Within the Vault each password is encrypted by:

Within the Vault each password is encrypted by:A . the server keyB . the recovery public keyC . the recovery private keyD . its own unique keyView AnswerAnswer: D

June 28, 2021 No Comments READ MORE +

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests.

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests.A . HeadStartIntervalB . IntervalC . ImmediateIntervalD . The CPM does not change the password under this circumstanceView AnswerAnswer: B

June 28, 2021 No Comments READ MORE +

When creating an onboarding rule, it will be executed upon .

When creating an onboarding rule, it will be executed upon .A . All accounts in the pending accounts listB . Any future accounts discovered by a discovery processC . Both “All accounts in the pending accounts list” and “Any future accounts discovered by a discovery process”View AnswerAnswer: B

June 27, 2021 No Comments READ MORE +

Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)

Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)A . Store the CD in a physical safe and mount the CD every time Vault maintenance is performedB . Copy...

June 27, 2021 No Comments READ MORE +

It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur

It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occurA . TRUEB . FALSEView AnswerAnswer: A Explanation: Password verification can be restricted to specific days. This means that the CPM will only verify passwords on the days of the week specified...

June 26, 2021 No Comments READ MORE +

CyberArk recommends implementing object level access control on all Safes.

CyberArk recommends implementing object level access control on all Safes.A . TrueB . FalseView AnswerAnswer: B

June 25, 2021 No Comments READ MORE +

What is the purpose of the PrivateArk Server service?

What is the purpose of the PrivateArk Server service?A . Executes password changesB . Maintains Vault metadataC . Makes Vault data accessible to componentsD . Sends email alerts from the VaultView AnswerAnswer: C

June 24, 2021 No Comments READ MORE +

Customers who have the ‘Access Safe without confirmation’ safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.

Customers who have the ‘Access Safe without confirmation’ safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.A . TRUEB . FALSEView AnswerAnswer: B

June 24, 2021 No Comments READ MORE +

In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?

In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?A . True.B . False. Because the user can also enter credentials manually using Secure Connect.C . False. Because if credentials are not stored in the vault, the...

June 23, 2021 No Comments READ MORE +

What is the purpose of the Immediate Interval setting in a CPM policy?

What is the purpose of the Immediate Interval setting in a CPM policy?A . To control how often the CPM looks for System Initiated CPM work.B . To control how often the CPM looks for User Initiated CPM work.C . To control how often the CPM rests between password changes.D...

June 23, 2021 No Comments READ MORE +