Which usage can be added as a service account platform?
Which usage can be added as a service account platform?A . Kerberos Tokens B. IIS Application Pools C. PowerShell Libraries D. Loosely Connected DevicesView AnswerAnswer: D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.3/en/Content/PASIMP/LooselyConnectedDevices.htm
Which safe permissions must you grant to the Approvers group?
You are creating a Dual Control workflow for a team’s safe. Which safe permissions must you grant to the Approvers group?A . List accounts, Authorize account request B. Retrieve accounts, Access Safe without confirmation C. Retrieve accounts, Authorize account request D. List accounts, Unlock accountsView AnswerAnswer: C Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/PVWA-Dual-Control.htm...
Which components support fault tolerance.
Which components support fault tolerance.A . CPM and PVWA B. PVWA and PSM C. PSM and PTA D. CPM and PTAView AnswerAnswer: B
It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occur
It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occurA . TRUE B. FALSView AnswerAnswer: A Explanation: Password reconciliation can be restricted to specific days. This means that the CPM will only reconcile passwords on the days of the week specified...
Which user ID is used to establish the RDP connection to the PSM server?
An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?A . PSMConnect B. PSMMaster C. PSMGwUser D. PSMAdminConnectView AnswerAnswer: D
Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?
Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?A . Yes, when using the connect button, CyberArk uses the PMTerminal.exe process which bypasses the root SSH restriction. B. Yes, only if a logon account is...
What is a requirement for setting fault tolerance for PSMs?
What is a requirement for setting fault tolerance for PSMs?A . Use a load balancer B. use a backup solution C. CPM must be in all data centers D. Install the Vault in an HA ClusterView AnswerAnswer: A
It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur
It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occurA . TRUE B. FALSEView AnswerAnswer: A Explanation: Password verification can be restricted to specific days. This means that the CPM will only verify passwords on the days of the week specified...
CyberArk recommends implementing object level access control on all Safes.
CyberArk recommends implementing object level access control on all Safes.A . True B. FalseView AnswerAnswer: B
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?A . Configure the Provider to change the password to match the Vault’s Password B. Associate a reconcile account and configure the platform to reconcile...