If a transparent user belongs two different directory mappings, how does the system determine which user template to use?

If a transparent user belongs two different directory mappings, how does the system determine which user template to use?A . The system will use the template for the mapping listed first.B . The system will use the template for the mapping listed last.C . The system will grant all of...

May 11, 2022 No Comments READ MORE +

A logon account can be specified in the platform settings.

A logon account can be specified in the platform settings.A . TrueB . FalseView AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Configuring-Accounts-for-Automatic-Management.htm

May 11, 2022 No Comments READ MORE +

A SIEM integration allows you to forward ITALOG records to a monitoring solution.

A SIEM integration allows you to forward ITALOG records to a monitoring solution.A . TRUEB . FALSEView AnswerAnswer: B

May 11, 2022 No Comments READ MORE +

What is the chief benefit of PSM?

What is the chief benefit of PSM?A . Privileged session isolationB . Automatic password managementC . Privileged session recordingD . Privileged session isolation and privileged session recordingView AnswerAnswer: D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20SysReq/System%20Requirements%20-%20PSM.htm

May 10, 2022 No Comments READ MORE +

A SIEM integration allows you to forward audit records to a monitoring solution.

A SIEM integration allows you to forward audit records to a monitoring solution.A . TRUEB . FALSEView AnswerAnswer: A

May 10, 2022 No Comments READ MORE +

When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSM

When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSMA . TrueB . False, when the PSM Gateway is implemented, the user only requires a browser in order launch a connection via the PSMView AnswerAnswer: B

May 10, 2022 No Comments READ MORE +

Is it possible to modify the CyberArk Vault Audit Log?

Is it possible to modify the CyberArk Vault Audit Log?A . Yes, a Vault administrator can modify the Audit logB . No, the audit trail is tamper proof and cannot be edited, not even by MasterC . Yes, but only the Master user can modify the Audit logD . Yes,...

May 10, 2022 No Comments READ MORE +

What is the purpose of the password Change process?

What is the purpose of the password Change process?A . To test that CyberArk is storing accurate credentials for accountsB . To change the password of an account according to organizationally defined password rulesC . To allow CyberArk to manage unknown or lost credentialsD . To generate a new complex...

May 10, 2022 No Comments READ MORE +

Which safe permissions do you need to grant to OperationsManagers?

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without...

May 10, 2022 No Comments READ MORE +

What is the primary purpose of Exclusive Accounts?

What is the primary purpose of Exclusive Accounts?A . Reduced risk of credential theftB . More frequent password changesC . Non-repudiation (individual accountability)D . To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorizationView AnswerAnswer: C

May 10, 2022 No Comments READ MORE +