DRAG DROP Match the log file name with the CyberArk Component that generates the log. View Answer Answer:...
The System safe allows access to the Vault configuration files.
The System safe allows access to the Vault configuration files.A . TRUEB . FALSE View Answer Answer: A...
The Vault supports multiple instances of the following components Choose all that Apply
The Vault supports multiple instances of the following components Choose all that ApplyA . PVWAB . CPMC . PSMD . AIM Provider View Answer Answer: A,B,C...
Which one of the following reports is NOT generated by using the PVWA?
Which one of the following reports is NOT generated by using the PVWA?A . Accounts InventoryB . Application InventoryC . Active/Non-Active UsersD . Compliance Status View Answer Answer: C...
What is the purpose of a password group?
What is the purpose of a password group?A . To ensure that a particular collection of accounts all have the same passwordB . To ensure a particular set of accounts all change at the same timeC . To connect the CPM to a target systemD . To allow more than one account to work...
Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)
Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)A . Suspected Credential TheftB . Over-Pass-The-HashC . Golden TicketD . Unmanaged Privileged Access View Answer Answer: A,B...
Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.
Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.A . Server KeyB . Recovery Public KeyC . Recovery Private KeyD . Safe Key View Answer Answer: A Explanation: Reference: https://www.reddit.com/r/CyberARk/comments/8s96n8/certificat_problem_with_ my_vault/...
What is the purpose of EVD?
What is the purpose of EVD?A . To extract vault metadata into an open database platform.B . To allow editing of vault metadata.C . To create a backup of the MySQL database.D . To extract audit data from the vault. View Answer Answer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/Landing%20Pages/lpExportVaultDataUtility.htm...
One can create exceptions to the Master Policy based on_________.
One can create exceptions to the Master Policy based on_________.A . SafesB . PlatformsC . PoliciesD . Accounts View Answer Answer: B...
Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?
Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?A . TRUEB . FALSE View Answer Answer: B...