What file needs to be changed on the PVWA to enable this setup?
To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers need to be configured to communicate with the Primary Vault and Satellite Vaults. What file needs to be changed on the PVWA to enable this setup?A . Vault.iniB . dbparm.iniC . pvwa.iniD . Satellite.iniView AnswerAnswer:...
The ACME Company has been a CyberArk customer for many years. ACME Management has asked you to perform a “Health Check" review of the CyberArk deployment. During your analysis you discover that the PSM Component server is fully functional. The RDP SSL certificate is self-signed and the CyberArk Privileged Session Management Service is running under the Local Service. SSL 3.0 is enabled in the Registry.
The ACME Company has been a CyberArk customer for many years. ACME Management has asked you to perform a “Health Check" review of the CyberArk deployment. During your analysis you discover that the PSM Component server is fully functional. The RDP SSL certificate is self-signed and the CyberArk Privileged Session...
When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?
When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?A . CyberArk Vault Disaster Recovery (DR), PrivateArk DatabaseB . CyberArk Vault Disaster RecoveryC . CyberArk Vault Disaster Recovery, PrivateArk Database, PrivateArk ServerD . CyberArk Vault Disaster Recovery, PrivateArk Database, CyberArk Event Notification...
Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests?
Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests?A . HeadStartIntervalB . IntervalC . ImmediateIntervalD . The CPM does not change the password under this circumstanceView AnswerAnswer: C
Name two ways of viewing the ITAlog:
Name two ways of viewing the ITAlog:A . Log into the vault locally and navigate to the Server folder under the PrivateArk install location.B . Log into the PVWA and go to the Reports tab.C . Access the System Safe from the PrivateArk client.D . Go to the Thirdpary log...
What is the BEST way to allow CPM to manage root accounts?
In accordance with best practice. SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow CPM to manage root accounts?A . Create a privileged account on the target server Allow this account the ability to SSH directly from the CPM machine Configure this...
Which Master Policy?
Which Master Policy?A . Password Expiration TimeB . Enabling and Disabling of the Connection Through the PSMC . Password ComplexityD . The use of "One-Time-Passwords"View AnswerAnswer: C
What is the purpose of the password Reconcile process?
What is the purpose of the password Reconcile process?A . To test that CyberArk is storing accurate credentials for accounts.B . To change the password of an account according to organizationally defined password rules.C . To allow CyberArk to manage unknown or lost credentials.D . To generate a new complex...
What is the purpose of the password verify process?
What is the purpose of the password verify process?A . To test that CyberArk is storing accurate credentials for accounts.B . To change the password of an account according to organizationally defined password rules.C . To allow CyberArk to manage unknown or lost credentials.D . To generate a new complex...
You have associated a logon account to one of your UNIX root accounts in the vault When attempting to verify the root account's password the CPM will...
You have associated a logon account to one of your UNIX root accounts in the vault When attempting to verify the root account's password the CPM will...A . Ignore the logon account and attempt to log in as root.B . Prompt the end user with a dialog box asking for...