Which CyberArk utility can you use to accomplish this task?

You have been asked to identify the up or down status of Vault services. Which CyberArk utility can you use to accomplish this task?A . Vault ReplicatorB . PAS ReporterC . Remote Control AgentD . SyslogView AnswerAnswer: C Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Remote-Administration-for-the-Vault-DR-Vault.htm?tocpath=Administrator%7CComponents%7CDigital%20Vault%7COperate%20th e%20CyberArk%20Vault%7CMonitor%20the%20Vault%7C_____1

February 26, 2022No CommentsREAD MORE +

Which safe permission do you need to grant Operations Staff?

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without...

February 26, 2022No CommentsREAD MORE +

Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?

Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?A . Password changeB . Password reconciliationC . Session suspensionD . Session terminationView AnswerAnswer: A

February 26, 2022No CommentsREAD MORE +

The System safe allows access to the Vault configuration files.

The System safe allows access to the Vault configuration files.A . TRUEB . FALSView AnswerAnswer: A

February 25, 2022No CommentsREAD MORE +

Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”?

Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”? A. Add to Pending B. Rotate Credentials C. Reconcile Credentials D. Disable AccountView AnswerAnswer: C Explanation: Reference: https://cau302.blogspot.com/2021/03/PTA.html

February 25, 2022No CommentsREAD MORE +

When a group is granted the 'Authorize Account Requests' permission on a safe Dual Control requests must be approved by

When a group is granted the 'Authorize Account Requests' permission on a safe Dual Control requests must be approved byA . Any one person from that groupB . Every person from that groupC . The number of persons specified by the Master PolicyD . That access cannot be granted to...

February 25, 2022No CommentsREAD MORE +

As long as you are a member of the Vault Admins group you can grant any permission on any safe.

As long as you are a member of the Vault Admins group you can grant any permission on any safe.A . TRUEB . FALSEView AnswerAnswer: B Explanation: Being in Vault admins group only give you access to safes which are created during installation (safe created in installation process) -This is...

February 25, 2022No CommentsREAD MORE +

In the Private Ark client, how do you add an LDAP group to a CyberArk group?

In the Private Ark client, how do you add an LDAP group to a CyberArk group?A . Select Update on the CyberArk group, and then click Add > LDAP GroupB . Select Update on the LDAP Group, and then click Add > LDAP GroupC . Select Member Of on the...

February 25, 2022No CommentsREAD MORE +

It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur

It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occurA . TRUEB . FALSEView AnswerAnswer: A Explanation: Password verification can be restricted to specific days. This means that the CPM will only verify passwords on the days of the week specified...

February 24, 2022No CommentsREAD MORE +

A Simple Mail Transfer Protocol (SMTP) integration is critical for monitoring Vault activity and facilitating workflow processes, such as Dual Control.

A Simple Mail Transfer Protocol (SMTP) integration is critical for monitoring Vault activity and facilitating workflow processes, such as Dual Control.A . TrueB . FalseView AnswerAnswer: B

February 24, 2022No CommentsREAD MORE +