Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A user has successfully conducted a short PSM session and logged off. However, the user cannot access the Monitoring tab to view the recordings. What is the issue?

A.

The user must login as PSMAdminConnect.

B.

The PSM service is not running.

C.

The user is not a member of the PVWAMonitor group.

D.

The user is not a member of the Auditors group.

One can create exceptions to the Master Policy based on_________.

A.

Safes

B.

Platforms

C.

Policies

D.

Accounts

Which CyberArk components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts'? Select all that apply.

A.

Discovery and Audit (DNA)

B.

Auto Detection (AD)

C.

Export Vault Data (EVD)

D.

On Demand Privileges Manager (OPM)

E.

Accounts Discovery

Which service is optional on the Vault?

A.

PrivateArk Server

B.

PrivateArk Remote Control Agent

C.

PrivateArk Database

D.

CyberArk Hardened Windows Firewall

In an SMTP integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SMTP server addresses).

A.

TRUE

B.

FALSE

When on-boarding accounts using Accounts Feed. Which of the following is true"?

A.

You must specify an existing Safe where the account will be stored when it is on-boarded to the Vault.

B.

You can specify the name of a new safe that will be created where the account will be stored when it is on-boarded to the Vault.

C.

You can specify the name of a new Platform that will be created and associated with the account.

D.

Any account that is on-boarded can be automatically reconciled regardless of the platform it is associated with

For the hardening process to complete successfully, security products like Antivirus should be installed on the Vault server before running the vault installer

A.

TRUE

B.

FALSE

What is the purpose of the Allowed Safes parameter in a CPM policy? Select all that apply.

A.

To improve performance by reducing CPU workload.

B.

To prevent accidental use of a policy in the wrong safe.

C.

To allow users to access only the passwords they should be able to access.

D.

To enforce Least Privilege in CyberArk.

Multiple PVWA servers can be load balanced.

A.

TRUE

B.

FALSE

CyberArk implements license limits by controlling the number and types of users that can be provisioned in the Vault.

A.

True

B.

False