What must you specify when configuring a discovery scan for UNIX? (Choose two.)
What must you specify when configuring a discovery scan for UNIX? (Choose two.)A . Vault Administrator B. CPM Scanner C. root password for each machine D. list of machines to scan E. safe for discovered accountsView AnswerAnswer: BD
Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)
Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)A . OS Username B. Current machine IP C. Current machine hostname D. Operating System Type (Linux/Windows/HP-UX) E. Vault IP Address F. Time FrameView AnswerAnswer: ABC
Which log files should you check to investigate the cause of the issue?
During a High Availability node switch you notice an error and the Cluster Vault Manager Utility fails back to the original node. Which log files should you check to investigate the cause of the issue? (Choose three.)A . CyberArk Webconsole.log B. VaultDB.log C. PM_Error.log D. ITALog.log E. ClusterVault.console.log F. logiccontainer.logView AnswerAnswer: BDE (67%)
What is the easiest way to duplicate an existing platform?
What is the easiest way to duplicate an existing platform?A . From Private Ark, copy/paste the appropriate Policy.ini file; then rename it. B. From the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform and then click Duplicate; name the new...
Which log files should you analyze first?
You are troubleshooting a PVWA slow response. Which log files should you analyze first? (Choose two.)A . ITALog.log B. web.config C. CyberArk.WebApplication.log D. CyberArk.WebConsole.logView AnswerAnswer: CD
Which safe permissions must you grant to the group?
You created a new safe and need to ensure the user group cannot see the password, but can connect through the PSM. Which safe permissions must you grant to the group? (Choose two.)A . List Accounts B. Use Accounts C. Access Safe without Confirmation D. Retrieve Files E. Confirm RequestView AnswerAnswer: AB
To show complete account inventory information, which permission/s are needed on that safe?
You are running a "Privileged Accounts Inventory" Report through the Reports page in PVWA on a specific safe. To show complete account inventory information, which permission/s are needed on that safe?A . List Accounts, View Safe Members B. Manage Safe Owners C. List Accounts, Access Safe without confirmation D. Manage Safe, View AuditView...
How do you accomplish this?
Due to corporate storage constraints, you have been asked to disable session monitoring and recording for 500 testing accounts used for your lab environment. How do you accomplish this?A . Master Policy>select Session Management>add Exceptions to the platform(s)>disable Session Monitoring and Recording policies B. Administration>Platform Management>select the platform(s)>disable Session Monitoring and...
In a default CyberArk installation, which group must a user be a member of to view the "reports" page in PVWA?
In a default CyberArk installation, which group must a user be a member of to view the "reports" page in PVWA?A . PVWAMonitor B. ReportUsers C. PVWAReports D. OperatorsView AnswerAnswer: A
Which Automatic Remediation is configurable for a PTA detection of a "Suspected Credential Theft"?
Which Automatic Remediation is configurable for a PTA detection of a "Suspected Credential Theft"?A . Add to Pending B. Rotate Credentials C. Reconcile Credentials D. Disable AccountView AnswerAnswer: B