Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

When working with the CyberArk Cluster, the Virtual IP is used by:

A.

The CyberArk components to communicate with the Vault Cluster over the public network.

B.

The Vault nodes for exchanging keep alive messages over the public network.

C.

The CyberArk components to communicate with the Vault Cluster over the private network.

D.

The Vault nodes for exchanging keep alive messages over the public network.

What is the purpose of the PrivateArk Server service?

A.

Executes password changes.

B.

Makes vault data accessible to components.

C.

Maintains vault metadata.

D.

Sends email alert from the Vault

What is the maximum number of levels of authorizations you can set up in Dual Control?

A.

1

B.

2

C.

3

D.

4

What is the purpose of the PrivateArk Database service?

A.

Maintains Vault metadata.

B.

Communicates with components.

C.

Sends email alerts from the vault ID.

D.

Executes password changes

It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.

A.

TRUE

B.

FALSE

CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.

A.

TRUE

B.

FALSE

Which of the following statements are NOT true when enabling PSM recording for a target Windows server? Choose all that apply

A.

The PSM software must be installed on the target server

B.

PSM must be enabled in the Master Policy {either directly, or through exception).

C.

PSMConnect must be added as a local user on the target server

D.

RDP must be enabled on the target server

Access Control to passwords is implemented by ________________.

A.

Virtual Authorizations

B.

Safe Authorizations

C.

Master Policy

D.

Platform Settings

Via Password Vault Web Access (PVWA), a user initiates a PSM connection to the target Linux machine using RemoteApp. When the client’s machine makes an RDP connection to the PSM server, which user will be utilized?

A.

Credentials stored in the Vault for the target machine

B.

Shadowuser

C.

PSMConnect

D.

PSMAdminConnect

The Vault needs to send SNMP traps to your SNMP solution, which file is used to configure the IP address of

the SNMP server?

A.

snmp.ini

B.

dbparm.ini

C.

ENEConf.ini

D.

PARAgent.ini