<< Prev Question Next Question >>

Question 58/99

You are onboarding an account that is not supported out of the box.
What should you do first to obtain a platform to import?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (99q)
Question 1: To enable the Automatic response "Add to Pending" within PTA...
Question 2: What is the configuration file used by the CPM scanner when ...
Question 3: You have been given the requirement that certain accounts ca...
Question 4: Which statement is true about setting the reconcile account ...
Question 5: Your organization has a requirement to allow users to "check...
Question 6: You are configuring a Vault HA cluster. Which file should yo...
Question 7: Which utilities could you use to change debugging levels on ...
Question 8: Which methods can you use to add a user directly to the Vaul...
Question 9: Which statement about the Master Policy best describes the d...
Question 10: You want to build a connector that connects to a website thr...
Question 11: PSM captures a record of each command that was executed in U...
Question 12: In a rule using "Privileged Session Analysis and Response" i...
Question 13: Which keys are required to be present in order to start the ...
Question 14: It is possible to leverage DNA to provide discovery function...
Question 15: What are the minimum permissions to add multiple accounts fr...
Question 16: What is the purpose of the PrivateArk Server service?...
Question 17: A user has successfully conducted a short PSM session and lo...
Question 18: For each listed prerequisite, identify if it is mandatory or...
Question 19: When managing SSH keys, the CPM stores the Public Key...
Question 20: CyberArk recommends implementing object level access control...
Question 21: Which dependent accounts does the CPM support out-of-the-box...
Question 22: Which of the following options is not set in the Master Poli...
Question 23: You are onboarding 5,000 UNIX root accounts for rotation by ...
Question 24: SAFE Authorizations may be granted to____________. Select al...
Question 25: A Logon Account can be specified in the Master Policy....
Question 26: Which processes reduce the risk of credential theft? (Choose...
Question 27: You receive this error: "Error in changepass to user domain\...
Question 28: For a safe with Object Level Access enabled you can turn off...
Question 29: What can you do to ensure each component server is operation...
Question 30: You want to create a new onboarding rule. Where do you accom...
Question 31: When a group is granted the 'Authorize Account Requests' per...
Question 32: What is the correct process to install a custom platform fro...
Question 33: To ensure all sessions are being recorded, a CyberArk admini...
Question 34: You are creating a shared safe for the help desk. What must ...
Question 35: What are the mandatory fields when onboarding from Pending A...
Question 36: Which of the following properties are mandatory when adding ...
Question 37: According to the DEFAULT Web Options settings, which group g...
Question 38: You are logging into CyberArk as the Master user to recover ...
Question 39: By default, members of which built-in groups will be able to...
Question 40: Which of the following PTA detections are included in the Co...
Question 41: Which parameter controls how often the CPM looks for Soon-to...
Question 42: Match each key to its recommended storage location. (Exhibit...
Question 43: The password upload utility must run from the CPM server...
Question 44: Where can you check that the LDAP binding is using TCP/636?...
Question 45: When onboarding multiple accounts from the Pending Accounts ...
Question 46: Within the Vault each password is encrypted by:...
Question 47: Which of the following components can be used to create a ta...
Question 48: What is the purpose of the Interval setting in a CPM policy?...
Question 49: Which certificate type do you need to configure the vault fo...
Question 50: Which of the following PTA detections require the deployment...
Question 51: In accordance with best practice, SSH access is denied for r...
Question 52: In a default CyberArk installation, which group must a user ...
Question 53: Your customer, ACME Corp, wants to store the Safes Data in D...
Question 54: As long as you are a member of the Vault Admins group, you c...
Question 55: If PTA is integrated with a supported SIEM solution, which d...
Question 56: Which CyberArk group does a user need to be part of to view ...
Question 57: Where can reconcile and/or logon accounts be linked to an ac...
Question 58: You are onboarding an account that is not supported out of t...
Question 59: An auditor needs to login to the PSM in order to live monito...
Question 60: You need to enable the PSM for all platforms. Where do you p...
Question 61: Select the best practice for storing the Master CD....
Question 62: In the screenshot displayed, you just configured the usage i...
Question 63: Ad-Hoc Access (formerly Secure Connect) provides the followi...
Question 64: You want to create a new onboarding rule. Where do you accom...
Question 65: A new HTML5 Gateway has been deployed in your organization. ...
Question 66: You created a new platform by duplicating the out-of-box Lin...
Question 67: Which service should NOT be running on the DR Vault when the...
Question 68: What do you need on the Vault to support LDAP over SSL?...
Question 69: What is the easiest way to duplicate an existing platform?...
Question 70: In your organization the "click to connect" button is not ac...
Question 71: Which of these accounts onboarding methods is considered pro...
Question 72: Your organization requires all passwords be rotated every 90...
Question 73: Before failing back to the production infrastructure after a...
Question 74: You are configuring CyberArk to use HTML5 gateways exclusive...
Question 75: You created a new safe and need to ensure the user group can...
Question 76: Which combination of Safe member permissions will allow end ...
Question 77: Which type of automatic remediation can be performed by the ...
Question 78: Due to network activity, ACME Corp's PrivateArk Server becam...
Question 79: When an account is unable to change its own password, how ca...
Question 80: The vault supports Role Based Access Control....
Question 81: You are creating a new Rest API user that utilizes CyberArk ...
Question 82: It is possible to control the hours of the day during which ...
Question 83: Which command generates a full backup of the Vault?...
Question 84: What is the primary purpose of Dual Control?...
Question 85: VAULT authorizations may be granted to_____....
Question 86: Target account platforms can be restricted to accounts that ...
Question 87: All of your Unix root passwords are stored in the safe UnixR...
Question 88: Where can a user with the appropriate permissions generate a...
Question 89: Match the log file name with the CyberArk Component that gen...
Question 90: You have been asked to turn off the time access restrictions...
Question 91: Which report could show all accounts that are past their exp...
Question 92: A Vault Administrator team member can log in to CyberArk, bu...
Question 93: When are external vault users and groups synchronized by def...
Question 94: What must you specify when configuring a discovery scan for ...
Question 95: A user needs to view recorded sessions through the PVWA. Wit...
Question 96: What is the primary purpose of One Time Passwords?...
Question 97: Users can be resulted to using certain CyberArk interfaces (...
Question 98: A user with administrative privileges to the vault can only ...
Question 99: When managing SSH keys, the CPM stored the Private Key...