<< Prev Question Next Question >>

Question 34/74

Which CyberArk group does a user need to be part of to view recordings or live monitor sessions?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (74q)
Question 1: When a group is granted the 'Authorize Account Requests' per...
Question 2: Match each key to its recommended storage location. (Exhibit...
Question 3: Which statement is correct concerning accounts that are disc...
Question 4: PSM for Windows (previously known as "RDP Proxy") supports c...
Question 5: According to the DEFAULT Web Options settings, which group g...
Question 6: A new HTML5 Gateway has been deployed in your organization. ...
Question 7: Due to network activity, ACME Corp's PrivateArk Server becam...
Question 8: Which parameters can be used to harden the Credential Files ...
Question 9: An auditor needs to login to the PSM in order to live monito...
Question 10: You have associated a logon account to one your UNIX cool ac...
Question 11: CyberArk implements license limits by controlling the number...
Question 12: What is the purpose of the CyberArk Event Notification Engin...
Question 13: What is the purpose of the PrivateArk Database service?...
Question 14: Your organization has a requirement to allow users to "check...
Question 15: Can the 'Connect' button be used to initiate an SSH connecti...
Question 16: What is the maximum number of levels of authorization you ca...
Question 17: It is possible to restrict the time of day, or day of week t...
Question 18: Match each component to its respective Log File location. (E...
Question 19: As long as you are a member of the Vault Admins group you ca...
Question 20: You have been asked to identify the up or down status of Vau...
Question 21: You are onboarding an account that is not supported out of t...
Question 22: In order to connect to a target device through PSM, the acco...
Question 23: DRAG DROP For each listed prerequisite, identify if it is ma...
Question 24: Target account platforms can be restricted to accounts that ...
Question 25: Customers who have the 'Access Safe without confirmation' sa...
Question 26: Which CyberArk utility allows you to create lists of Master ...
Question 27: For Digital Vault Cluster in a high availability configurati...
Question 28: Which user is automatically added to all Safes and cannot be...
Question 29: Match the Status of Service on a DR Vault to what is display...
Question 30: To enable the Automatic response "Add to Pending" within PTA...
Question 31: When on-boarding account using Accounts Feed, Which of the f...
Question 32: The System safe allows access to the Vault configuration fil...
Question 33: You need to recover an account localadmin02 for target serve...
Question 34: Which CyberArk group does a user need to be part of to view ...
Question 35: Which of the following Privileged Session Management (PSM) s...
Question 36: You are creating a new Rest API user that utilizes CyberArk ...
Question 37: When a DR Vault Server becomes an active vault, it will auto...
Question 38: A user requested access to view a password secured by dual-c...
Question 39: Which of the Following can be configured in the Master Poky?...
Question 40: DRAG DROP Match each component to its respective Log File lo...
Question 41: DRAG DROP Match each key to its recommended storage location...
Question 42: A Logon Account can be specified in the Master Policy....
Question 43: You are onboarding 5,000 UNIX root accounts for rotation by ...
Question 44: The vault supports Role Based Access Control....
Question 45: When managing SSH keys, the CPM stored the Private Key...
Question 46: The primary purpose of exclusive accounts is to ensure non-r...
Question 47: A newly created platform allows users to access a Linux endp...
Question 48: A newly created platform allows users to access a Linux endp...
Question 49: Which values are acceptable in the address field of an Accou...
Question 50: A Vault Administrator team member can log in to CyberArk, bu...
Question 51: A Logon Account can be specified in the Master Policy....
Question 52: A Vault administrator have associated a logon account to one...
Question 53: Which is the primary purpose of exclusive accounts?...
Question 54: DRAG DROP Arrange the steps to restore a Vault using PAResto...
Question 55: When managing SSH keys, the CPM stores the Public Key...
Question 56: Time of day or day of week restrictions on when password ver...
Question 57: Which usage can be added as a service account platform?...
Question 58: You are logging into CyberArk as the Master user to recover ...
Question 59: All of your Unix root passwords are stored in the safe UnixR...
Question 60: Which parameters can be used to harden the Credential Files ...
Question 61: Which command configures email alerts within PTA if settings...
Question 62: If a user is a member of more than one group that has author...
Question 63: VAULT authorizations may be granted to_____....
Question 64: Which user(s) can access all passwords in the Vault?...
Question 65: Which of the following components can be used to create a ta...
Question 66: Match the connection component to the corresponding OS/Funct...
Question 67: A new domain controller has been added to your domain. You n...
Question 68: You need to enable the PSM for all platforms. Where do you p...
Question 69: How does the Vault administrator apply a new license file?...
Question 70: DRAG DROP Match each permission to where it can be found. (E...
Question 71: Your organization requires all passwords be rotated every 90...
Question 72: Which is the primary purpose of exclusive accounts?...
Question 73: An auditor initiates a live monitoring session to PSM server...
Question 74: Match the log file name with the CyberArk Component that gen...