<< Prev Question Next Question >>

Question 84/108

Users can be restricted through certain CyberArk interfaces (e.g. PVWA or PACLI).

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (108q)
Question 1: In order to connect to a target device through PSM, the acco...
Question 2: Which of the following files must be created or configured m...
Question 3: Which Cyber Are components or products can be used to discov...
Question 4: Which built-in report from the reports page in PVWA displays...
Question 5: Which of these accounts onboarding methods is considered pro...
Question 6: Ifa password is changed manually on a server, bypassing the ...
Question 7: The System safe allows access to the Vault configuration fil...
Question 8: What is the name of the Platform parameter that controls how...
Question 9: If a user is a member of more than one group that has author...
Question 10: Which report could show all accounts that are past their exp...
Question 11: Due to network activity, ACME Corp's PrivateArk Server becam...
Question 12: The Password upload utility can be used to create safes....
Question 13: In order to connect to a target device through PSM, the acco...
Question 14: Which of the following options is not set in the Master Poli...
Question 15: Users are unable to launch Web Type Connection components fr...
Question 16: Which is the primary purpose of exclusive accounts?...
Question 17: Which statement is correct concerning accounts that are disc...
Question 18: When on-boarding account using Accounts Feed, which of the f...
Question 19: Which user is automatically added to all Safes and cannot be...
Question 20: dbparm.ini is the main configuration file for the Vault....
Question 21: For each listed prerequisite, identify if it is mandatory or...
Question 22: You have associated a logon account to one your UNIX cool ac...
Question 23: What is the purpose of the Interval setting in a CPM policy?...
Question 24: When managing SSH keys, the CPM stored the Private Key...
Question 25: CyberArk recommends implementing object level access control...
Question 26: Which parameters can be used to harden the Credential Files ...
Question 27: Which report provides a list of account stored in the vault....
Question 28: In your organization the "click to connect" button is not ac...
Question 29: It is possible to control the hours of the day during which ...
Question 30: The primary purpose of exclusive accounts is to ensure non-r...
Question 31: Which onboarding method would you use to integrate CyberArk ...
Question 32: Assuming a safe has been configured to be accessible during ...
Question 33: When creating an onboarding rule, it will be executed upon ...
Question 34: A newly created platform allows users to access a Linux endp...
Question 35: What is the primary purpose of One Time Passwords?...
Question 36: PSM for Windows (previously known as "RDP Proxy") supports c...
Question 37: Target account platforms can be restricted to accounts that ...
Question 38: Which of the following files must be created or configured m...
Question 39: In order to connect to a target device through PSM, the acco...
Question 40: Time of day or day of week restrictions on when password ver...
Question 41: As long as you are a member of the Vault Admins group, you c...
Question 42: If a password is changed manually on a server, bypassing the...
Question 43: You want to generate a license capacity report. Which tool a...
Question 44: An auditor needs to login to the PSM in order to live monito...
Question 45: For an account attached to a platform that requires Dual Con...
Question 46: Which Cyber Are components or products can be used to discov...
Question 47: A user requested access to view a password secured by dual-c...
Question 48: When on-boarding account using Accounts Feed, Which of the f...
Question 49: Target account platforms canbe restricted to accounts that a...
Question 50: In order to connect to a target device through PSM, the acco...
Question 51: For a safe with Object Level Access enabled you can turn off...
Question 52: Your customer, ACME Corp, wants to store the Safes Data in D...
Question 53: Arrange the steps to restore a Vault using PARestore for a B...
Question 54: You have associated a logon account to one your UNIX cool ac...
Question 55: You receive this error: "Error in changepass to user domain\...
Question 56: A user with administrative privileges to the vault can only ...
Question 57: What is the purpose of the CyberArk Event Notification Engin...
Question 58: Time of day or day of week restrictions on when password ver...
Question 59: Which of the following PTA detections require the deployment...
Question 60: What is the name of the Platform parameter that controls how...
Question 61: Users who have the 'Access Safe without confirmation' safe p...
Question 62: Which of the Following can be configured in the Master Poky?...
Question 63: For an account attached to a platform that requires Dual Con...
Question 64: What is the purpose of the Immediate Interval setting in a C...
Question 65: All of your Unix root passwords are stored in the safe UnixR...
Question 66: For Digital Vault Cluster in a high availability configurati...
Question 67: As long as you are a member ofthe Vault Admins group you can...
Question 68: In accordance with best practice, SSH access is denied for r...
Question 69: You have been asked to identify the up or down status of Vau...
Question 70: For a safe with Object Level Access enabled you can turn off...
Question 71: Can the 'Connect' button be used to initiate an SSH connecti...
Question 72: CyberArk implements license limits by controlling the number...
Question 73: Which Master Policy Setting must be active in order to have ...
Question 74: In a rule using "Privileged Session Analysis and Response" i...
Question 75: Can the 'Connect' button be used to initiate an SSH connecti...
Question 76: Which of the Following can be configured in the Master Polic...
Question 77: The password upload utility must run from the CPM server...
Question 78: What is the purpose of a linked account?...
Question 79: You are onboarding 5,000 UNIX root accounts for rotation by ...
Question 80: Which of the following are secure options for storing the co...
Question 81: SAFE Authorizations may be granted to____________. Select al...
Question 82: A user has successfully conducted a short PSM session and lo...
Question 83: According to the DEFAULT Web Options settings, which group g...
Question 84: Users can be restricted through certain CyberArk interfaces ...
Question 85: When managing SSH keys, the CPM stores the Public Key...
Question 86: If a user is a member of more than one group that has author...
Question 87: What is the purpose of the Immediate Interval setting in a C...
Question 88: Which of the following statements are NOT true when enabling...
Question 89: A Reconcile Account can be specified in the Master Policy....
Question 90: Which utilities could you use to change debugging levels on ...
Question 91: Which command configures email alerts within PTA if settings...
Question 92: The Vault administrator can change the Vault license by uplo...
Question 93: CyberArk implements license limits by controlling the number...
Question 94: Accounts Discovery allows secure connections to domain contr...
Question 95: Match each key to its recommended storage location. (Exhibit...
Question 96: When a group is granted the 'Authorize Account Requests' per...
Question 97: When managing SSH keys, the CPM stored the Private Key...
Question 98: The password upload utility must run from the CPM server...
Question 99: Which of the following components can be used to create a ta...
Question 100: What is the easiest way to duplicate an existing platform?...
Question 101: You have associated a logon account to one of your UNIX root...
Question 102: Target account platforms can be restricted to accounts that ...
Question 103: It is possible to leverage DNA to provide discovery function...
Question 104: Which utilities could you use to change debugging levels on ...
Question 105: Your organization requires all passwords be rotated every 90...
Question 106: A logon account can be specified in the platform settings....
Question 107: Secure Connect provides the following. Choose all that apply...
Question 108: In order to connect to a target device through PSM, the acco...