<< Prev Question Next Question >>

Question 87/99

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group Operations Staff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of Operations Managers never need to be able to use the show, copy or connect buttons themselves.
Which safe permission do you need to grant Operations Staff? Check all that apply.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (99q)
Question 1: To enable the Automatic response "Add to Pending" within PTA...
Question 2: What is the configuration file used by the CPM scanner when ...
Question 3: You have been given the requirement that certain accounts ca...
Question 4: Which statement is true about setting the reconcile account ...
Question 5: Your organization has a requirement to allow users to "check...
Question 6: You are configuring a Vault HA cluster. Which file should yo...
Question 7: Which utilities could you use to change debugging levels on ...
Question 8: Which methods can you use to add a user directly to the Vaul...
Question 9: Which statement about the Master Policy best describes the d...
Question 10: You want to build a connector that connects to a website thr...
Question 11: PSM captures a record of each command that was executed in U...
Question 12: In a rule using "Privileged Session Analysis and Response" i...
Question 13: Which keys are required to be present in order to start the ...
Question 14: It is possible to leverage DNA to provide discovery function...
Question 15: What are the minimum permissions to add multiple accounts fr...
Question 16: What is the purpose of the PrivateArk Server service?...
Question 17: A user has successfully conducted a short PSM session and lo...
Question 18: For each listed prerequisite, identify if it is mandatory or...
Question 19: When managing SSH keys, the CPM stores the Public Key...
Question 20: CyberArk recommends implementing object level access control...
Question 21: Which dependent accounts does the CPM support out-of-the-box...
Question 22: Which of the following options is not set in the Master Poli...
Question 23: You are onboarding 5,000 UNIX root accounts for rotation by ...
Question 24: SAFE Authorizations may be granted to____________. Select al...
Question 25: A Logon Account can be specified in the Master Policy....
Question 26: Which processes reduce the risk of credential theft? (Choose...
Question 27: You receive this error: "Error in changepass to user domain\...
Question 28: For a safe with Object Level Access enabled you can turn off...
Question 29: What can you do to ensure each component server is operation...
Question 30: You want to create a new onboarding rule. Where do you accom...
Question 31: When a group is granted the 'Authorize Account Requests' per...
Question 32: What is the correct process to install a custom platform fro...
Question 33: To ensure all sessions are being recorded, a CyberArk admini...
Question 34: You are creating a shared safe for the help desk. What must ...
Question 35: What are the mandatory fields when onboarding from Pending A...
Question 36: Which of the following properties are mandatory when adding ...
Question 37: According to the DEFAULT Web Options settings, which group g...
Question 38: You are logging into CyberArk as the Master user to recover ...
Question 39: By default, members of which built-in groups will be able to...
Question 40: Which of the following PTA detections are included in the Co...
Question 41: Which parameter controls how often the CPM looks for Soon-to...
Question 42: Match each key to its recommended storage location. (Exhibit...
Question 43: The password upload utility must run from the CPM server...
Question 44: Where can you check that the LDAP binding is using TCP/636?...
Question 45: When onboarding multiple accounts from the Pending Accounts ...
Question 46: Within the Vault each password is encrypted by:...
Question 47: Which of the following components can be used to create a ta...
Question 48: What is the purpose of the Interval setting in a CPM policy?...
Question 49: Which certificate type do you need to configure the vault fo...
Question 50: Which of the following PTA detections require the deployment...
Question 51: In accordance with best practice, SSH access is denied for r...
Question 52: In a default CyberArk installation, which group must a user ...
Question 53: Your customer, ACME Corp, wants to store the Safes Data in D...
Question 54: As long as you are a member of the Vault Admins group, you c...
Question 55: If PTA is integrated with a supported SIEM solution, which d...
Question 56: Which CyberArk group does a user need to be part of to view ...
Question 57: Where can reconcile and/or logon accounts be linked to an ac...
Question 58: You are onboarding an account that is not supported out of t...
Question 59: An auditor needs to login to the PSM in order to live monito...
Question 60: You need to enable the PSM for all platforms. Where do you p...
Question 61: Select the best practice for storing the Master CD....
Question 62: In the screenshot displayed, you just configured the usage i...
Question 63: Ad-Hoc Access (formerly Secure Connect) provides the followi...
Question 64: You want to create a new onboarding rule. Where do you accom...
Question 65: A new HTML5 Gateway has been deployed in your organization. ...
Question 66: You created a new platform by duplicating the out-of-box Lin...
Question 67: Which service should NOT be running on the DR Vault when the...
Question 68: What do you need on the Vault to support LDAP over SSL?...
Question 69: What is the easiest way to duplicate an existing platform?...
Question 70: In your organization the "click to connect" button is not ac...
Question 71: Which of these accounts onboarding methods is considered pro...
Question 72: Your organization requires all passwords be rotated every 90...
Question 73: Before failing back to the production infrastructure after a...
Question 74: You are configuring CyberArk to use HTML5 gateways exclusive...
Question 75: You created a new safe and need to ensure the user group can...
Question 76: Which combination of Safe member permissions will allow end ...
Question 77: Which type of automatic remediation can be performed by the ...
Question 78: Due to network activity, ACME Corp's PrivateArk Server becam...
Question 79: When an account is unable to change its own password, how ca...
Question 80: The vault supports Role Based Access Control....
Question 81: You are creating a new Rest API user that utilizes CyberArk ...
Question 82: It is possible to control the hours of the day during which ...
Question 83: Which command generates a full backup of the Vault?...
Question 84: What is the primary purpose of Dual Control?...
Question 85: VAULT authorizations may be granted to_____....
Question 86: Target account platforms can be restricted to accounts that ...
Question 87: All of your Unix root passwords are stored in the safe UnixR...
Question 88: Where can a user with the appropriate permissions generate a...
Question 89: Match the log file name with the CyberArk Component that gen...
Question 90: You have been asked to turn off the time access restrictions...
Question 91: Which report could show all accounts that are past their exp...
Question 92: A Vault Administrator team member can log in to CyberArk, bu...
Question 93: When are external vault users and groups synchronized by def...
Question 94: What must you specify when configuring a discovery scan for ...
Question 95: A user needs to view recorded sessions through the PVWA. Wit...
Question 96: What is the primary purpose of One Time Passwords?...
Question 97: Users can be resulted to using certain CyberArk interfaces (...
Question 98: A user with administrative privileges to the vault can only ...
Question 99: When managing SSH keys, the CPM stored the Private Key...