Which security configuration should you recommend?

You have been asked to secure a set of shared accounts in CyberArk whose passwords will need to be used by end users. The account owner wants to be able to track who was using an account at any given moment. Which security configuration should you recommend?A . Configure one-time...

March 3, 2022 No Comments READ MORE +

Which utility would a Vault administrator use to correct this problem?

A user is receiving the error message “ITATS006E Station is suspended for User jsmith” when attempting to sign into the Password Vault Web Access (PVWA) . Which utility would a Vault administrator use to correct this problem?A . createcredfile.exeB . cavaultmanager.exeC . PrivateArkD . PVWAView AnswerAnswer: C

March 3, 2022 No Comments READ MORE +

What is the issue?

user has successfully conducted a short PSM session and logged off. However, the user cannot access the Monitoring tab to view the recordings. What is the issue?A . The user must login as PSMAdminConnectB . The PSM service is not runningC . The user is not a member of the...

March 2, 2022 No Comments READ MORE +

What is the purpose of the Interval setting in a CPM policy?

What is the purpose of the Interval setting in a CPM policy?A . To control how often the CPM looks for System Initiated CPM work.B . To control how often the CPM looks for User Initiated CPM work.C . To control how long the CPM rests between password changes.D ....

March 2, 2022 No Comments READ MORE +

Which configuration is correct?

To ensure all sessions are being recorded, a CyberArk administrator goes to the master policy and makes configuration changes. Which configuration is correct?A . Require privileged session monitoring and isolation = inactive; Record and save session activity = active.B . Require privileged session monitoring and isolation = inactive; Record and...

March 2, 2022 No Comments READ MORE +

What is the maximum number of levels of authorization you can set up in Dual Control?

What is the maximum number of levels of authorization you can set up in Dual Control?A . 1B . 2C . 3D . 4View AnswerAnswer: B

March 2, 2022 No Comments READ MORE +

CyberArk recommends implementing object level access control on all Safes.

CyberArk recommends implementing object level access control on all Safes.A . TrueB . FalseView AnswerAnswer: B

March 2, 2022 No Comments READ MORE +

Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.

Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.A . Discovery and Audit (DMA)B . Auto Detection (AD)C . Export Vault Data (EVD)D . On Demand Privileges Manager (OPM)E . Accounts DiscoveryView AnswerAnswer: A,B,E

March 1, 2022 No Comments READ MORE +

VAULT authorizations may be granted to_____.

VAULT authorizations may be granted to_____.A . Vault UsersB . Vault GroupsC . LDAP UsersD . LDAP GroupsView AnswerAnswer: AC

March 1, 2022 No Comments READ MORE +

Which piece of the platform is missing?

A newly created platform allows users to access a Linux endpoint. When users click to connect, nothing happens. Which piece of the platform is missing?A . PSM-SSH Connection ComponentB . UnixPrompts.iniC . UnixProcess.iniD . PSM-RDP Connection ComponentView AnswerAnswer: D

March 1, 2022 No Comments READ MORE +