<< Prev Question Next Question >>

Question 43/74

You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How should this be configured to allow for password management using least privilege?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (74q)
Question 1: When a group is granted the 'Authorize Account Requests' per...
Question 2: Match each key to its recommended storage location. (Exhibit...
Question 3: Which statement is correct concerning accounts that are disc...
Question 4: PSM for Windows (previously known as "RDP Proxy") supports c...
Question 5: According to the DEFAULT Web Options settings, which group g...
Question 6: A new HTML5 Gateway has been deployed in your organization. ...
Question 7: Due to network activity, ACME Corp's PrivateArk Server becam...
Question 8: Which parameters can be used to harden the Credential Files ...
Question 9: An auditor needs to login to the PSM in order to live monito...
Question 10: You have associated a logon account to one your UNIX cool ac...
Question 11: CyberArk implements license limits by controlling the number...
Question 12: What is the purpose of the CyberArk Event Notification Engin...
Question 13: What is the purpose of the PrivateArk Database service?...
Question 14: Your organization has a requirement to allow users to "check...
Question 15: Can the 'Connect' button be used to initiate an SSH connecti...
Question 16: What is the maximum number of levels of authorization you ca...
Question 17: It is possible to restrict the time of day, or day of week t...
Question 18: Match each component to its respective Log File location. (E...
Question 19: As long as you are a member of the Vault Admins group you ca...
Question 20: You have been asked to identify the up or down status of Vau...
Question 21: You are onboarding an account that is not supported out of t...
Question 22: In order to connect to a target device through PSM, the acco...
Question 23: DRAG DROP For each listed prerequisite, identify if it is ma...
Question 24: Target account platforms can be restricted to accounts that ...
Question 25: Customers who have the 'Access Safe without confirmation' sa...
Question 26: Which CyberArk utility allows you to create lists of Master ...
Question 27: For Digital Vault Cluster in a high availability configurati...
Question 28: Which user is automatically added to all Safes and cannot be...
Question 29: Match the Status of Service on a DR Vault to what is display...
Question 30: To enable the Automatic response "Add to Pending" within PTA...
Question 31: When on-boarding account using Accounts Feed, Which of the f...
Question 32: The System safe allows access to the Vault configuration fil...
Question 33: You need to recover an account localadmin02 for target serve...
Question 34: Which CyberArk group does a user need to be part of to view ...
Question 35: Which of the following Privileged Session Management (PSM) s...
Question 36: You are creating a new Rest API user that utilizes CyberArk ...
Question 37: When a DR Vault Server becomes an active vault, it will auto...
Question 38: A user requested access to view a password secured by dual-c...
Question 39: Which of the Following can be configured in the Master Poky?...
Question 40: DRAG DROP Match each component to its respective Log File lo...
Question 41: DRAG DROP Match each key to its recommended storage location...
Question 42: A Logon Account can be specified in the Master Policy....
Question 43: You are onboarding 5,000 UNIX root accounts for rotation by ...
Question 44: The vault supports Role Based Access Control....
Question 45: When managing SSH keys, the CPM stored the Private Key...
Question 46: The primary purpose of exclusive accounts is to ensure non-r...
Question 47: A newly created platform allows users to access a Linux endp...
Question 48: A newly created platform allows users to access a Linux endp...
Question 49: Which values are acceptable in the address field of an Accou...
Question 50: A Vault Administrator team member can log in to CyberArk, bu...
Question 51: A Logon Account can be specified in the Master Policy....
Question 52: A Vault administrator have associated a logon account to one...
Question 53: Which is the primary purpose of exclusive accounts?...
Question 54: DRAG DROP Arrange the steps to restore a Vault using PAResto...
Question 55: When managing SSH keys, the CPM stores the Public Key...
Question 56: Time of day or day of week restrictions on when password ver...
Question 57: Which usage can be added as a service account platform?...
Question 58: You are logging into CyberArk as the Master user to recover ...
Question 59: All of your Unix root passwords are stored in the safe UnixR...
Question 60: Which parameters can be used to harden the Credential Files ...
Question 61: Which command configures email alerts within PTA if settings...
Question 62: If a user is a member of more than one group that has author...
Question 63: VAULT authorizations may be granted to_____....
Question 64: Which user(s) can access all passwords in the Vault?...
Question 65: Which of the following components can be used to create a ta...
Question 66: Match the connection component to the corresponding OS/Funct...
Question 67: A new domain controller has been added to your domain. You n...
Question 68: You need to enable the PSM for all platforms. Where do you p...
Question 69: How does the Vault administrator apply a new license file?...
Question 70: DRAG DROP Match each permission to where it can be found. (E...
Question 71: Your organization requires all passwords be rotated every 90...
Question 72: Which is the primary purpose of exclusive accounts?...
Question 73: An auditor initiates a live monitoring session to PSM server...
Question 74: Match the log file name with the CyberArk Component that gen...