CDE Recert v3 2025

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 462

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

463 Terms

1

Which command configures email alerts within PTA if settings need to be changed post install?

A. /opt/tomcat/utility/emailConfiguration.sh

B. /opt/PTA/emai!Configuration.sh

C. /opt/PTA/utility/emailConfig.sh

D. /opt/tomcat/utiity/emailSetup.sh

A. /opt/tomcat/utility/emailConfiguration.sh

New cards
2

Which of the following Privileged Session Management solutions provide a detailed audit log of session activities?

A. All of the above

B. PSM (i.e., launching connections by clicking on the "Connect" button in the PVWA)

C. PSM for Windows (previously known as RDP Proxy)

D. PSM for SSH (previously known as PSM SSH Proxy)

A. All of the above

New cards
3

It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occur

A. TRUE

B. FALSE

A. TRUE

New cards
4

According to the DEFAULT Web Options settings, which group grants access to the REPORTS page?

A. PVWAUsers

B. Vault Admins

C. Auditors

D. PVWAMonitor

D. PVWAMonitor

New cards
5

By default, members of which built-in groups will be able to view and configure Automatic Remediation and Session Analysis and Response in the PVWA?

A. Vault Admins

B. Security Admins

C. Security Operators

D. Auditors

A. Vault Admins

B. Security Admins

New cards
6

When managing SSH keys, the CPM stores the Public Key

A. Nowhere because the public key can always be generated from the private key.

B. A & B

C. On the target server

D. In the Vault

C. On the target server

New cards
7

You need to recover an account localadmin02 for target server 10.0.123.73 stored in Safe Team1.What do you need to recover and decrypt the object? (Choose three.)

A. Recovery Private Key

B. Recover.exe

C. Vault data

D. Recovery Public Key

E. Server Key

F. Master Password

A. Recovery Private Key

B. Recover.exe

D. Recovery Public Key

New cards
8

What is the name of the Platform parameters that controls how long a password will stay valid when One Time Passwords are enabled via the Master Policy?

A. Min Validity Period

B. Interval

C. Immediate Interval

D. Timeout

A. Min Validity Period

New cards
9

When Dual Control is enabled a user must first submit a request in the Password Vault Web Access (PVWA) and receive approval before being able to launch a secure connection via PSM for Windows (previously known as RDP Proxy).

A. True

B. False, a user can submit the request after the connection has already been initiated via the PSM for Windows

A. True

New cards
10

The vault supports Subnet Based Access Control.

A. FALSE

B. TRUE

B. TRUE

New cards
11

New cards
12

Select the best practice for storing the Master CD.

A. Store the CD in a secure location, such as a physical safe, and copy the contents of the CD to a folder secured with NTFS permissions on the Vault

B. Store the CD in a secure location, such as a physical safe

C. Copy the contents of the CD to a Hardware Security Module (HSM) and discard the CD

D. Copy the files to the Vault server and discard the CD

B. Store the CD in a secure location, such as a physical safe

New cards
13

Which keys are required to be present in order to start the PrivateArk Server service?

A. Server key

B. Recovery private key

C. Safe key

D. Recovery public key

A. Server key and D. Recovery public key

New cards
14

To enable the Automatic response "Add to Pending" within PTA when unmanaged credentials are found, what are the minimum permissions required by PTAUser for the PasswordManager_pending safe?

A. List Accounts, View Safe members, Add accounts (includes update properties), Update Account content, Update Account properties

B. List Accounts, Add accounts (includes update properties), Delete Accounts, Manage Safe

C. View Accounts, Update Account content, Update Account properties, Access Safe without confirmation, Manage Safe, View Audit

D. Add accounts (includes update properties), Update Account content, Update Account properties, View Audit

A. List Accounts, View Safe members, Add accounts (includes update properties), Update Account content, Update Account properties

New cards
15

When running a "Privileged Accounts Inventory" Report through the Reports page in PVWA on a specific safe, which permission/s are required on that safe to show complete account inventory information?

A. Manage Safe, View Audit

B. List Accounts, Access Safe without confirmation

C. List Accounts, View Safe Members

D. Manage Safe Owners

C. List Accounts, View Safe Members

New cards
16

Your organization requires all passwords be rotated every 90 days.Where can you set this regulatory requirement?

A. PVWAConfig.xml

B. Safe Templates

C. Master Policy

D. Platform Configuration

C. Master Policy

New cards
17

When a DR Vault Server becomes an active vault, it will automatically fail back to the original state once the Primary Vault comes back online.

A. True, if the AllowFailback setting is set to "yes" in the padr.ini file

B. False; this is not possible

C. True; this is the default behavior

D. True, if the AllowFailback setting is set to "yes" in the dbparm.ini file

B. False; this is not possible

New cards
18

PSM captures a record of each command that was executed in Unix.

A. FALSE

B. TRUE

B. TRUE

New cards
19

A new HTML5 Gateway has been deployed in your organization.Where do you configure the PSM to use the HTML5 Gateway?

A. Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details > Add PSM Gateway

B. Administration > Options > Privileged Session Management > Add Configured PSM Gateway Servers

C. Administration > Options > Privileged Session Management > Configured PSM Servers > Add PSM Gateway

D. Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Detail

A. Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details > Add PSM Gateway

New cards
20

Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)

A. Host IP Address

B. Client Hostname

C. Vault IP Address

D. Operating System Username

E. Operating System Type (Linux/Windows/HP-UX)

F. Time Frame

D Operating System Username

A. Host IP Address

B. Client Hostname

New cards
21

When a group is granted the 'Authorize Account Requests' permission on a safe Dual Control requests must be approved by

A. The number of persons specified by the Master Policy

B. Every person from that group

C. That access cannot be granted to groups

D. Any one person from that group

A. The number of persons specified by the Master Policy

New cards
22

You are creating a new Rest API user that utilizes CyberArk Authentication.What is a correct process to provision this user?

A. Private Ark Client > Tools > Administrative Tools > Users and Groups > New > User

B. PVWA > User Provisioning > LDAP Integration > Add Mapping

C. PVWA > User Provisioning > Users and Groups > New > User

D. Private Ark Client > Tools > Administrative Tools > Directory Mapping > Add

A. Private Ark Client > Tools > Administrative Tools > Users and Groups > New > User

New cards
23

Which of the following properties are mandatory when adding accounts from a file? (Choose three.)

A. All required properties specified in the Platform

B. Hostname

C. Username

D. Safe Name

E. Address

F. Platform ID

A. All required properties specified in the Platform

F. Platform ID

D. Safe Name

New cards
24

An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?

A. PSMAdminConnect

B. PSMMaster

C. PSMConnect

D. PSMGwUser

A. PSMAdminConnect

New cards
25

CyberArk recommends implementing object level access control on all Safes.

A. True

B. False

B. False

New cards
26

What is the purpose of the PrivateArk Server service?

A. Maintains Vault metadata

B. Sends email alerts from the Vault

C. Executes password changes

D. Makes Vault data accessible to components

D. Makes Vault data accessible to components

New cards
27

When managing SSH keys, the CPM stored the Private Key

A. A & B

B. On the target server

C. In the Vault

D. Nowhere because the private key can always be generated from the public key.

C. In the Vault

New cards
28

In your organization the "click to connect" button is not active by default.How can this feature be activated?

A. Policies > Master Policy > Password Management

B. Policies > Master Policy > Session Management > Require privileged session monitoring and isolation > Add Exception

C. Policies > Master Policy > Allow EPV transparent connections > Active

D. Policies > Master Policy > Allow EPV transparent connections > Inactive

C. Policies > Master Policy > Allow EPV transparent connections > Active

New cards
29

As vault Admin you have been asked to configure LDAP authentication for your organization's CyberArk users. Which permissions do you need to complete this task?

A. Audit Users and Add/Update Users

B. Audit Users and Manage Directory Mapping

C. Audit Users and Activate Users

D. Audit Users and Add Network Areas

B. Audit Users and Manage Directory Mapping

New cards
30

Time of day or day of week restrictions on when password verifications can occur configured in ____________________.

A. The Account Details

B. The Platform settings

C. The Master Policy

D. The Safe settings

B. The Platform settings

New cards
31

Match the log file name with the CyberArk Component that generates the log.

Italog

pm.log

diamond.log

cyberark.webapplication.log

Italog - vault

pm.log - CPM

diamond.log - PTA

cyberark.webapplication.log -PVWA

New cards
32

If the AccountUploader Utility is used to create accounts with SSH keys, which parameter do you use to set the full or relative path of the SSH private key file that will be attached to the account?

A. Address

B. ObjectName

C. KeyPath

D. KeyFile

D. KeyFile

New cards
33

When onboarding multiple accounts from the Pending Accounts list, which associated setting must be the same across the selected accounts?

A. Connection Component

B. Vault

C. CPM

D. Platform

D. Platform

New cards
34

In addition to bit rate and estimated total duration of recordings per day, what is needed to determine the amount of storage required for PSM recordings?

A. Number of PSMs

B. Retention period

C. Number of users

D. Number of targets

B. Retention period

New cards
35

Which report shows the accounts that are accessible to each user?

A. Privileged Accounts Compliance Status report

B. Activity report

C. Applications Inventory report

D. Entitlement report

D. Entitlement report

New cards
36

Which of the following logs contains information about errors related to PTA?

A. WebApplication.log

B. pm_error.log

C. diamond.log

D. ITAlog.log

C. diamond.log

New cards
37

Target account platforms can be restricted to accounts that are stored in specific Safes using the Allowed Safes property.

A. FALSE

B. TRUE

B. TRUE

New cards
38

For a safe with Object Level Access enabled you can turn off Object Level Access Control when it no longer needed on the safe.

A. FALSE

B. TRUE

A. FALSE

New cards
39

To manage automated onboarding rules, a CyberArk user must be a member of which group?

A. Vault Admins

B. Administrators

C. CPM User

D. Auditors

A. Vault Admins

New cards
40

Which of the following options is not set in the Master Policy?

A. Password Expiration Time

B. The use of "One-Time-Passwords"

C. Enabling and Disabling of the Connection Through the PSM

D. Password Complexity

D. Password Complexity

New cards
41

Vault admins must manually add the auditors group to newly created safes so auditors will have sufficient access to run reports.

A. FALSE

B. TRUE

A. FALSE

New cards
42

Which pre-requisite step must be completed before installing a Vault?

A. Copy the master CD to a folder on the Vault server

B. Join the server to the domain

C. install a clean operating system

D. install anti-virus software

C. install a clean operating system

New cards
43

The Password upload utility can be used to create safes.

A. FALSE

B. TRUE

B. TRUE

New cards
44

You are logging into CyberArk as the Master user to recover an orphaned safe.Which items are required to log in as Master?

A. Operator CD, Master Password, console access to the Vault server, Recover.exe

B. Master CD, Master Password, console access to the PVWA server, Recover.exe

C. Operator CD, Master Password, console access to the PVWA server, PVWA access

D. Master CD, Master Password, console access to the Vault server, Private Ark Client

D. Master CD, Master Password, console access to the Vault server, Private Ark Client

New cards
45

The System safe allows access to the Vault configuration files.

A. FALSE

B. TRUE

B. TRUE

New cards
46

You receive this error:"Error in changepass to user domain\user on domain server(\domain.(winRc=5) Access is denied." Which root cause should you investigate?

A. The account does not have sufficient permissions to change its own password.

B. The domain controller is unreachable

C. The password has been changed recently and minimum password age is preventing the change.

D. The CPM service is disabled and will need to be restarted.

A. The account does not have sufficient permissions to change its own password.

New cards
47

In the Private Ark client, how do you add an LDAP group to a CyberArk group?

A. Select Member Of on the LDAP group, and then click Add > LDAP Group

B. Select Member Of on the CyberArk group, and then click Add > LDAP Group

C. Select Update on the LDAP Group, and then click Add > LDAP Group

D. Select Update on the CyberArk group, and then click Add > LDAP Group

D. Select Update on the CyberArk group, and then click Add > LDAP Group

New cards
48

Which report provides a list of account stored in the vault.

A. Privileged Accounts Inventory

B. Privileged Accounts Compliance Status

C. Entitlement Report

D. Active Log

A. Privileged Accounts Inventory

New cards
49

What is the primary purpose of Dual Control?

A. Non-repudiation (individual accountability)

B. Reduced risk of credential theft

C. To force a 'collusion to commit' fraud ensuring no single actor may use a password without authorization.

D. More frequent password changes

C. To force a 'collusion to commit' fraud ensuring no single actor may use a password without authorization.

New cards
50

A customer's environment three data centers, consisting of 5,000 servers in Germany, 10,000 servers in Canada, 1,500 servers in Singapore. You want to manage target servers and avoid complex firewall rules. How many CPM's should you deploy?

A. 6, total, 2 per data center

B. 1

C. 15

D. 3, total, 1 per data center

D. 3, total, 1 per data center

New cards
51

Which of the following files must be created or configured m order to run Password Upload Utility? Select all that apply.

A. Vault.ini

B. PACli.ini

C. A comma delimited upload file

D. conf.ini

A. Vault.ini

C. A comma delimited upload file

D. conf.ini

New cards
52

A newly created platform allows users to access a Linux endpoint. When users click to connect, nothing happens.Which piece of the platform is missing?

A. PSM-RDP Connection Component

B. UnixPrompts.ini

C. UnixProcess.ini

D. PSM-SSH Connection Component

D. PSM-SSH Connection Component

New cards
53

You want to generate a license capacity report.Which tool accomplishes this?

A. RestAPI

B. Password Vault Web Access

C. PrivateArk Client

D. DiagnoseDB Report

C. PrivateArk Client

New cards
54

Which components can connect to a satellite Vault in distributed Vault architecture?

A. CPM, PSM

B. PVWA, PSM

C. CPM,PVWA, PSM

D. CPM, EPM, PTA

B. PVWA, PSM

New cards
55

For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.

A. On the safe in which the account is stored grant the group the' Access safe without confirmation' authorization.

B. On the safe in which the account is stored grant the group the' Access safe without audit' authorization

C. Create an exception to the Master Policy to exclude the group from the workflow process.

D. Edith the master policy rule and modify the advanced' Access safe without approval' rule to include the group.

A. On the safe in which the account is stored grant the group the' Access safe without confirmation' authorization.

New cards
56

You are creating a shared safe for the help desk.What must be considered regarding the naming convention?

A. Ensure your naming convention is no longer than 20 characters.

B. The use of these characters V:*<>".| is not allowed.

C. Combine environments, owners and platforms to minimize the total number of safes created.

D. Safe owners should determine the safe name to enable them to easily remember it.

B. The use of these characters V:*<>".| is not allowed

New cards
57

For Digital Vault Cluster in a high availability configuration, how does the cluster determine if a node is down?

A. The shared storage array is offline.

B. An alert is generated in the Windows Event log.

C. The Digital Vault Cluster does not detect a node failure.

D. The heartbeat is no longer detected on the private network.

D. The heartbeat is no longer detected on the private network.

New cards
58

A user with administrative privileges to the vault can only grant other users privileges that he himself has.

A. FALSE

B. TRUE

B. TRUE

New cards
59

As long as you are a member of the Vault Admins group you can grant any permission on any safe.

A. TRUE

B. FALSE

B. FALSE

New cards
60

In PVWA, you are attempting to play a recording made of a session by user jsmith, but there is no option to "Fast Forward" within the video. It plays and only allows you to skip between commands instead. You are also unable to download the video.What could be the cause?

A. Recording is of a PSM for SSH session.

B. You need to update the recorder settings in the platform to enable screen capture every 10000 ms or less.

C. The browser you are using is out of date and needs an update to be supported.

D. You do not have the "View Audit" permission on the safe where the account is stored.

A. Recording is of a PSM for SSH session.

New cards
61

What is the purpose of the HeadStartlnterval setting m a platform?

A. It determines how far in advance audit data is collected tor reports

B. It instructs the CPM to initiate the password change process X number of days before expiration.

C. It instructs the AIM Provider to 'skip the cache' during the defined time period

D. It alerts users of upcoming password changes x number of days before expiration.

B. It instructs the CPM to initiate the password change process X number of days before expiration.

New cards
62

Which of the following PTA detections are included in the Core PAS offering?

A. Golden Ticket

B. Over-Pass-The Hash

C. Unmanaged Privileged Access

D. Suspected Credential Theft

C. Unmanaged Privileged Access vault

D. Suspected Credential Theft vault

New cards
63

Customers who have the 'Access Safe without confirmation' safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.

A. FALSE

B. TRUE

A. FALSE

New cards
64

Which is the primary purpose of exclusive accounts?

A. Non-repudiation (individual accountability)

B. Reduced risk of credential theft

C. To force a 'collusion to commit' fraud ensuring no single actor may use a password without authorization

D. More frequent password changes

A. Non-repudiation (individual accountability)

New cards
65

Which component must be installed on the Vault if Distributed Vaults is used with PSM?

A. Disaster Recovery

B. RabbitMQ

C. Remote Control Client

D. Distributed Vault Server

B. RabbitMQ

New cards
66

A Logon Account can be specified in the Master Policy.

A. FALSE

B. TRUE

A. FALSE

New cards
67

Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.

A. On Demand Privileges Manager (OPM

B. Accounts Discovery

C. Auto Detection (AD)

D. Discovery and Audit (DNA)

E. Export Vault Data (EVD)

B. Accounts Discovery

C. Auto Detection (AD)

D. Discovery and Audit (DNA)

New cards
68

Which report could show all accounts that are past their expiration dates?

A. Privileged Account Inventory report

B. Application Inventory report

C. Privileged Account Compliance Status report

D. Activity log

C. Privileged Account Compliance Status report

New cards
69

What is a prerequisite step before CyberArk can be configured to support RADIUS authentication?

A. Log on to the PrivateArk Client, display the user properties of the user to configure, run the Authentication method drop-down list, and select RADIUS authentication.

B. In the Vault Installation folder, run CAVaultManger as Administrator with the SecureSecretFiles command.

C. Navigate to /Server/Conf and open DBParms.ini and set the RadiusServersInfo parameter.

D. In the RADIUS server, define the CyberArk Vault as RADIUS client/agent.

In the RADIUS server, define the CyberArk Vault as RADIUS client/agent

New cards
70

You have been asked to turn off the time access restrictions for a safe.Where is this setting found?

A. Password Vault Web Access (PVWA)

B. PrivateArk

C. RestAPI

D. Vault

B. PrivateArk

New cards
71

What are the basic network requirements to deploy a CPM server?

A. Port UDP/1858 to vault and all required ports to the targets and port 389 to the PSM.

B. All ports to the vault

C. Port 1858 only

D. Port 1858 to Vault and port 443 to PVWA

D. Port 1858 to Vault and port 443 to PVWA

New cards
72

What is the purpose of the Interval setting in a CPM policy?

A. To control how often the CPM looks for System Initiated CPM work

.B. To control how often the CPM looks for User Initiated CPM work.

C. To control the maximum amount of time the CPM will wait for a password change to complete

D. To control how long the CPM rests between password changes.

A. To control how often the CPM looks for System Initiated CPM work.

New cards
73

What is the maximum number of levels of authorization you can set up in Dual Control?

A. 3

B. 2

C. 1

D. 4

B. 2

New cards
74

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests.

A. ImmediateInterval

B. The CPM does not change the password under this circumstance

C. Interval

D. HeadStartInterval

B. The CPM does not change the password under this circumstance

New cards
75

What is a requirement for setting fault tolerance for PSMs?

A. Use a load balancer

B. CPM must be in all data centers

C. use a backup solution

D. Install the Vault in an HA Cluster

A. Use a load balancer

New cards
76

Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire?

A. Privileged Accounts Inventory

B. Privileged Accounts CPM Status

C. Privileged Accounts Compliance Status

D. Activity Log

C. Privileged Accounts Compliance Status

New cards
77

A new domain controller has been added to your domain. You need to ensure the CyberArk infrastructure can use the new domain controller for authentication.Which locations must you update?

A. on the Vault server in Windows\System32\Etc\Hosts and in the PVWA Application under Administration > LDAP Integration > Directories > Hosts

B. on the Vault server in Windows\System32\Etc\Hosts and on the PVWA server in Windows\System32\Etc\Hosts

C. in the Private Ark client under Tools > Administrative Tools > Directory Mapping

D. on the Vault server in the certificate store and on the PVWA server in the certificate store

A. on the Vault server in Windows\System32\Etc\Hosts and in the PVWA Application under Administration > LDAP Integration > Directories > Hosts

New cards
78

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group Operations Staff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of Operations Managers never need to be able to use the show, copy or connect buttons themselves.Which safe permission do you need to grant Operations Staff? Check all that apply.

A. Use Accounts B. Retrieve Accounts C. List Accounts D. Authorize Password Requests E. Access Safe without Authorization

A. Use Accounts

B. Retrieve Accounts

C. List Accounts

New cards
79

VAULT authorizations may be granted to_____.

A. LDAP Groups

B. Vault Users

C. LDAP Users

D. Vault Groups

B. Vault Users

C. LDAP Users

New cards
80

Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)

A. Store the server key in a Hardware Security Module (HSM) and copy the rest the keys from the CD to a folder on the Vault Server and secure it with NTFS permissions

B. Copy the entire contents of the CD to a folder on the Vault Server and secure it with NTFS permissions

C. Copy the entire contents of the CD to the system Safe on the Vault

D. Store the CD in a physical safe and mount the CD every time Vault maintenance is performed

A. Store the server key in a Hardware Security Module (HSM) and copy the rest the keys from the CD to a folder on the Vault Server and secure it with NTFS permissions

B. Copy the entire contents of the CD to a folder on the Vault Server and secure it with NTFS permissions

D. Store the CD in a physical safe and mount the CD every time Vault maintenance is performed

New cards
81

To use PSM connections while in the PVWA, what are the minimum safe permissions a user or group will need?

A. Use Accounts

B. List Accounts, Use Accounts, Retrieve Accounts

C. List Accounts, Use Accounts, Retrieve Accounts, Access Safe without confirmation

D. List Accounts, Use Accounts

D. List Accounts, Use Accounts

New cards
82

A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request.What is the correct location to identify users or groups who can approve?

A. PVWA> Account List > Edit > Show Advanced Settings > Dual Control > Direct Managers

B. PVWA> Administration > Platform Configuration > Edit Platform > UI & Workflow > Dual Control> Approvers

C. PrivateArk > Admin Tools > Users and Groups > Auditors (Group Membership)

D. PVWA> Policies > Access Control (Safes) > Safe Members > Workflow > Authorize Password Requests

D. PVWA> Policies > Access Control (Safes) > Safe Members > Workflow > Authorize Password Requests

New cards
83

Ad-Hoc Access (formerly Secure Connect) provides the following features. Choose all that apply.

A. PSM connections from a terminal without the need to login to the PVWA.

B. Real-time live session monitoring.

C. Session Recording.

D. PSM connections to target devices that are not managed by CyberArk.

B. Real-time live session monitoring.

C. Session Recording.

D. PSM connections to target devices that are not managed by CyberArk.

New cards
84

You need to enable the PSM for all platforms. Where do you perform this task?

A. Master Policy > Session Management

B. Master Policy > Privileged Access Workflows

C. Administration > Options > Connection Components

D. Platform Management > (Platform) > UI & Workflows

A. Master Policy > Session Management

New cards
85

Which Automatic Remediation is configurable for a PTA detection of a "Suspected Credential Theft"?

A. Disable Account

B. Reconcile Credentials

C. Add to Pending

D. Rotate Credentials

D. Rotate Credentials

New cards
86

Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?

A. Use Accounts

B. Use Accounts, Retrieve Accounts, List Accounts

C. Use Accounts, List Accounts

D. List Accounts, Retrieve Accounts

C. Use Accounts, List Accounts

New cards
87

In a rule using "Privileged Session Analysis and Response" in PTA, which session options are available to configure as responses to activities?

A. Suspend, Terminate

B. Suspend, Terminate, Lock Account

C. Suspend, Terminate, None

D. Pause, Terminate, None

C. Suspend, Terminate, None

New cards
88

You have been asked to identify the up or down status of Vault services.Which CyberArk utility can you use to accomplish this task?

A. Syslog

B. Vault Replicator

C. Remote Control Agent

D. PAS Reporter

C. Remote Control Agent

New cards
89

What is the purpose of a linked account?

A. To ensure a particular set of accounts all change at the same time.

B. To connect the CPNI to a target system.

C. To allow more than one account to work together as part of a password management process.

D. To ensure that a particular collection of accounts all have the same password.

C. To allow more than one account to work together as part of a password management process.

New cards
90

Which values are acceptable in the address field of an Account?

A. It must be a Fully Qualified Domain Name (FQDN)

B. Any name that is resolvable on the Central Policy Manager (CPM) server is acceptable

.C It must be an IP address

D. It must be NetBIOS name

B. Any name that is resolvable on the Central Policy Manager (CPM) server is acceptable

New cards
91

It is possible to control the hours of the day during which a user may log into the vault.

A. FALSE

B. TRUE

B. TRUE

New cards
92

A customer installed multiple PVWAs in the production environment behind a load balancer VIP. They subsequently observed that all incoming traffic from the load balancer VIP goes to only one PVWA, even though all the PVWAs are up and running. What could be the likely cause of this situation?

A. SSL passthrough is not configured on the load balancer.

B. The load balancing pool only has one PVWA server

C. The Certificate of the load balancer is not a wild card cert

D. The load balancing algorithm is the least connections algorithm.

B. The load balancing pool only has one PVWA server

New cards
93

As a member of a PAM Level-2 support team, you are troubleshooting an issue related to load balancing four PVWA servers at two data centers. You received a note from your Level-1 support team stating "When testing PVWA website from a workstation, we noticed that the "Source IP of last sign-in" was shown as the VIP (Virtual IP address) assigned to the four PVWA servers instead of the workstation IP where the PVWA site was launched from."Which step should you take?

A. Verify the "LoadBalancerClientAddressHeader" parameter setting in PVWA configuration file Web.config is set to "X-Forwarded-For".

B. Add the VIP (Virtual IP address) assigned to the four PVWA servers to the certificates issued for all four PVWA servers, if missing.

C. Add a firewall rule to allow the testing workstation to connect to the VIP (Virtual IP address) assigned to the four PVWA servers on Port TCP 443.

D. Edit the dbparm.ini file on the Vault se

A. Verify the "LoadBalancerClientAddressHeader" parameter setting in PVWA configuration file Web.config is set to "X-Forwarded-For".

New cards
94

In the screenshot displayed, you just configured the usage in CyberArk and want to update its password.What is the least intrusive way to accomplish this?

A. Use the "reconcile" button on the parent account's details page.

B. Use the "change" button on the parent account's details page.

C. Use the "change" button on the usage's details page.

D. Use the "sync" button on the usage's details page.

C. Use the "change" button on the usage's details page.

New cards
95

Which SMTP address can be set on the Notification Settings page to re-invoke the ENE setup wizard after the initial Vault installation.

A. 1.1.1.1

B. 255.255.255.255

C. 192.168.1.1

D. 8.8.8.8

A. 1.1.1.1

New cards
96

Which of the following statements are NOT true when enabling PSM recording for a target Windows server? (Choose all that apply)

A. The PSM software must be instated on the target server

B. PSM must be enabled in the Master Policy (either directly, or through exception)

C. RDP must be enabled on the target server

D. PSMConnect must be added as a local user on the target server

A. The PSM software must be instated on the target serv

D. PSMConnect must be added as a local user on the target server

New cards
97

Platform settings are applied to _________.

A. Individual Accounts

B. The entire vault.

C. Safes

D. Network Areas

A. Individual Accounts

New cards
98

PSM for Windows (previously known as "RDP Proxy") supports connections to the following target systems

A. All of the above

B. UNIX

C. Windows

D. Oracle

A. All of the above

New cards
99

dbparm.ini is the main configuration file for the Vault.

A. True

B. False

A. True

New cards
100

Which CyberArk group does a user need to be part of to view recordings or live monitor sessions?

A. Auditors

B. Operators

C. Vault Admin

D. DR Users

A. Auditors

New cards

Explore top notes

note Note
studied byStudied by 1 person
808 days ago
5.0(1)
note Note
studied byStudied by 16 people
847 days ago
5.0(1)
note Note
studied byStudied by 30 people
704 days ago
5.0(1)
note Note
studied byStudied by 54 people
185 days ago
5.0(1)
note Note
studied byStudied by 181 people
919 days ago
5.0(2)
note Note
studied byStudied by 35 people
243 days ago
5.0(1)
note Note
studied byStudied by 3 people
51 days ago
5.0(1)
note Note
studied byStudied by 21 people
612 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (59)
studied byStudied by 3 people
147 days ago
5.0(1)
flashcards Flashcard (35)
studied byStudied by 10 people
549 days ago
5.0(1)
flashcards Flashcard (415)
studied byStudied by 6 people
631 days ago
4.0(2)
flashcards Flashcard (30)
studied byStudied by 5 people
701 days ago
5.0(1)
flashcards Flashcard (104)
studied byStudied by 117 people
371 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 29 people
423 days ago
5.0(2)
flashcards Flashcard (57)
studied byStudied by 17 people
707 days ago
5.0(1)
flashcards Flashcard (40)
studied byStudied by 35 people
13 minutes ago
5.0(1)
robot