Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Match each component to its respective Log File location.

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests.

A.

HeadStartInterval

B.

Interval

C.

ImmediateInterval

D.

The CPM does not change the password under this circumstance

What is the configuration file used by the CPM scanner when scanning UNIX/Linux devices?

A.

UnixPrompts.ini

B.

plink.exe

C.

dbparm.ini

D.

PVConfig.xml

It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.

A.

TRUE

B.

FALSE

Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)

A.

Operating System Username

B.

Host IP Address

C.

Client Hostname

D.

Operating System Type (Linux/Windows/HP-UX)

E.

Vault IP Address

F.

Time Frame

You have been asked to identify the up or down status of Vault services.

Which CyberArk utility can you use to accomplish this task?

A.

Vault Replicator

B.

PAS Reporter

C.

Remote Control Agent

D.

Syslog

Which authorizations are required in a recording safe to allow a group to view recordings?

What is the primary purpose of One Time Passwords?

A.

Reduced risk of credential theft

B.

More frequent password changes

C.

Non-repudiation (individual accountability)

D.

To force a 'collusion to commit' fraud ensuring no single actor may use a password without authorization.

The password upload utility must run from the CPM server

A.

TRUE

B.

FALSE

What is the primary purpose of Dual Control?

A.

Reduced risk of credential theft

B.

More frequent password changes

C.

Non-repudiation (individual accountability)

D.

To force a 'collusion to commit' fraud ensuring no single actor may use a password without authorization.