Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Multiple Vault Servers can be load balanced.

A.

True

B.

False

Which type of automatic remediation can be performed by the PTA in case of a Suspecious Password Change security event?

A.

Password Change

B.

Password Reconcilation

C.

Session Suspension

D.

Session Terminiation

What are the operating system prerequisites for installing CPM? Select all that apply.

A.

NET 3.51 Framework Feature

B.

Web Services Role

C.

Remote Desktop Services Role

D.

Windows 2008 R2 or higher

Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?

A.

Accounts Discovery

B.

Auto Detection

C.

Onboarding RestAPI functions

D.

PTA Rules

One of your users is receiving the error message “ITATS006E Station is suspended for User jsmith” when

attempting to sign in to the pvwa. Which utility would you use to correct this problem?

A.

createcredfile.exe

B.

cavaultmanager.exe

C.

PrivateArk

D.

PVWA

If a transparent user belongs two different directory mappings, how does the system determine which user template to use?

A.

The system will use the template for the mapping listed first.

B.

The system will use the template for the mapping listed last.

C.

The system will grant all of the vault authorizations from the two templates.

D.

The system will grant only the vault authorizations that are listed in both templates.

During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault. For which purpose are these credentials used?

A.

The credentials will be used later by the CPM to retrieve passwords from the Vault.

B.

The credentials are used by the installer to register the CPM in the CyberArk database.

C.

The credentials are used by the installer to authenticate to the Vault and create the Central Policy Manager (CPM) environment (Safes, users, etc.).

D.

The credentials will be used later by the CPM to update passwords in the Vault.

The Vault does not support dual factor authentication.

A.

True

B.

False

What values are acceptable in the address field on the Accounts Details.

A.

It must be a fully qualified domain name (FQDN)

B.

It must be an IP address

C.

It must be NetBIOS name

D.

Any name that is resolvable on the CPM server is acceptable

Ad-Hoc Access (formerly Secure Connect) provides the following features. (Choose all that apply.)

A.

PSM connections to target devices that are not managed by CyberArk

B.

Session Recording

C.

Real-time live session monitoring

D.

PSM connections from a terminal without the need to login to the PVWA