<< Prev Question Next Question >>

Question 53/66

As Vault Admin, you have been asked to enable your organization's CyberArk users to authenticate using LDAP.
In addition to Audit Users, which permission do you need to complete this task?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (66q)
Question 1: In which configuration file do you add LoadBalancerClientAdd...
Question 2: You are installing the HTML5 gateway on a Linux host using t...
Question 3: In an SMTP integration it is possible to use the fully-quali...
Question 4: What is the recommended method to determine if a PVWA is una...
Question 5: You need to add a new PSM server to an existing CyberArk env...
Question 6: Which pre-requisite step must be completed before installing...
Question 7: To apply a new license file you must:...
Question 8: A customer has five main data centers with one PVWA in each ...
Question 9: When performing "In Domain" hardening of a PSM server, which...
Question 10: The account used to install a PVWA must have ownership of wh...
Question 11: This value needs to be added to the PVWA configuration file:...
Question 12: What is the purpose of the CPM_Preinstallation.ps1 script in...
Question 13: A customer has two data centers and requires a single PVWA u...
Question 14: When configuring RADIUS authentication, which utility is use...
Question 15: Before the hardening process, your customer identified a PSM...
Question 16: What must you do to prepare a Windows server for PVWA instal...
Question 17: All 80 employees from your satellite Tokyo office are compla...
Question 18: The RemoteApp feature of PSM allows seamless Application win...
Question 19: What is a step to enable NTP synchronization on a stand-alon...
Question 20: After installing the first PSM server and before installing ...
Question 21: Which files does the Vault Installation Wizard prompt you fo...
Question 22: You are installing multiple PVWAs behind a load balancer. Wh...
Question 23: What must you do to synchronize a new Vault server with an o...
Question 24: Which keys are required to be present in order to start the ...
Question 25: The security of the Vault Server is entirely dependent on th...
Question 26: Your customer upgraded recently to version 12.2 to allow the...
Question 27: Which step is required to register a Vault manually in Amazo...
Question 28: You want to add an additional maintenance user on the PSM fo...
Question 29: Which user is enabled when replicating data between active a...
Question 30: Which utility should be used to register the Vault in Amazon...
Question 31: What are the basic network requirements to deploy a CPM serv...
Question 32: (Exhibit) Arrange the steps to failover to the DR CPM in the...
Question 33: Your customer wants to store the Safes Data on Vault Drive D...
Question 34: If a customer has one data center and requires fault toleran...
Question 35: You are configuring the Vault to send syslog audit data to y...
Question 36: Which of the following are supported authentication methods ...
Question 37: You are beginning the post-install process after a manual PS...
Question 38: Which configuration file and Vault utility are used to migra...
Question 39: Which parameter must be provided when registering a primary ...
Question 40: Which statement is correct about CPM behavior in a distribut...
Question 41: In a SIEM integration it is possible to use the fully-qualif...
Question 42: As a member of a PAM Level-2 support team, you are troublesh...
Question 43: How should you configure PSM for SSH to support load balanci...
Question 44: When integrating a Vault with HSM, which file is uploaded to...
Question 45: Which CyberArk component changes passwords on Target Devices...
Question 46: What is a prerequisite step before installing the Vault on W...
Question 47: Which statement is correct about a post-install hardening?...
Question 48: Which components can connect to a satellite Vault in a distr...
Question 49: Which parameter must be identical for both the Identity Prov...
Question 50: In large-scale environments, it is important to enable the C...
Question 51: You are setting up a Linux host to act as an HTML 5 gateway ...
Question 52: In order to retrieve data from the vault a user MUST use an ...
Question 53: As Vault Admin, you have been asked to enable your organizat...
Question 54: Which statements are correct about the PSM HTML5 gateway? (C...
Question 55: Which of the following protocols need to be installed on a s...
Question 56: Which configuration file and Vault utility are used to migra...
Question 57: You are successfully managing passwords in the alpha cyberar...
Question 58: A new domain controller has been added to your domain. You n...
Question 59: For redundancy, you want to add a secondary RADIUS server. W...
Question 60: A customer has five PVWA servers. Three are located at the p...
Question 61: The connect button requires PSM to work....
Question 62: A customer asked you to help scope the company's PSM deploym...
Question 63: What is a prerequisite step before CyberArk can be configure...
Question 64: What is a valid combination of primary and secondary layers ...
Question 65: What is the purpose of the PSM health check hardening?...
Question 66: Which file must you edit to ensure the PSM for SSH server is...