<< Prev Question Next Question >>

Question 61/62

When a DR Vault Server becomes an active vault, it will automatically fail back to the original state once the Primary Vault comes back online.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (62q)
Question 1: Match the log file name with the CyberArk Component that gen...
Question 2: When managing SSH keys, the CPM stored the Private Key...
Question 3: Users who have the 'Access Safe without confirmation' safe p...
Question 4: If a user is a member of more than one group that has author...
Question 5: In accordance with best practice, SSH access is denied for r...
Question 6: Users can be resulted to using certain CyberArk interfaces (...
Question 7: You are creating a new Rest API user that utilizes CyberArk ...
Question 8: A user with administrative privileges to the vault can only ...
Question 9: A logon account can be specified in the platform settings....
Question 10: Which of the following logs contains information about error...
Question 11: What is the purpose of the password change process?...
Question 12: Match the Status of Service on a DR Vault to what is display...
Question 13: To manage automated onboarding rules, a CyberArk user must b...
Question 14: When a DR Vault Server becomes an active vault, it will auto...
Question 15: Which of the following PTA detections are included in the Co...
Question 16: One can create exceptions to the Master Policy based on ____...
Question 17: Within the Vault each password is encrypted by:...
Question 18: Which report provides a list of account stored in the vault....
Question 19: When creating an onboarding rule, it will be executed upon ...
Question 20: Which parameters can be used to harden the Credential Files ...
Question 21: A Logon Account can be specified in the Master Policy....
Question 22: As long as you are a member of the Vault Admins group you ca...
Question 23: What is the chief benefit of PSM?...
Question 24: Which utilities could you use to change debugging levels on ...
Question 25: Which usage can be added as a service account platform?...
Question 26: It is possible to leverage DNA to provide discovery function...
Question 27: Which of the following Privileged Session Management (PSM) s...
Question 28: What is the purpose of the HeadStartlnterval setting m a pla...
Question 29: Which onboarding method would you use to integrate CyberArk ...
Question 30: As long as you are a member of the Vault Admins group, you c...
Question 31: When managing SSH keys, the CPM stores the Public Key...
Question 32: Which type of automatic remediation can be performed by the ...
Question 33: Which is the primary purpose of exclusive accounts?...
Question 34: Which of the following PTA detections require the deployment...
Question 35: Which of the following statements are NOT true when enabling...
Question 36: Users are unable to launch Web Type Connection components fr...
Question 37: A Vault Administrator team member can log in to CyberArk, bu...
Question 38: What is the purpose of the CyberArk Event Notification Engin...
Question 39: A user is receiving the error message "ITATS006E Station is ...
Question 40: Can the 'Connect' button be used to initiate an SSH connecti...
Question 41: You are creating a Dual Control workflow for a team's safe. ...
Question 42: Which built-in report from the reports page in PVWA displays...
Question 43: Which combination of Safe member permissions will allow end ...
Question 44: Which command configures email alerts within PTA if settings...
Question 45: You have been asked to identify the up or down status of Vau...
Question 46: For an account attached to a platform that requires Dual Con...
Question 47: What is the primary purpose of One Time Passwords?...
Question 48: In PVWA, you are attempting to play a recording made of a se...
Question 49: When Dual Control is enabled a user must first submit a requ...
Question 50: Your organization requires all passwords be rotated every 90...
Question 51: PTA can automatically suspend sessions if suspicious activit...
Question 52: What is the maximum number of levels of authorization you ca...
Question 53: Which parameter controls how often the CPM looks for Soon-to...
Question 54: To ensure all sessions are being recorded, a CyberArk admini...
Question 55: Which of the following files must be created or configured m...
Question 56: Time of day or day of week restrictions on when password ver...
Question 57: Which CyberArk utility allows you to create lists of Master ...
Question 58: Via Password Vault Web Access (PVWA), a user initiates a PSM...
Question 59: You are logging into CyberArk as the Master user to recover ...
Question 60: If a password is changed manually on a server, bypassing the...
Question 61: When a DR Vault Server becomes an active vault, it will auto...
Question 62: According to the DEFAULT Web Options settings, which group g...