users to log in to a remote machine transparently but NOT show or copy the password?

Which combination of safe member permissions will allow End Users to log in to a remote machine transparently but NOT show or copy the password?A . Use Accounts, Retrieve Accounts, List AccountsB . Use Accounts, List AccountsC . Use AccountsD . List Accounts, Retrieve AccountsView AnswerAnswer: D

April 13, 2021 No Comments READ MORE +

What is the BEST way to allow CPM to manage root accounts?

In accordance with best practice. SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow CPM to manage root accounts?A . Create a privileged account on the target server Allow this account the ability to SSH directly from the CPM machine Configure this...

April 13, 2021 No Comments READ MORE +

What is the purpose of the Interval setting in a CPM policy?

What is the purpose of the Interval setting in a CPM policy?A . To control how often the CPM looks for System Initiated CPM workB . To control how often the CPM looks for User Initiated CPM work.C . To control how long the CPM rests between password changesD ....

April 13, 2021 No Comments READ MORE +

When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?

When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?A . CyberArk Vault Disaster Recovery (DR), PrivateArk DatabaseB . CyberArk Vault Disaster RecoveryC . CyberArk Vault Disaster Recovery, PrivateArk Database, PrivateArk ServerD . CyberArk Vault Disaster Recovery, PrivateArk Database, CyberArk Event Notification...

April 13, 2021 No Comments READ MORE +

When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSM

When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSMA . TrueB . False, when the PSM Gateway is implemented, the user only requires a browser in order launch a connection via the PSMView AnswerAnswer: B

April 13, 2021 No Comments READ MORE +

When a group is granted the ‘Authorize Account Requests’ permission on a safe Dual Control requests must be approved by:

When a group is granted the ‘Authorize Account Requests’ permission on a safe Dual Control requests must be approved by:A . Any one person from that groupB . Every person from that groupC . The number of persons specified by the Master PolicyD . That access cannot be granted to...

April 12, 2021 No Comments READ MORE +