If a transparent user belongs two different directory mappings, how does the system determine which user template to use?
If a transparent user belongs two different directory mappings, how does the system determine which user template to use?A . The system will use the template for the mapping listed first.B . The system will use the template for the mapping listed last.C . The system will grant all of...
A logon account can be specified in the platform settings.
A logon account can be specified in the platform settings.A . TrueB . FalseView AnswerAnswer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Configuring-Accounts-for-Automatic-Management.htm
A SIEM integration allows you to forward ITALOG records to a monitoring solution.
A SIEM integration allows you to forward ITALOG records to a monitoring solution.A . TRUEB . FALSEView AnswerAnswer: B
What is the chief benefit of PSM?
What is the chief benefit of PSM?A . Privileged session isolationB . Automatic password managementC . Privileged session recordingD . Privileged session isolation and privileged session recordingView AnswerAnswer: D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20SysReq/System%20Requirements%20-%20PSM.htm
A SIEM integration allows you to forward audit records to a monitoring solution.
A SIEM integration allows you to forward audit records to a monitoring solution.A . TRUEB . FALSEView AnswerAnswer: A
When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSM
When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSMA . TrueB . False, when the PSM Gateway is implemented, the user only requires a browser in order launch a connection via the PSMView AnswerAnswer: B
Is it possible to modify the CyberArk Vault Audit Log?
Is it possible to modify the CyberArk Vault Audit Log?A . Yes, a Vault administrator can modify the Audit logB . No, the audit trail is tamper proof and cannot be edited, not even by MasterC . Yes, but only the Master user can modify the Audit logD . Yes,...
What is the purpose of the password Change process?
What is the purpose of the password Change process?A . To test that CyberArk is storing accurate credentials for accountsB . To change the password of an account according to organizationally defined password rulesC . To allow CyberArk to manage unknown or lost credentialsD . To generate a new complex...
Which safe permissions do you need to grant to OperationsManagers?
All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without...
What is the primary purpose of Exclusive Accounts?
What is the primary purpose of Exclusive Accounts?A . Reduced risk of credential theftB . More frequent password changesC . Non-repudiation (individual accountability)D . To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorizationView AnswerAnswer: C