<< Prev Question Next Question >>

Question 43/86

An auditor initiates a live monitoring session to PSM server to view an ongoing live session. When the auditor's machine makes an RDP connection the PSM server, which user will be used?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (86q)
Question 1: Which user(s) can access all passwords in the Vault?...
Question 2: Which of the Following can be configured in the Master Poky?...
Question 3: In a Distributed Vaults environment, which of the following ...
Question 4: After the Vault server is installed, the Microsoft Windows f...
Question 5: For Digital Vault Cluster in a high availability configurati...
Question 6: You are creating a Dual Control workflow for a team's safe. ...
Question 7: A customer's environment three data centers, consisting of 5...
Question 8: Can the 'Connect' button be used to initiate an SSH connecti...
Question 9: The DR module allows an integration with enterprise backup s...
Question 10: Which is the primary purpose of exclusive accounts?...
Question 11: The password upload utility can be used to create Safes....
Question 12: Which of the following properties are mandatory when adding ...
Question 13: When Dual Control is enabled a user must first submit a requ...
Question 14: You have been asked to design the number of PVWAs a customer...
Question 15: In your organization the "click to connect" button is not ac...
Question 16: A newly created platform allows users to access a Linux endp...
Question 17: Which of the following features are provided by Ad-Hoc Acces...
Question 18: Which Cyber Are components or products can be used to discov...
Question 19: When managing SSH keys, the CPM stores the Public Key...
Question 20: Vault admins must manually add the auditors group to newly c...
Question 21: In addition to bit rate and estimated total duration of reco...
Question 22: The Vault can only integrate with a single Security Informat...
Question 23: Your customer, ACME Corp, wants to store the Safes Data in D...
Question 24: Platform settings are applied to _________....
Question 25: Select the best practice for storing the Master CD....
Question 26: The PSM requires the Remote Desktop Web Access role service....
Question 27: All of your Unix root passwords are stored in the safe UnixR...
Question 28: How does the Vault administrator apply a new license file?...
Question 29: Time of day or day of week restrictions on when password ver...
Question 30: Access control to passwords is implemented by __________....
Question 31: CyberArk user Neil is trying to connect to the Target Linux ...
Question 32: Within the Vault each password is encrypted by:...
Question 33: In accordance with best practice, SSH access is denied for r...
Question 34: SAFE Authorizations may be granted to____________. Select al...
Question 35: Which parameters can be used to harden the Credential Files ...
Question 36: PSM for Windows (previously known as RDP Proxy) supports con...
Question 37: Which file is used to open up a non-standard firewall port t...
Question 38: The Accounts Feed contains:
Question 39: The Vault needs to send Simple Network Management Protocol (...
Question 40: Which authentication methods does PSM for SSH support?...
Question 41: You want to generate a license capacity report. Which tool a...
Question 42: How much disk space do you need on the server for a PAReplic...
Question 43: An auditor initiates a live monitoring session to PSM server...
Question 44: What is the easiest way to duplicate an existing platform?...
Question 45: The Vault administrator can change the Vault license by uplo...
Question 46: Which of the following logs contains information about error...
Question 47: The password upload utility must run from the Central Policy...
Question 48: A Reconcile Account can be specified in the Master Policy....
Question 49: Match the log file name with the CyberArk Component that gen...
Question 50: You have been asked to turn off the time access restrictions...
Question 51: You are onboarding 5,000 UNIX root accounts for rotation by ...
Question 52: It is possible to restrict the time of day, or day of week t...
Question 53: Multiple Password Vault Web Access (PVWA) servers can be loa...
Question 54: Which statement is correct concerning accounts that are disc...
Question 55: The password upload utility must run from the CPM server...
Question 56: Which of the following files must be created or configured m...
Question 57: If a customer has one data center and requires high availabi...
Question 58: Which service should NOT be running on the DR Vault when the...
Question 59: Where does the Vault administrator configure in Password Vau...
Question 60: Which onboarding method is used to integrate CyberArk with t...
Question 61: A Vault Administrator team member can log in to CyberArk, bu...
Question 62: For the hardening process to complete successfully, the Vaul...
Question 63: What is the purpose of the password verify process?...
Question 64: Which combination of Safe member permissions will allow end ...
Question 65: Due to network activity, ACME Corp's PrivateArk Server becam...
Question 66: What is the purpose of the CyberArk Event Notification Engin...
Question 67: A company requires challenge/response multi-factor authentic...
Question 68: Match each PTA alert category with the PTA sensors that coll...
Question 69: Which permissions are needed for the Active Directory user r...
Question 70: Which SMTP address can be set on the Notification Settings p...
Question 71: When onboarding multiple accounts from the Pending Accounts ...
Question 72: In a default CyberArk installation, which group must a user ...
Question 73: You need to recover an account localadmin02 for target serve...
Question 74: Which report could show all accounts that are past their exp...
Question 75: What is the configuration file used by the CPM scanner when ...
Question 76: An auditor needs to login to the PSM in order to live monito...
Question 77: During the process of installing the Central Policy Manager ...
Question 78: What is the purpose of the Interval setting in a CPM policy?...
Question 79: As long as you are a member of the Vault Admins group you ca...
Question 80: A Vault administrator have associated a logon account to one...
Question 81: Which of the following is considered a prerequisite for inst...
Question 82: Match the Status of Service on a DR Vault to what is display...
Question 83: Which components support fault tolerance....
Question 84: When a DR Vault Server becomes an active vault, it will auto...
Question 85: Which one the following reports is NOT generated by using th...
Question 86: What is the easiest way to duplicate an existing platform?...