Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
A customer's environment three data centers, consisting of 5,000 servers in Germany, 10,000 servers in Canada, 1,500 servers in Singapore. You want to manage target servers and avoid complex firewall rules. How many CPM's should you deploy?
Which CyberArk group does a user need to be part of to view recordings or live monitor sessions?
You are installing multiple PVWAs behind a load balancer. Which statement is correct?
You are installing HTML5 gateway on a Linux host using the RPM provided. After installing the Tomcat webapp, what is the next step in the installation process?
You have been asked to configure SNMP remote monitoring for your organization's Vault servers. In the PARAgent.ini, which parameter specifies the destination of the Vault SNMP Traps?
A Vault Administrator team member can log in to CyberArk, but for some reason, is not given Vault Admin rights.
Where can you check to verify that the Vault Admins directory mapping points to the correct AD group?
By default, members of which built-in groups will be able to view and configure Automatic Remediation and Session Analysis and Response in the PVWA?
When creating Distributed Vault environment architecture, what is the maximum number of Vault servers that can be deployed''
You are installing PSM for SSH with AD-Bridge in CyberArkSSHD mode for your customer. ACME Corp What do you need to install to meet your customer's needs? (Choose 2)
Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?
What is the configuration file used by the CPM scanner when scanning UNIX/Linux devices?
Which command configures email alerts within PTA if settings need to be changed post install?
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?
Which CyberArk utility allows you to create lists of Master Policy Settings, owners and safes for output to text files or MSSQL databases?
Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?
In a default CyberArk installation, which group must a user be a member of to view the “reports” page in PVWA?
A company requires challenge/response multi-factor authentication for PSMP sessions. Which server must you integrate with the CyberArk vault?
Which of the following statements are NOT true when enabling PSM recording for a target Windows server? (Choose all that apply)
Which browser is supported for PSM Web Connectors developed using the CyberArk Plugin Generator Utility (PGUP
Which of the following PTA detections require the deployment of a Network Sensor or installing the PTA Agent on the domain controller?
In a rule using “Privileged Session Analysis and Response” in PTA, which session options are available to configure as responses to activities?
Which of the following properties are mandatory when adding accounts from a file? (Choose three.)
Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?
A customer is deploying PVWAs in the Amazon Web Services Public Cloud. Which load balancing option does CyberArk recommend?
Which step is required to register a Vault manually in Amazon Web Services using CAVaultManager?
CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.
What is the name of the Platform parameters that controls how long a password will stay valid when One Time Passwords are enabled via the Master Policy?
An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?
Users who have the 'Access Safe without confirmation' safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.
For each listed prerequisite, identify if it is mandatory or not mandatory to run the PSM Health Check.
A newly created platform allows users to access a Linux endpoint. When users click to connect, nothing happens.
Which piece of the platform is missing?
Which component must be installed on the Vault if Distributed Vaults is used with PSM?
As long as you are a member of the Vault Admins group, you can grant any permission on any safe that you have access to.
CyberArk user Neil is trying to connect to the Target Linux server 192.168.1.64 using a domain account ACME/linuxuser01 on Domain Acme.corp using PSM for SSH server 192.168.65.145. What is the correct syntax?
A user has successfully conducted a short PSM session and logged off. However, the user cannot access the Monitoring tab to view the recordings.
What is the issue?
Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests.
PSM for Windows (previously known as “RDP Proxy”) supports connections to the following target systems
Your organization requires all passwords be rotated every 90 days.
Where can you set this regulatory requirement?
Which option in the Private Ark client is used to update users’ Vault group memberships?
Which permissions are needed for the Active Directory user required by the Windows Discovery process?