Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?
Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?A . Use Accounts, Retrieve Accounts, List Accounts B. Use Accounts, List Accounts C. Use Accounts D. List Accounts, Retrieve AccountsView AnswerAnswer: D
Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”?
Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”?A . Add to Pending B. Rotate Credentials C. Reconcile Credentials D. Disable AccountView AnswerAnswer: B
Target account platforms can be restricted to accounts that are stored m specific Safes using the Allowed Safes property.
Target account platforms can be restricted to accounts that are stored m specific Safes using the Allowed Safes property.A . TRUE B. FALSEView AnswerAnswer: A
What is the easiest way to duplicate an existing platform?
What is the easiest way to duplicate an existing platform?A . From PrivateArk, copy/paste the appropriate Policy.ini file: then rename it. B. from the PVWA, navigate to the platforms page, select the existing platform that is similar to the new target account platform and click Duplicate, name the new platform....
How are these keys managed?
The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys. How are these keys managed?A . CyberArk stores Private keys in the Vault and updates Public keys on target systems. B. CyberArk stores Public keys in the Vault and updates Private...
Match each component to its respective Log File location
DRAG DROP Match each component to its respective Log File location. View AnswerAnswer:
What is the maximum number of levels of authorization you can set up in Dual Control?
What is the maximum number of levels of authorization you can set up in Dual Control?A . 1 B. 2 C. 3 D. 4View AnswerAnswer: B
A Logon Account can be specified in the Master Policy.
A Logon Account can be specified in the Master Policy.A . TRUE B. FALSEView AnswerAnswer: B
According to the DEFAULT Web Options settings, which group grants access to the REPORTS page?
According to the DEFAULT Web Options settings, which group grants access to the REPORTS page?A . PVWAUsers B. Vault Admins C. Auditors D. PVWAMonitorView AnswerAnswer: D
Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire?
Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire? A. Privileged Accounts Inventory B. Privileged Accounts Compliance Status C. Activity Log D. Privileged Accounts CPM StatusView AnswerAnswer: B Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ReportsInPVWA.htm?TocPath=End%20U ser%7CReports%20and%20Audits%7C_____1