Which components can connect to a satellite Vault in distributed Vault architecture?
Match each permission to where it can be found.
Match the connection component to the corresponding OS/Function.
What is the maximum number of levels of authorization you can set up in Dual Control?
Which service should NOT be running on the DR Vault when the primary Production Vault is up?
What is the chief benefit of PSM?
Which parameter must be provided when registering a primary Vault in Azure, but not in Amazon Web Services''
Which of the following options is not set in the Master Policy?
You are creating a shared safe for the help desk.
What must be considered regarding the naming convention?
Which browser is supported for PSM Web Connectors developed using the CyberArk Plugin Generator Utility (PGUP
You want to generate a license capacity report.
Which tool accomplishes this?
Which SMTP address can be set on the Notification Settings page to re-invoke the ENE setup wizard after the initial Vault installation.
Which report could show all accounts that are past their expiration dates?
Which of the following components can be used to create a tape backup of the Vault?
You need to move a platform from using PMTerminal to using Terminal Plugin Controller (TPC) What must you do?
In the Private Ark client, how do you add an LDAP group to a CyberArk group?
The primary purpose of exclusive accounts is to ensure non-repudiation (Individual accountability).
Match the log file name with the CyberArk Component that generates the log.
An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?
The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys.
How are these keys managed?
Which PTA sensors are required to detect suspected credential theft?
Which component must be installed on the Vault if Distributed Vaults is used with PSM?
A customer is moving from an on-premises to a public cloud deployment. What is the best and most cost-effective option to secure the server key?
Your customer has five main data centers with one PVWA in each center under different URLs. How can you make this setup fault tolerant?
To manage automated onboarding rules, a CyberArk user must be a member of which group?
You are onboarding an account that is not supported out of the box.
What should you do first to obtain a platform to import?
The Password upload utility can be used to create safes.
Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?
What is the purpose of the PrivateArk Server service?
What is the easiest way to duplicate an existing platform?
To enable the Automatic response “Add to Pending” within PTA when unmanaged credentials are found, what are the minimum permissions required by PTAUser for the PasswordManager_pending safe?
As long as you are a member of the Vault Admins group, you can grant any permission on any safe that you have access to.
When creating Distributed Vault environment architecture, what is the maximum number of Vault servers that can be deployed''
What is the purpose of the password change process?
Before the hardening process your customer identified a PSM Universal Connector executable that will be required to run on the PSM Which file should you update to allow this to run?
What is the easiest way to duplicate an existing platform?
Select the best practice for storing the Master CD.
Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)
Customers who have the ‘Access Safe without confirmation’ safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.
To ensure all sessions are being recorded, a CyberArk administrator goes to the master policy and makes configuration changes.
Which configuration is correct?
What is mandatory for a PVWA installation?
A new domain controller has been added to your domain. You need to ensure the CyberArk infrastructure can use the new domain controller for authentication.
Which locations must you update?
You have been asked to secure a set of shared accounts in CyberArk whose passwords will need to be used by end users. The account owner wants to be able to track who was using an account at any given moment.
Which security configuration should you recommend?
You are configuring the vault to send syslog audit data to your organization's SIEM solution. What is a valid value for the SyslogServerProtocol parameter in DBPARM.ini file?
Which is the primary purpose of exclusive accounts?
If a customer has one data center and requires high availability, how many PVWA's should be deployed.
A user is receiving the error message “ITATS006E Station is suspended for User jsmith” when attempting to sign into the Password Vault Web Access (PVWA). Which utility would a Vault administrator use to correct this problem?
You receive this error:
“Error in changepass to user domain\user on domain server(\domain.(winRc=5) Access is denied.”
Which root cause should you investigate?
After installing the first PSM server and before installing additional PSM servers you must ensure the user performing the installation is not a direct owner of which safe?
An auditor initiates a live monitoring session to PSM server to view an ongoing live session. When the auditor’s machine makes an RDP connection the PSM server, which user will be used?
One can create exceptions to the Master Policy based on ____________________.
Which of the following logs contains information about errors related to PTA?
Which components support fault tolerance.
Which utilities could you use to change debugging levels on the vault without having to restart the vault. Select all that apply.
In your organization the “click to connect” button is not active by default.
How can this feature be activated?
Which statement is correct concerning accounts that are discovered, but cannot be added to the Vault by an automated onboarding rule?
For Digital Vault Cluster in a high availability configuration, how does the cluster determine if a node is down?
What is the purpose of the HeadStartlnterval setting m a platform?
You are creating a new Rest API user that utilizes CyberArk Authentication.
What is a correct process to provision this user?
Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?
It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.
Due to network activity, ACME Corp’s PrivateArk Server became active on the OR Vault while the Primary Vault was also running normally. All the components continued to point to the Primary Vault.
Which steps should you perform to restore DR replication to normal?
What is the purpose of the CyberArk Event Notification Engine service?
What is the primary purpose of One Time Passwords?
As vault Admin you have been asked to configure LDAP authentication for your organization's CyberArk users. Which permissions do you need to complete this task?
What is the configuration file used by the CPM scanner when scanning UNIX/Linux devices?