Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?
Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?A . Password change B. Password reconciliation C. Session suspension D. Session terminationView AnswerAnswer: A
By default, members of which built-in groups will be able to view and configure Automatic Remediation and Session Analysis and Response in the PVWA?
By default, members of which built-in groups will be able to view and configure Automatic Remediation and Session Analysis and Response in the PVWA?A . Vault Admins B. Security Admins C. Security Operators D. AuditorsView AnswerAnswer: B
Which keys are required to be present in order to start the PrivateArk Server service?
Which keys are required to be present in order to start the PrivateArk Server service?A . Recovery public key B. Recovery private key C. Server key D. Safe keyView AnswerAnswer: A,C
Which permissions are needed for the Active Directory user required by the Windows Discovery process?
Which permissions are needed for the Active Directory user required by the Windows Discovery process?A . Domain Admin B. LDAP Admin C. Read/Write D. ReadView AnswerAnswer: A
Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)
Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)A . Operating System Username B. Host IP Address C. Client Hostname D. Operating System Type (Linux/Windows/HP-UX) E. Vault IP Address F. Time FrameView AnswerAnswer: A,B,C Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.2/en/Content/PASIMP/CreateCredFile-Utility.htm
In a default CyberArk installation, which group must a user be a member of to view the “reports” page in PVWA?
In a default CyberArk installation, which group must a user be a member of to view the “reports” page in PVWA? A. PVWAMonitor B. ReportUsers C. PVWAReports D. OperatorsView AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ReportsInPVWA.htm?TocPath=End%20User%7CReports%20and%20Audits%7C_____1#:~:text=Reports%20can%20be%20genera ted%20in,this%20is%20the%20PVWAMonitor%20group
Accounts Discovery allows secure connections to domain controllers.
Accounts Discovery allows secure connections to domain controllers.A . TRUE B. FALSEView AnswerAnswer: B
What is the purpose of the Interval setting in a CPM policy?
What is the purpose of the Interval setting in a CPM policy?A . To control how often the CPM looks for System Initiated CPM work. B. To control how often the CPM looks for User Initiated CPM work. C. To control how long the CPM rests between password changes. D....
How much disk space do you need on the server for a PAReplicate?
How much disk space do you need on the server for a PAReplicate?A . 500 GB B. 1 TB C. same as disk size on Satellite Vault D. same as disk size on Primary VaultView AnswerAnswer: D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Installing-the-Vault-Backup-Utility.htm#Beforeinstallation
For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.
For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.A . Create an exception to the Master Policy to exclude the group from the workflow process. B. Edith the...