Which of the Following can be configured in the Master Policy? Choose all that apply.
Which of the Following can be configured in the Master Policy? Choose all that apply.A . Dual ControlB . One Time PasswordsC . Exclusive PasswordsD . Password ReconciliationE . Ticketing IntegrationF . Required PropertiesG . Custom Connection ComponentsH . Password Aging RulesView AnswerAnswer: ABGH
What should you check first?
You are successfully managing passwords in the alpha.cyberark.com domain; however, when you attempt to manage a password in the beta.cyberark.com domain, you receive the ‘network path not found’ error. What should you check first?A . That the username and password are correct.B . That the CPM can successfully resolve addresses...
An SMTP integration allows you to forward audit records to a monitoring solution.
An SMTP integration allows you to forward audit records to a monitoring solution.A . TRUEB . FALSEView AnswerAnswer: B
In an SIEM integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SIEM server address(es).
In an SIEM integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SIEM server address(es).A . TRUEB . FALSEView AnswerAnswer: B
What is the PRIMARY reason for installing more than 1 active CPM?
What is the PRIMARY reason for installing more than 1 active CPM?A . Installing CPMs in multiple sites prevents complex firewall rules to manage devices at remote sites.B . Multiple instances create fault tolerance.C . Multiple instances increase response time.D . Having additional CPMs increases the maximum number of devices...
The Vault supports multiple instances of the following components. Choose all that Apply.
The Vault supports multiple instances of the following components. Choose all that Apply.A . PVWAB . CPMC . PSMD . AIM ProviderView AnswerAnswer: ABC
What is the BEST way to allow CPM to manage root accounts?
In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow CPM to manage root accounts?A . Create a privileged account on the target server. Allow this account the ability to SSH directly from the CPM machine. Configure this...
The Vault Internal safe contains all of the configuration for the vault.
The Vault Internal safe contains all of the configuration for the vault.A . TRUEB . FALSEView AnswerAnswer: A
It is impossible to override Mater Policy settings for a Platform
It is impossible to override Mater Policy settings for a PlatformA . TRUEB . FALSEView AnswerAnswer: B
The vault server uses a modified version of the Microsoft Windows firewall.
The vault server uses a modified version of the Microsoft Windows firewall.A . TRUEB . FALSEView AnswerAnswer: B