The connect button requires PSM to work.

The connect button requires PSM to work.A . TRUEB . FALSEView AnswerAnswer: B

December 21, 2023 No Comments READ MORE +

What would be a good use case for the Disaster Recovery module?

What would be a good use case for the Disaster Recovery module?A . Recovery Time Objectives or Recovery Point Objectives are at or near zero.B . Integration with an Enterprise Backup Solution is required.C . Off site replication is required.D . PSM is used.View AnswerAnswer: C

December 21, 2023 No Comments READ MORE +

At what point is a transparent user provisioned in the vault?

At what point is a transparent user provisioned in the vault?A . When a directory mapping matching that user id is created.B . When a vault admin runs LDAP configuration wizard.C . The first time the user logs in.D . During the vault's nightly LD|^P refreshView AnswerAnswer: A

December 21, 2023 No Comments READ MORE +

The security of the Vault Server is entirely dependent on the security of the network.

The security of the Vault Server is entirely dependent on the security of the network.A . TRUEB . FALSEView AnswerAnswer: B

December 20, 2023 No Comments READ MORE +

The PrivateArk clients allows a user to view the contents of the vault like a filesystem.

The PrivateArk clients allows a user to view the contents of the vault like a filesystem.A . TRUEB . FALSEView AnswerAnswer: A

December 20, 2023 No Comments READ MORE +

By default, the vault secure protocol uses which IP port and protocol.

By default, the vault secure protocol uses which IP port and protocol.A . TCP/1858B . TCP/443C . UDP/1858D . TCP/80View AnswerAnswer: A Explanation: Reference: http://docplayer.net/53689072-The-cyberark-digital-vault-built-for-security.html

December 19, 2023 No Comments READ MORE +

After a PSM session is complete, the PSM server uploads the recording to the Vault for long-term storage.

After a PSM session is complete, the PSM server uploads the recording to the Vault for long-term storage.A . TRUEB . FALSEView AnswerAnswer: A

December 19, 2023 No Comments READ MORE +

When a DR vault server becomes an active vault, it will automatically fail back to the original state once the primary vault comes back online.

When a DR vault server becomes an active vault, it will automatically fail back to the original state once the primary vault comes back online.A . True, this is the default behaviorB . False, this is not possibleC . True, if the 'AllowFailback' setting is set to yes in the...

December 17, 2023 No Comments READ MORE +

Which of the following are supported authentication methods for CyberArk? Check all that apply

Which of the following are supported authentication methods for CyberArk? Check all that applyA . CyberArk Password (SRP)B . LDAPC . SAMLD . PKIE . RADIUSF . OracleSSOG . BiometricView AnswerAnswer: BDE Explanation: Reference: https://training.cyberark.com/instructor-led-training/cyberark-privileged-account-security-pas-install-and-configure

December 17, 2023 No Comments READ MORE +

Which file would you modify to configure the vault to send SNMP traps to your monitoring solution?

Which file would you modify to configure the vault to send SNMP traps to your monitoring solution?A . dbparm iniB . paragent.iniC . ENEConf.ini ID . padr iniView AnswerAnswer: B

December 17, 2023 No Comments READ MORE +