PSM captures a record of each command that was executed in Unix.
PSM captures a record of each command that was executed in Unix.A . TRUEB . FALSEView AnswerAnswer: A
The Application Inventory report is related to AIM.
The Application Inventory report is related to AIM.A . TRUEB . FALSEView AnswerAnswer: A
The Vault server requires WINS services to work properly.
The Vault server requires WINS services to work properly.A . TrueB . FalseView AnswerAnswer: B
Which of the following statements are NOT true when enabling PSM recording for a target Windows server? Choose all that apply
Which of the following statements are NOT true when enabling PSM recording for a target Windows server? Choose all that applyA . The PSM software must be installed on the target serverB . PSM must be enabled in the Master Policy {either directly, or through exception).C . PSMConnect must be...
Which service should NOT be running on the DR Vault when the primary production Vault is up?
Which service should NOT be running on the DR Vault when the primary production Vault is up?A . PrivateArk DatabaseB . PrivateArk ServerC . CyberArk Vault Disaster Recovery ServiceD . CyberArk Logical ContainerView AnswerAnswer: B
When managing SSH keys. CPM automatically pushes the Public Key to the target system.
When managing SSH keys. CPM automatically pushes the Public Key to the target system.A . TRUEB . FALSEView AnswerAnswer: A
Which safe permissions do you need to grant to OperationsManagers?
All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without...
What is the purpose of the CyberArk Event Notification Engine service.
What is the purpose of the CyberArk Event Notification Engine service.A . It sends email messages from the CPMB . It sends email messages from the Vault.C . It processes audit report messagesD . It makes vault data available to components.View AnswerAnswer: B
If a transparent user belongs two different directory mappings, how does the system determine which user template to use?
If a transparent user belongs two different directory mappings, how does the system determine which user template to use?A . The system will use the template for the mapping listed first.B . The system will use the template for the mapping listed last.C . The system will grant all of...
Which of the Following can be configured in the Master Policy? Choose all that apply
Which of the Following can be configured in the Master Policy? Choose all that applyA . Dual ControlB . One Time PasswordsC . Exclusive PasswordsD . Password ReconciliationE . Ticketing IntegrationF . Required PropertiesG . Custom Connection ComponentsH . Password Aging RulesView AnswerAnswer: A,B,C,H Explanation: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.4/en/Content/PASIMP/Working-with-Master-Policy-Rules.htm