Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault.

For which purpose are these credentials used?

A.

The credentials will be used later by the CPM to retrieve passwords from the Vault.

B.

The credentials are used by the installer to register the CPM in the CyberArk database.

C.

The credentials are used by the installer to authenticate to the Vault and create the Central Policy Manager (CPM) environment (Safes, users. etc.).

D.

The credentials will be used later by the CPM to update passwords in the Vault.

Which user is automatically added to all Safes and cannot be removed?

A.

Auditor

B.

Administrator

C.

Master

D.

Operator

Which is the purpose of the interval setting in a Central Policy Manager (CPM) policy?

A.

To control how often the CPM looks for system-initiated CPM work.

B.

To control how often the CPM looks for user-initiated CPM work.

C.

To control how long the CPM rests between password changes.

D.

To control the maximum amount of time the CPM will wait for a password change to complete.

Which utilities could a Vault administrator use to change debugging levels on the Vault without having to restart the Vault? (Choose two.)

A.

PAR Agent

B.

PrivateArk Server Central Administration

C.

Edit DBParm.ini in a text editor

D.

Setup.exe

HA, DR, Replicate are mutually exclusive and cannot be used in the same environment.

A.

True

B.

False

Multiple Password Vault Web Access (PVWA) servers can be load balanced.

A.

True

B.

False

Which file is used to open up a non-standard firewall port to the Vault?

A.

dbparm.ini

B.

PARagent.ini

C.

passparm.ini

D.

Vault.ini

What is the purpose of EVD?

A.

To extract vault metadata into an open database platform.

B.

To allow editing of vault metadata.

C.

To create a backup of the MySQL database.

D.

To extract audit data from the vault.

When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?

A.

CyberArk Vault Disaster Recovery (DR), PrivateArk Database

B.

CyberArk Vault Disaster Recovery

C.

CyberArk Vault Disaster Recovery, PrivateArk Database, PrivateArk Server

D.

CyberArk Vault Disaster Recovery, PrivateArk Database, CyberArk Event Notification Engine