The Vault supports multiple instances of the following components Choose all that Apply

The Vault supports multiple instances of the following components Choose all that ApplyA . PVWAB . CPMC . PSMD . AIM ProviderView AnswerAnswer: A,B,C

April 3, 2021 No Comments READ MORE +

What is the purpose of the password Change process?

What is the purpose of the password Change process?A . To test that CyberArk is storing accurate credentials for accountsB . To change the password of an account according to organizationally defined password rulesC . To allow CyberArk to manage unknown or lost credentialsD . To generate a new complex...

April 3, 2021 No Comments READ MORE +

In Accounts Discovery, you can configure a Windows discovery to scan______________.

In Accounts Discovery, you can configure a Windows discovery to scan______________.A . as many OUs as you wishB . up to three OUs.C . only one OE . a number of OUs determined by the OUstoScan setting under the Accounts Feed section in the Administration tabView AnswerAnswer: C

April 2, 2021 No Comments READ MORE +

Access Control to passwords is implemented by ________________.

Access Control to passwords is implemented by ________________.A . Virtual AuthorizationsB . Safe AuthorizationsC . Master PolicyD . Platform SettingsView AnswerAnswer: B

April 2, 2021 No Comments READ MORE +

The Application Inventory report is related to AIM.

The Application Inventory report is related to AIM.A . TRUEB . FALSEView AnswerAnswer: A

April 2, 2021 No Comments READ MORE +

Accounts Discovery allows secure connections to domain controllers.

Accounts Discovery allows secure connections to domain controllers.A . TRUC . FALSEView AnswerAnswer: A

April 2, 2021 No Comments READ MORE +

When creating an onboarding rule, it will be executed upon.

When creating an onboarding rule, it will be executed upon.A . All accounts in the pending accounts list.B . Any future accounts discovered by a discovery process.C . All accounts in the pending accounts list and any future accounts discovered by a discovery process.View AnswerAnswer: B Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Managing-Discovery-Processes.htm

April 1, 2021 No Comments READ MORE +

Which file is used to configure the ENE service?

Which file is used to configure the ENE service?A . ENB . iniC . ENEConfig.iniD . dbparm.iniE . paragent.iniView AnswerAnswer: C

April 1, 2021 No Comments READ MORE +

Which credentials does CyberArk use when managing a target account?

Which credentials does CyberArk use when managing a target account?A . Those of the service account for the CyberArk Password Manager serviceB . A Domain Administrator account created for this purposeC . The credentials of the target accountD . An account assigned by the Master PolicyView AnswerAnswer: A

April 1, 2021 2 Comments READ MORE +

It is possible to control the hours of the day during which a safe may be used.

It is possible to control the hours of the day during which a safe may be used.A . TRUEB . FALSEView AnswerAnswer: A

April 1, 2021 No Comments READ MORE +