If a transparent user belongs two different directory mappings, how does the system determine which user template to use?

If a transparent user belongs two different directory mappings, how does the system determine which user template to use?A . The system will use the template for the mapping listed first.B . The system will use the template for the mapping listed last.C . The system will grant all of...

March 4, 2022 No Comments READ MORE +

Which of the Following can be configured in the Master Policy? Choose all that apply

Which of the Following can be configured in the Master Policy? Choose all that applyA . Dual ControlB . One Time PasswordsC . Exclusive PasswordsD . Password ReconciliationE . Ticketing IntegrationF . Required PropertiesG . Custom Connection ComponentsH . Password Aging RulesView AnswerAnswer: A,B,C,H Explanation: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.4/en/Content/PASIMP/Working-with-Master-Policy-Rules.htm

March 4, 2022 No Comments READ MORE +

Which safe permissions do you need to grant to UnixAdmins?

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe The members of the AD group UnixAdmms need to be able to use the show, copy, and connect buttons on those passwords at any time without...

March 4, 2022 No Comments READ MORE +

What is the chief benefit of PSM?

What is the chief benefit of PSM?A . Privileged session isolationB . Automatic password managementC . Privileged session recordingD . Privileged session isolation and privileged session recordingView AnswerAnswer: C Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20SysReq/System%20Requirements%20-%20PSM.htm

March 4, 2022 No Comments READ MORE +

The Vault supports multiple instances of the following components Choose all that Apply

The Vault supports multiple instances of the following components Choose all that ApplyA . PVWAB . CPMC . PSMD . AIM ProviderView AnswerAnswer: A,B,C

March 3, 2022 No Comments READ MORE +

What is the purpose of the Interval setting in a CPM policy?

What is the purpose of the Interval setting in a CPM policy?A . To control how often the CPM looks for System Initiated CPM workB . To control how often the CPM looks for User Initiated CPM work.C . To control how long the CPM rests between password changesD ....

March 3, 2022 No Comments READ MORE +

You have associated a logon account to one of your UNIX root accounts in the vault When attempting to verify the root account's password the CPM will...

You have associated a logon account to one of your UNIX root accounts in the vault When attempting to verify the root account's password the CPM will...A . Ignore the logon account and attempt to log in as root.B . Prompt the end user with a dialog box asking for...

March 3, 2022 No Comments READ MORE +

Which file is used to configure the ENE service?

Which file is used to configure the ENE service?A . ENB . iniC . ENEConfig.iniD . dbparm.iniE . paragent.iniView AnswerAnswer: C

March 3, 2022 No Comments READ MORE +

Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?

Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?A . TRUEB . FALSEView AnswerAnswer: B

March 3, 2022 No Comments READ MORE +

It is possible to restrict the time of day. or day of week that a verify process can occur

It is possible to restrict the time of day. or day of week that a verify process can occurA . TRUEB . FALSEView AnswerAnswer: B

March 2, 2022 No Comments READ MORE +