Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An SMTP integration allows you to forward audit records to a monitoring solution.

A.

TRUE

B.

FALSE

Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)

A.

Suspected Credential Theft

B.

Over-Pass-The-Hash

C.

Golden Ticket

D.

Unmanaged Privileged Access

You are successfully managing passwords in the alpha.cyberark com domain; however when you attempt to manage a password in the beta.cyberark.com domain, you receive the 'network path not found* error What should you check first?

A.

That the username and password are correct.

B.

That the CPM can successfully resolve addresses in the beta cyberark com domain

C.

That the end user has the correct permissions on the safe

D.

That an appropriate trust relationship exists between alphaxyberark.com and beta.cyberark.com

Which one of the following reports is NOT generated by using the Password Vault Web Access (PVWA)?

A.

Accounts Inventory

B.

Application Inventory

C.

Active/Non-Active Users

D.

Compliance Status

When planning to load balance at least 2 PSM Servers in an "in-domain" deployment, is it required to move the PSMConnect and PSMAdminConnect users to the domain level?

A.

Yes. but only the PSMConnect user must be moved to the domain.

B.

No. this is the customers decision and will work with local or domain based users.

C.

Yes, both PSMConnect and PSMAdminConnect users should be moved to the domain

D.

No. both accounts must be left as local accounts.

Which file is used to configure new firewall rules on the Vault?

A.

firewall.ini

B.

PARagent.ini

C.

dbparm.ini

D.

padr.ini

After the Vault Server is installed, the Microsoft Windows Firewall is now commandeered by the Vault Can the administrator change these firewall rules?

A.

Yes, but the administrator can only modify the firewall rules by editing the dbparm.ini file and the restarting the vault

B.

Yes, the administrator can still modify Firewall rules via the Windows Firewall interface

C.

No, the Vault does not permit any changes to the Firewall due to security requirements

D.

Yes, but the administrator can only modify the firewall rules by editing the FirewallRuIes mi file and the restarting the vault

Using the SSH Key Manager it is possible to allow CPM to manage SSH Keys similarly to passwords.

A.

TRUE

B.

FALSE

It is possible to control the hours of the day during which a safe may be used.

A.

TRUE

B.

FALSE

The vault does not support Subnet Based Access Control.

A.

TRUE

B.

FALSE