Which safe permissions must you grant to the Approvers group?
You are creating a Dual Control workflow for a team’s safe. Which safe permissions must you grant to the Approvers group?A . List accounts, Authorize account requestB . Retrieve accounts, Access Safe without confirmationC . Retrieve accounts, Authorize account requestD . List accounts, Unlock accountsView AnswerAnswer: C Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/PVWA-Dual-Control.htm...
Which of the following Privileged Session Management solutions provide a detailed audit log of session activities?
Which of the following Privileged Session Management solutions provide a detailed audit log of session activities?A . PSM (i.e., launching connections by clicking on the "Connect" button in the PVWA)B . PSM for Windows (previously known as RDP Proxy)C . PSM for SSH (previously known as PSM SSH Proxy)D ....
A user with administrative privileges to the vault can only grant other users privileges that he himself has.
A user with administrative privileges to the vault can only grant other users privileges that he himself has.A . TRUEB . FALSEView AnswerAnswer: B
Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”?
Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”? A. Add to Pending B. Rotate Credentials C. Reconcile Credentials D. Disable AccountView AnswerAnswer: C Explanation: Reference: https://cau302.blogspot.com/2021/03/PTA.html
Which CyberArk utility can you use to accomplish this task?
You have been asked to identify the up or down status of Vault services. Which CyberArk utility can you use to accomplish this task?A . Vault ReplicatorB . PAS ReporterC . Remote Control AgentD . SyslogView AnswerAnswer: C Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Remote-Administration-for-the-Vault-DR-Vault.htm?tocpath=Administrator%7CComponents%7CDigital%20Vault%7COperate%20th e%20CyberArk%20Vault%7CMonitor%20the%20Vault%7C_____1
What is the least intrusive way to accomplish this?
In the screenshot displayed, you just configured the usage in CyberArk and want to update its password. What is the least intrusive way to accomplish this?A . Use the “change” button on the usage’s details page.B . Use the “change” button on the parent account’s details page.C . Use the...
Users can be resulted to using certain CyberArk interfaces (e.g.PVWA or PACLI).
Users can be resulted to using certain CyberArk interfaces (e.g.PVWA or PACLI).A . TRUEB . FALSView AnswerAnswer: A
You have associated a logon account to one your UNIX cool accounts in the vault. When attempting to [b]change [/b] the root account’s password the CPM will…..
You have associated a logon account to one your UNIX cool accounts in the vault. When attempting to [b]change [/b] the root account’s password the CPM will…..A . Log in to the system as root, then change root's passwordB . Log in to the system as the logon account, then...
What is the purpose of the Interval setting in a CPM policy?
What is the purpose of the Interval setting in a CPM policy?A . To control how often the CPM looks for System Initiated CPM work.B . To control how often the CPM looks for User Initiated CPM work.C . To control how long the CPM rests between password changes.D ....
Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?
Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?A . Password changeB . Password reconciliationC . Session suspensionD . Session terminationView AnswerAnswer: A