For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.
Time of day or day of week restrictions on when password verifications can occur configured in ____________________.
Which utilities could you use to change debugging levels on the vault without having to restart the vault. Select all that apply.
A customer installed multiple PVWAs in the production environment behind a load balancer VIP. They subsequently observed that all incoming traffic from the load balancer VIP goes to only one PVWA, even though all the PVWAs are up and running. What could be the likely cause of this situation?
You have been asked to design the number of PVWAs a customer must deploy. The customer has three data centers with a distributed vault in each, requires high availability, and wants to use all vaults, at all times. How many PVWAs does the customer need?
Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)
An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?
Which permissions are needed for the Active Directory user required by the Windows Discovery process?
Match each PTA alert category with the PTA sensors that collect the data for it.
CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.
As long as you are a member of the Vault Admins group you can grant any permission on any safe.
Which of the following Privileged Session Management (PSM) solutions support live monitoring of active sessions?
Your organization has a requirement to allow users to “check out passwords” and connect to targets with the same account through the PSM.
What needs to be configured in the Master policy to ensure this will happen?
A customer's environment three data centers, consisting of 5,000 servers in Germany, 10,000 servers in Canada, 1,500 servers in Singapore. You want to manage target servers and avoid complex firewall rules. How many CPM's should you deploy?
In PVWA, you are attempting to play a recording made of a session by user jsmith, but there is no option to “Fast Forward” within the video. It plays and only allows you to skip between commands instead. You are also unable to download the video.
What could be the cause?
When running a “Privileged Accounts Inventory” Report through the Reports page in PVWA on a specific safe, which permission/s are required on that safe to show complete account inventory information?
A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request.
What is the correct location to identify users or groups who can approve?
A customer is deploying PVWAs in the Amazon Web Services Public Cloud. Which load balancing option does CyberArk recommend?
Target account platforms can be restricted to accounts that are stored m specific Safes using the Allowed Safes property.
Which of the following files must be created or configured m order to run Password Upload Utility? Select all that apply.
You are responsible for installing a CPM.
Which Vault authorizations will your CyberArk user need to install the CPM?
Which SMTP address can be set on the Notification Settings page to re-invoke the ENE setup wizard after the initial Vault installation.
Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
A Vault administrator have associated a logon account to one of their Unix root accounts in the vault. When attempting to verify the root account’s password the Central Policy Manager (CPM) will:
You are installing PSM for SSH with AD-Bridge in CyberArkSSHD mode for your customer. ACME Corp What do you need to install to meet your customer's needs? (Choose 2)
When creating Distributed Vault environment architecture, what is the maximum number of Vault servers that can be deployed''
PSM for Windows (previously known as “RDP Proxy”) supports connections to the following target systems
A user with administrative privileges to the vault can only grant other users privileges that he himself has.
You are creating a new Rest API user that utilizes CyberArk Authentication.
What is a correct process to provision this user?
What is the configuration file used by the CPM scanner when scanning UNIX/Linux devices?
You need to recover an account localadmin02 for target server 10.0.123.73 stored in Safe Team1.
What do you need to recover and decrypt the object? (Choose three.)
Which command configures email alerts within PTA if settings need to be changed post install?
You are installing HTML5 gateway on a Linux host using the RPM provided. After installing the Tomcat webapp, what is the next step in the installation process?
An auditor initiates a live monitoring session to PSM server to view an ongoing live session. When the auditor’s machine makes an RDP connection the PSM server, which user will be used?
In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX system. What is the BEST way to allow CPM to manage root accounts.
What is a prerequisite step before CyberArk can be configured to support RADIUS authentication?
Users can be resulted to using certain CyberArk interfaces (e.g.PVWA or PACLI).
In your organization the “click to connect” button is not active by default.
How can this feature be activated?
Which of the Following can be configured in the Master Poky? Choose all that apply.
You are helping a customer prepare a Windows server for PSM installation. What is required for a successful installation?
You receive this error:
“Error in changepass to user domain\user on domain server(\domain.(winRc=5) Access is denied.”
Which root cause should you investigate?
If a customer has one data center and requires high availability, how many PVWA's should be deployed.
Assuming a safe has been configured to be accessible during certain hours of the day, a Vault Admin may still access that safe outside of those hours.
A newly created platform allows users to access a Linux endpoint. When users click to connect, nothing happens.
Which piece of the platform is missing?
Which components can connect to a satellite Vault in distributed Vault architecture?
Which step is required to register a Vault manually in Amazon Web Services using CAVaultManager?