<< Prev Question Next Question >>

Question 65/86

Due to network activity, ACME Corp's PrivateArk Server became active on the OR Vault while the Primary Vault was also running normally. All the components continued to point to the Primary Vault.
Which steps should you perform to restore DR replication to normal?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (86q)
Question 1: Which user(s) can access all passwords in the Vault?...
Question 2: Which of the Following can be configured in the Master Poky?...
Question 3: In a Distributed Vaults environment, which of the following ...
Question 4: After the Vault server is installed, the Microsoft Windows f...
Question 5: For Digital Vault Cluster in a high availability configurati...
Question 6: You are creating a Dual Control workflow for a team's safe. ...
Question 7: A customer's environment three data centers, consisting of 5...
Question 8: Can the 'Connect' button be used to initiate an SSH connecti...
Question 9: The DR module allows an integration with enterprise backup s...
Question 10: Which is the primary purpose of exclusive accounts?...
Question 11: The password upload utility can be used to create Safes....
Question 12: Which of the following properties are mandatory when adding ...
Question 13: When Dual Control is enabled a user must first submit a requ...
Question 14: You have been asked to design the number of PVWAs a customer...
Question 15: In your organization the "click to connect" button is not ac...
Question 16: A newly created platform allows users to access a Linux endp...
Question 17: Which of the following features are provided by Ad-Hoc Acces...
Question 18: Which Cyber Are components or products can be used to discov...
Question 19: When managing SSH keys, the CPM stores the Public Key...
Question 20: Vault admins must manually add the auditors group to newly c...
Question 21: In addition to bit rate and estimated total duration of reco...
Question 22: The Vault can only integrate with a single Security Informat...
Question 23: Your customer, ACME Corp, wants to store the Safes Data in D...
Question 24: Platform settings are applied to _________....
Question 25: Select the best practice for storing the Master CD....
Question 26: The PSM requires the Remote Desktop Web Access role service....
Question 27: All of your Unix root passwords are stored in the safe UnixR...
Question 28: How does the Vault administrator apply a new license file?...
Question 29: Time of day or day of week restrictions on when password ver...
Question 30: Access control to passwords is implemented by __________....
Question 31: CyberArk user Neil is trying to connect to the Target Linux ...
Question 32: Within the Vault each password is encrypted by:...
Question 33: In accordance with best practice, SSH access is denied for r...
Question 34: SAFE Authorizations may be granted to____________. Select al...
Question 35: Which parameters can be used to harden the Credential Files ...
Question 36: PSM for Windows (previously known as RDP Proxy) supports con...
Question 37: Which file is used to open up a non-standard firewall port t...
Question 38: The Accounts Feed contains:
Question 39: The Vault needs to send Simple Network Management Protocol (...
Question 40: Which authentication methods does PSM for SSH support?...
Question 41: You want to generate a license capacity report. Which tool a...
Question 42: How much disk space do you need on the server for a PAReplic...
Question 43: An auditor initiates a live monitoring session to PSM server...
Question 44: What is the easiest way to duplicate an existing platform?...
Question 45: The Vault administrator can change the Vault license by uplo...
Question 46: Which of the following logs contains information about error...
Question 47: The password upload utility must run from the Central Policy...
Question 48: A Reconcile Account can be specified in the Master Policy....
Question 49: Match the log file name with the CyberArk Component that gen...
Question 50: You have been asked to turn off the time access restrictions...
Question 51: You are onboarding 5,000 UNIX root accounts for rotation by ...
Question 52: It is possible to restrict the time of day, or day of week t...
Question 53: Multiple Password Vault Web Access (PVWA) servers can be loa...
Question 54: Which statement is correct concerning accounts that are disc...
Question 55: The password upload utility must run from the CPM server...
Question 56: Which of the following files must be created or configured m...
Question 57: If a customer has one data center and requires high availabi...
Question 58: Which service should NOT be running on the DR Vault when the...
Question 59: Where does the Vault administrator configure in Password Vau...
Question 60: Which onboarding method is used to integrate CyberArk with t...
Question 61: A Vault Administrator team member can log in to CyberArk, bu...
Question 62: For the hardening process to complete successfully, the Vaul...
Question 63: What is the purpose of the password verify process?...
Question 64: Which combination of Safe member permissions will allow end ...
Question 65: Due to network activity, ACME Corp's PrivateArk Server becam...
Question 66: What is the purpose of the CyberArk Event Notification Engin...
Question 67: A company requires challenge/response multi-factor authentic...
Question 68: Match each PTA alert category with the PTA sensors that coll...
Question 69: Which permissions are needed for the Active Directory user r...
Question 70: Which SMTP address can be set on the Notification Settings p...
Question 71: When onboarding multiple accounts from the Pending Accounts ...
Question 72: In a default CyberArk installation, which group must a user ...
Question 73: You need to recover an account localadmin02 for target serve...
Question 74: Which report could show all accounts that are past their exp...
Question 75: What is the configuration file used by the CPM scanner when ...
Question 76: An auditor needs to login to the PSM in order to live monito...
Question 77: During the process of installing the Central Policy Manager ...
Question 78: What is the purpose of the Interval setting in a CPM policy?...
Question 79: As long as you are a member of the Vault Admins group you ca...
Question 80: A Vault administrator have associated a logon account to one...
Question 81: Which of the following is considered a prerequisite for inst...
Question 82: Match the Status of Service on a DR Vault to what is display...
Question 83: Which components support fault tolerance....
Question 84: When a DR Vault Server becomes an active vault, it will auto...
Question 85: Which one the following reports is NOT generated by using th...
Question 86: What is the easiest way to duplicate an existing platform?...