One can create exceptions to the Master Policy based on ____________________.
A customer's environment three data centers, consisting of 5,000 servers in Germany, 10,000 servers in Canada, 1,500 servers in Singapore. You want to manage target servers and avoid complex firewall rules. How many CPM's should you deploy?
SAFE Authorizations may be granted to____________.
Select all that apply.
Your organization requires all passwords be rotated every 90 days.
Where can you set this regulatory requirement?
Which of the following options is not set in the Master Policy?
Match each key to its recommended storage location.
Which of these accounts onboarding methods is considered proactive?
When a group is granted the 'Authorize Account Requests' permission on a safe Dual Control requests must be approved by
You have been asked to configure SNMP remote monitoring for your organization's Vault servers. In the PARAgent.ini, which parameter specifies the destination of the Vault SNMP Traps?
What is the purpose of a linked account?
A customer is deploying PVWAs in the Amazon Web Services Public Cloud. Which load balancing option does CyberArk recommend?
You are installing multiple PVWAs behind a load balancer. Which statement is correct?
Which components support fault tolerance.
Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire?
It is possible to control the hours of the day during which a user may log into the vault.
What is the purpose of the password change process?
A Vault administrator have associated a logon account to one of their Unix root accounts in the vault. When attempting to verify the root account’s password the Central Policy Manager (CPM) will:
What is the purpose of the CyberArk Event Notification Engine service?
Platform settings are applied to _________.
For a safe with Object Level Access enabled you can turn off Object Level Access Control when it no longer needed on the safe.
In addition to disabling Windows services or features not needed for PVWA operations, which tasks does PVWA Hardening.ps1 perform when run?
Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
Which authentication methods does PSM for SSH support?
How much disk space do you need on the server for a PAReplicate?
It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.
In addition to bit rate and estimated total duration of recordings per day, what is needed to determine the amount of storage required for PSM recordings?
What is the purpose of the Interval setting in a CPM policy?
Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?
Match each permission to where it can be found.
You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How should this be configured to allow for password management using least privilege?
A Logon Account can be specified in the Master Policy.