In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?
In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?A . AAM Credential Provider (previously known as AIM Credential Provider)B . ExportVaultData utilityC . PAReplicate utilityD . Central Policy ManagerView AnswerAnswer: D
When managing SSH keys, the CPM stores the Public Key ________________.
When managing SSH keys, the CPM stores the Public Key ________________.A . In the VaultB . On the target serverC . A & BD . Nowhere because the public key can always be generated from the private keyView AnswerAnswer: B
What is the issue?
A user has successfully conducted a short PSM session and logged off. However, the user cannot access the Monitoring tab to view the recordings. What is the issue?A . The user must login as PSMAdminConnect.B . The PSM service is not running.C . The user is not a member of...
Which service should NOT be running on the DR Vault when the primary production Vault is up?
Which service should NOT be running on the DR Vault when the primary production Vault is up?A . PrivateArk DatabaseB . PrivateArk ServerC . CyberArk Vault Disaster Recovery ServiceD . CyberArk Logical ContainerView AnswerAnswer: B
Which combination of safe member permissions will allow End Users to log in to a remote machine transparently but NOT show or copy the password?
Which combination of safe member permissions will allow End Users to log in to a remote machine transparently but NOT show or copy the password?A . Use Accounts, Retrieve Accounts, List AccountsB . Use Accounts, List AccountsC . Use AccountsD . List Accounts, Retrieve AccountsView AnswerAnswer: B
Which utility can be used to copy a server key to an HSM?
Which utility can be used to copy a server key to an HSM?A . PrivateArk ClientB . A proprietary utility provided by the HSM VendorC . ChangeServerKeys.exeD . CAVaultManager.exeView AnswerAnswer: B Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Distributed-Vault-HSM.htm
Access Control to passwords is implemented by ________________.
Access Control to passwords is implemented by ________________.A . Virtual AuthorizationsB . Safe AuthorizationsC . Master PolicyD . Platform SettingsView AnswerAnswer: B
PSM captures a record of each command that was executed in Unix.
PSM captures a record of each command that was executed in Unix.A . TRUEB . FALSEView AnswerAnswer: A
Multiple PVWA servers provide automatic load balancing.
Multiple PVWA servers provide automatic load balancing.A . TRUEB . FALSEView AnswerAnswer: B
In a Disaster Recovery (DR) environment, which of the following should NEVER be configured for automatic failover due to the possibility of split-brain phenomenon?
In a Disaster Recovery (DR) environment, which of the following should NEVER be configured for automatic failover due to the possibility of split-brain phenomenon?A . Password Vault Web Access (PVWA)B . PSMC . CPMD . PTAView AnswerAnswer: C