The Vault Internal safe contains all of the configuration for the vault.
The Vault Internal safe contains all of the configuration for the vault.A . TRUEB . FALSEView AnswerAnswer: A
According to the default web options settings, which group grants access to the reports page?
According to the default web options settings, which group grants access to the reports page? A. PVWAMonitor B. PVWAUsers C. Auditors D. Vault administratorsView AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ReportsInPVWA.htm
Which one of the following reports is NOT generated by using the PVWA?
Which one of the following reports is NOT generated by using the PVWA?A . Accounts InventoryB . Application InventoryC . Active/Non-Active UsersD . Compliance StatusView AnswerAnswer: C
You have associated a logon account to one of your UNIX root accounts in the vault When attempting to verify the root account's password the CPM will...
You have associated a logon account to one of your UNIX root accounts in the vault When attempting to verify the root account's password the CPM will...A . Ignore the logon account and attempt to log in as root.B . Prompt the end user with a dialog box asking for...
Auto-Detection can be configured to leverage LDAP/S.
Auto-Detection can be configured to leverage LDAP/S.A . TRUEB . FALSEView AnswerAnswer: A
A SIEM integration allows you to forward ITALOG records to a monitoring solution.
A SIEM integration allows you to forward ITALOG records to a monitoring solution.A . TRUEB . FALSEView AnswerAnswer: B
A SIEM integration allows you to forward audit records to a monitoring solution.
A SIEM integration allows you to forward audit records to a monitoring solution.A . TRUEB . FALSEView AnswerAnswer: A
In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?
In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?A . AAM Credential Provider (previously known as AIM Credential Provider)B . ExportVaultData utilityC . PAReplicate utilityD . Central Policy ManagerView AnswerAnswer: D
Which utility can be used to copy a server key to an HSM?
Which utility can be used to copy a server key to an HSM?A . PrivateArk ClientB . A proprietary utility provided by the HSM VendorC . ChangeServerKeys.exeD . CAVaultManager.exeView AnswerAnswer: B Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Distributed-Vault-HSM.htm
Which safe permissions do you need to grant to UnixAdmins?
All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe The members of the AD group UnixAdmms need to be able to use the show, copy, and connect buttons on those passwords at any time without...