Match the log file name with the CyberArk Component that generates the log
DRAG DROP Match the log file name with the CyberArk Component that generates the log. View AnswerAnswer:
The System safe allows access to the Vault configuration files.
The System safe allows access to the Vault configuration files.A . TRUEB . FALSEView AnswerAnswer: A
The Vault supports multiple instances of the following components Choose all that Apply
The Vault supports multiple instances of the following components Choose all that ApplyA . PVWAB . CPMC . PSMD . AIM ProviderView AnswerAnswer: A,B,C
Which one of the following reports is NOT generated by using the PVWA?
Which one of the following reports is NOT generated by using the PVWA?A . Accounts InventoryB . Application InventoryC . Active/Non-Active UsersD . Compliance StatusView AnswerAnswer: C
What is the purpose of a password group?
What is the purpose of a password group?A . To ensure that a particular collection of accounts all have the same passwordB . To ensure a particular set of accounts all change at the same timeC . To connect the CPM to a target systemD . To allow more than...
Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)
Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)A . Suspected Credential TheftB . Over-Pass-The-HashC . Golden TicketD . Unmanaged Privileged AccessView AnswerAnswer: A,B
Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.
Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.A . Server KeyB . Recovery Public KeyC . Recovery Private KeyD . Safe KeyView AnswerAnswer: A Explanation: Reference: https://www.reddit.com/r/CyberARk/comments/8s96n8/certificat_problem_with_ my_vault/
What is the purpose of EVD?
What is the purpose of EVD?A . To extract vault metadata into an open database platform.B . To allow editing of vault metadata.C . To create a backup of the MySQL database.D . To extract audit data from the vault.View AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/Landing%20Pages/lpExportVaultDataUtility.htm
One can create exceptions to the Master Policy based on_________.
One can create exceptions to the Master Policy based on_________.A . SafesB . PlatformsC . PoliciesD . AccountsView AnswerAnswer: B
Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?
Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?A . TRUEB . FALSEView AnswerAnswer: B