The DR module allows an integration with Enterprise Backup software.

The DR module allows an integration with Enterprise Backup software.A . TRUEB . FALSEView AnswerAnswer: B

November 9, 2020 No Comments READ MORE +

When managing SSH keys, CPM automatically pushes the Private Key to all systems that use it.

When managing SSH keys, CPM automatically pushes the Private Key to all systems that use it.A . TRUEB . FALSEView AnswerAnswer: A

November 9, 2020 No Comments READ MORE +

In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.

In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.A . TRUEB . FALSEView AnswerAnswer: A

November 9, 2020 No Comments READ MORE +

Which of the following options is not set in the Master Policy?

Which of the following options is not set in the Master Policy?A . Password Expiration TimeB . Enabling and Disabling of the Connection Through the PSMC . Password ComplexityD . The use of “One-Time Passwords”View AnswerAnswer: C

November 9, 2020 No Comments READ MORE +

It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.

It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.A . TRUEB . FALSEView AnswerAnswer: A

November 8, 2020 No Comments READ MORE +

Which one of the built-in Vault users is not automatically added to the safe when it is first created in PWA?

Which one of the built-in Vault users is not automatically added to the safe when it is first created in PWA?A . MasterB . AdministratorC . AuditorD . OperatorView AnswerAnswer: B

November 8, 2020 No Comments READ MORE +

What is the BEST way to allow CPM to manage root accounts?

In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow CPM to manage root accounts?A . Create a privileged account on the target server. Allow this account the ability to SSH directly from the CPM machine. Configure this...

November 8, 2020 No Comments READ MORE +

In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?

In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?A . True.B . False. Because the user can also enter credentials manually using Secure Connect.C . False. Because if credentials are not stored in the vault, the...

November 7, 2020 No Comments READ MORE +

One time passwords reduce the risk of Pass the Hash vulnerabilities in Windows.

One time passwords reduce the risk of Pass the Hash vulnerabilities in Windows.A . TRUEB . FALSEView AnswerAnswer: B

November 7, 2020 No Comments READ MORE +

Which of the following statements are NOT true when enabling PSM recording for a target Windows server?

Which of the following statements are NOT true when enabling PSM recording for a target Windows server?A . The PSM software must be installed on the target server.B . PSM must be enabled in the Master Policy (either directly, or through exception).C . PSM Connect must be added as a...

November 6, 2020 No Comments READ MORE +