<< Prev Question Next Question >>

Question 12/80

PSM captures a record of each command that was issues in SQL Plus.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (80q)
Question 1: The Application Inventory report is related to AIM....
1 commentQuestion 2: How does the Vault administrator apply a new license file?...
Question 3: Match the log file name with the CyberArk Component that gen...
Question 4: Which is the correct order of installation for PAS component...
Question 5: The vault server uses a modified version of the Microsoft Wi...
Question 6: The vault does not support Role Based Access Control...
Question 7: One of your users is receiving the error message "ITATS006E ...
Question 8: Within the Vault each password is encrypted by...
Question 9: Which of the following are secure options for storing the co...
Question 10: Which CyberArk components or products can be used to discove...
Question 11: A vault admin received an email notification that a password...
Question 12: PSM captures a record of each command that was issues in SQL...
Question 13: Customers who have the 'Access Safe without confirmation' sa...
Question 14: Which service should NOT be running on the DR Vault when the...
Question 15: In version 10.7 the correct order of installation for compon...
Question 16: It is impossible to override Master Policy settings for a Pl...
Question 17: Which credentials does CyberArk use when managing a target a...
Question 18: In the vault each password is encrypted with a unique encryp...
Question 19: What is the purpose of the PrivateArk Server service?...
Question 20: In an SMTP integration it is recommended to use the fully-qu...
Question 21: The PSM requires the Remote Desktop Web Access role service....
Question 22: You have associated a logon account to one of your UNIX root...
Question 23: What is the purpose of the CyberArk Event Notification Engin...
Question 24: Can ITALOG records be forwarded to the monitoring solution v...
Question 25: Which of the following sends out Simple Network Management P...
Question 26: The Vault Internal safe contains the configuration for an LD...
Question 27: The PSM Gateway (also known as the HTML5 Gateway) can be ins...
Question 28: A SIEM integration is a powerful way to correlate Privileged...
Question 29: Which utilities could you use to change debugging levels on ...
Question 30: Which of these accounts onboarding methods is considered pro...
Question 31: In order to connect to a target device through PSM. the acco...
Question 32: Which user(s) can access all passwords in the vault...
Question 33: What is the primary purpose of Dual Control?...
Question 34: When on-boarding accounts using Accounts Feed. Which of the ...
Question 35: A Simple Network Management Protocol (SNMP) integration allo...
Question 36: A Reconcile Account can be specified in the Master Policy....
1 commentQuestion 37: For the hardening process to complete successfully, security...
Question 38: During the process of installing the Central Policy Manager ...
Question 39: Which file is used to configure new firewall rules on the Va...
Question 40: Which is the purpose of the HeadStartInterval setting in a p...
1 commentQuestion 41: What is the process to remove object level access control fr...
Question 42: In an SIEM integration it is recommended to use the fully-qu...
Question 43: Which combination of safe member permissions will allow End ...
Question 44: dbparm.ini is the main configuration file for the vault....
Question 45: During the process of installing the CPM, you will be asked ...
Question 46: Any user can monitor live sessions in real time when users i...
Question 47: Select the best practice for storing the Master CD....
Question 48: Multiple PVWA servers provide automatic load balancing....
Question 49: How does the Vault administrator configure the CyberArk Disa...
Question 50: After the Vault administrator configures syslog integration ...
Question 51: The Vault administrator can change the Vault license by uplo...
Question 52: Name two ways of viewing the ITAlog:...
Question 53: Which report could show all accounts that are past their exp...
Question 54: Multiple Vault Servers can be load balanced....
Question 55: The DR module allows an integration with Enterprise Backup s...
Question 56: A safe was recently created by a user who is a member of the...
Question 57: The vault does not support Subnet Based Access Control....
Question 58: Which Master Policy Setting(s) must be active in order to ha...
Question 59: CyberArk recommends implementing object level access control...
Question 60: What values are acceptable in the address field on the Accou...
Question 61: PSM requires the Remote Desktop Gateway role service....
Question 62: CyberArk implements license limits by controlling the number...
Question 63: As long as you are a member of the Vault Admins group, you c...
Question 64: Which IP port and Protocol are used by the CyberArk Secure P...
Question 65: When managing SSH keys, the CPM stores the Public Key ______...
Question 66: If a password is changed manually on a server, bypassing the...
Question 67: When is the transparent user provisioned initially in the va...
Question 68: When managing SSH keys, the Central Policy Manager (CPM) sto...
Question 69: Which of the Following can be configured in the Master Polic...
Question 70: Accounts Discovery allows secure connections to domain contr...
Question 71: When using multiple Central Policy Managers (CPM), which one...
Question 72: In a Distributed Vaults environment, which of the following ...
Question 73: Which keys are required to be present in order to start the ...
Question 74: Which file is used to integrate the Vault with your Radius s...
Question 75: When working with the CyberArk Cluster, the Virtual IP is us...
Question 76: The Vault Internal safe contains all of the configuration fo...
Question 77: It is possible to disable the Show and Copy buttons without ...
Question 78: Which of the following is considered a prerequiste for insta...
Question 79: Which user is automatically given all Safe authorizations on...
Question 80: Which file does the Vault administrator need to edit in orde...