Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Accounts Discovery allows secure connections to domain controllers.

A.

TRUE.

B.

FALSE

PSM for SSH (previously known as “PSM SSH Proxy”) supports connections to the following target systems:

A.

Windows

B.

UNIX

C.

Oracle

D.

All of the above

CyberArk Logical Container

A.

CPMLOG

B.

CPM_errorlog

C.

pmlog

D.

pm errors log

What is the purpose of the password Change process?

A.

To test that CyberArk is storing accurate credentials for accounts

B.

To change the password of an account according to organizationally defined password rules

C.

To allow CyberArk to manage unknown or lost credentials

D.

To generate a new complex password

Which combination of safe member permissions will allow End Users to log in to a remote machine

transparently but NOT show or copy the password?

A.

Use Accounts, Retrieve Accounts, List Accounts

B.

Use Accounts, List Accounts

C.

Use Accounts

D.

List Accounts, Retrieve Accounts

After the Vault server is installed, the Microsoft Windows firewall is now commandeered by the Vault. Can the administrator change these firewall rules?

A.

Yes, but the administrator can only modify the firewall rules by editing the dbparm.ini file and the restarting the Vault.

B.

Yes, the administrator can still modify firewall rules via the Windows firewall interface.

C.

No, the Vault does not permit any changes to the firewall due to security requirements.

D.

Yes, but the administrator can only modify the firewall rules by editing the FirewallRules.ini file and the restarting the Vault.

Auto-Detection can be configured to leverage LDAP/S.

A.

TRUE

B.

FALSE

Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?

A.

Password change

B.

Password reconciliation

C.

Session suspension

D.

Session termination

The vault server uses a modified version of the Microsoft Windows firewall

A.

TRUE

B.

FALSE

In accordance with best practice. SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow CPM to manage root accounts.

A.

Create a privileged account on the target server Allow this account the ability to SSH directly from the CPM machine Configure this account as the Reconcile account of the target server's root account.

B.

Create a non-privileged account on the target server Allow this account the ability to SSH directly from the CPM machine. Configure this account as the Logon account of the target server's root account

C.

Configure the Unix system to allow SSH logins.

D.

Configure the CPM to allow SSH logins