When managing SSH keys, the Central Policy Manager (CPM) stores the private key .
Where do you configure in PVWA the fully-qualified domain name (FQDN) of your target email server during SMTP integration?
During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault. For which purpose are these credentials used?
As long as you are a member of the Vault Admins group, you can grant any permission on any safe that you have access to.
Customers who have the 'Access Safe without confirmation' safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.
The Vault administrator can change the Vault license by uploading the new license to the system Safe.
It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.
Which service should NOT be running on the DR Vault when the primary production Vault is up?
Which file would you modify to configure your Vault Server to forward Activity Logs to a SIEM or SYSLOG server?
A SIEM integration allows you to forward ITALOG records to a monitoring solution.
PTA can automatically suspend sessions in case of suspicious activities detected in a privileged session, only if the session is made via the CyberArk PSM.
It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.
Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?
For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure access a password without approval
During the process of installing the CPM, you will be asked to provide the credentials for an administrate user in the Vault. What are these credentials used for?
You are successfully managing passwords in the alpha.cyberark com domain; however when you attempt to manage a password in the beta.cyberark.com domain, you receive the 'network path not found* error What should you check first?
The following applications are pre-configured to work with PSM. but first need to be installed on the PSM server.
Vault admins must manually add the auditors group to newly created safes so auditors will have sufficient access to run reports.D18912E1457D5D1DDCBD40AB3BF70D5D
An SMTP integration allows you to forward audit records from the vault to the SIEM.
Time of day of week restrictions on when password changes can occur are configured in ________________.
What are the operating system prerequisites for installing CPM? Select all that apply.
According to the default web options settings, which group grants access to the reports page?
When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSM
Using the SSH Key Manager it is possible to allow CPM to manage SSH Keys similarly to passwords.
In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault.
In order to grant a permission to a user, and administrator MUST possess that permission.
In an SMTP integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SMTP server addresses).
To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers need to be configured to communicate with the Primary Vault and Satellite Vaults. What file needs to be changed on the PVWA to enable this setup?
Which of the following statements are NOT true when enabling PSM recording for a target Windows server? Choose all that apply
What is the name of the Platform parameter that determines the amount of time a person is allowed to use a One Time Password?
Which of the following are secure options for storing the contents of the Operator CD. while still allowing the contents to be accessible upon a planned Vault restart? Choose alt that apply
PSM for SSH (previously known as “PSM SSH Proxy”) supports connections to the following target systems:
In a Disaster Recovery (DR) environment, which of the following should NEVER be configured for automatic failover due to the possibility of split-brain phenomenon?
The Vault can only integrate with a single Security Information and Event Management (SIEM) or SYSLOG server.
If a transparent user belongs two different directory mappings, how does the system determine which user template to use?
For the hardening process to complete successfully, security products like Antivirus should be installed on the Vault server before running the vault installer
All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe The members of the AD group UnixAdmms need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation The members of the AD group OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of OperationsManagers The members of OperationsManagers never need to be able to use the show, copy or connect buttons themselves.
Which safe permissions do you need to grant to UnixAdmins? Check all that apply
Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests?
Which one of the built-in Vault users is not automatically added to the safe when it is first created in PVWA?
A SIEM integration allows you to forward audit records to a monitoring solution.
An SMTP integration allows you to forward audit records to a monitoring solution.
HA, DR, Replicate are mutually exclusive and cannot be used in the same environment.
Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)