Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)
Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)A . OS Username B. Current machine IP C. Current machine hostname D. Operating System Type (Linux/Windows/HP-UX) E. Vault IP Address F. Time FrameView AnswerAnswer: ABC
What is the easiest way to duplicate an existing platform?
What is the easiest way to duplicate an existing platform?A . From Private Ark, copy/paste the appropriate Policy.ini file; then rename it. B. From the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform and then click Duplicate; name the new...
Which CyberArk utility can you use to accomplish this task?
You have been asked to identify the up or down status of Vault Services. Which CyberArk utility can you use to accomplish this task?A . PrivateArk Central Administration Console B. PAS Reporter C. PrivateArk Remote Control Agent D. SyslogView AnswerAnswer: C
Which Automatic Remediation is configurable for a PTA detection of a "Suspected Credential Theft"?
Which Automatic Remediation is configurable for a PTA detection of a "Suspected Credential Theft"?A . Add to Pending B. Rotate Credentials C. Reconcile Credentials D. Disable AccountView AnswerAnswer: B
To change the safe where recordings are kept for a specific platform, which setting must you update in the platform configuration?
To change the safe where recordings are kept for a specific platform, which setting must you update in the platform configuration?A . SessionRecorderSafe B. SessionSafe C. RecordingsPath D. RecordingLocationView AnswerAnswer: A
ADR Vault became active due to a failure of the primary Vault. Service on the primary Vault has now been restored. Arrange the steps to return the DR vault to its normal standby mode in the correct sequence
DRAG DROP ADR Vault became active due to a failure of the primary Vault. Service on the primary Vault has now been restored. Arrange the steps to return the DR vault to its normal standby mode in the correct sequence. View AnswerAnswer:
Which processes reduce the risk of credential theft? (Choose two.)
Which processes reduce the risk of credential theft? (Choose two.)A . require dual control password access approval B. require password change every X days C. enforce check-in/check-out exclusive access D. enforce one-time password accessView AnswerAnswer: CD
What is the correct location to identify users or groups who can approve?
A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request. What is the correct location to identify users or groups...
What must you specify when configuring a discovery scan for UNIX? (Choose two.)
What must you specify when configuring a discovery scan for UNIX? (Choose two.)A . Vault Administrator B. CPM Scanner C. root password for each machine D. list of machines to scan E. safe for discovered accountsView AnswerAnswer: BD
A new HTML5 Gateway has been deployed in your organization
DRAG DROP A new HTML5 Gateway has been deployed in your organization. From the PVWA, arrange the steps to configure a PSM host to use the HTML5 Gateway in the correct sequence. View AnswerAnswer: