Access Control to passwords is implemented by ________________.

Access Control to passwords is implemented by ________________.A . Virtual AuthorizationsB . Safe AuthorizationsC . Master PolicyD . Platform SettingsView AnswerAnswer: B

March 2, 2022 No Comments READ MORE +

Which of the following sends out Simple Network Management Protocol (SNMP) traps?

Which of the following sends out Simple Network Management Protocol (SNMP) traps?A . PrivateArk Remote Control AgentB . PrivateArk ServerC . CyberArk Event Notification EngineD . CyberArk SNMP agentView AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Configuring-Remote-Monitoring.htm#_Ref364686578

March 2, 2022 No Comments READ MORE +

It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.

It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.A . TRUEB . FALSEView AnswerAnswer: A

March 1, 2022 No Comments READ MORE +

Which of the following are prerequisites for installing PVWA Check all that Apply

Which of the following are prerequisites for installing PVWA Check all that ApplyA . Web Services RoleB . NET 4.5.1 Framework FeatureC . Remote Desktop Services RoleD . Windows BitLockerView AnswerAnswer: A

March 1, 2022 No Comments READ MORE +

Which is the purpose of the HeadStartInterval setting in a platform?

Which is the purpose of the HeadStartInterval setting in a platform?A . It determines how far in advance audit data is collected for reports.B . It instructs the CPM to initiate the password change process certain number of days before expiration.C . It instructs the AIM provider to 'skip the...

March 1, 2022 No Comments READ MORE +

Which file is used to configure new firewall rules on the Vault?

Which file is used to configure new firewall rules on the Vault?A . firewall.iniB . PARagent.iniC . dbparm.iniD . padr.iniView AnswerAnswer: C Explanation: Reference: https://www.reddit.com/r/CyberARk/comments/at0q56/open_ports_cyberark_vault/

March 1, 2022 No Comments READ MORE +

Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.

Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.A . Server KeyB . Recovery Public KeyC . Recovery Private KeyD . Safe KeyView AnswerAnswer: A Explanation: Reference: https://www.reddit.com/r/CyberARk/comments/8s96n8/certificat_problem_with_ my_vault/

February 28, 2022 No Comments READ MORE +

What is the BEST way to allow CPM to manage root accounts?

In accordance with best practice. SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow CPM to manage root accounts?A . Create a privileged account on the target server Allow this account the ability to SSH directly from the CPM machine Configure this...

February 28, 2022 No Comments READ MORE +

In Accounts Discovery, you can configure a Windows discovery to scan______________.

In Accounts Discovery, you can configure a Windows discovery to scan______________.A . as many OUs as you wishB . up to three OUs.C . only one OE . a number of OUs determined by the OUstoScan setting under the Accounts Feed section in the Administration tabView AnswerAnswer: C

February 28, 2022 No Comments READ MORE +

Which of these accounts onboarding methods is considered proactive?

Which of these accounts onboarding methods is considered proactive?A . Accounts DiscoveryB . Detecting accounts with PTAC . A Rest API integration with account provisioning softwareD . A DNA scanView AnswerAnswer: B

February 28, 2022 No Comments READ MORE +