A SIEM integration allows you to forward audit records to a monitoring solution.
A vault admin received an email notification that a password verification process has failed Which service sent the message?
A safe was recently created by a user who is a member of the LDAP Vault Administrators group. Which of the
following users does not have access to the newly created safe by default?
Which is the purpose of the interval setting in a Central Policy Manager (CPM) policy?
Which of the following are secure options for storing the contents of the Operator CD. while still allowing the contents to be accessible upon a planned Vault restart? Choose alt that apply
In a Disaster Recovery (DR) environment, which of the following should NEVER be configured for automatic failover due to the possibility of split-brain phenomenon?
When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSM
When working with the CyberArk Cluster, which service is considered Optional (i.e., failure of the service does
not mandate a failover)?
Where do you configure in PVWA the fully-qualified domain name (FQDN) of your target email server during SMTP integration?
As long as you are a member of the Vault Admins group, you can grant any permission on any safe that you have access to.
It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.
In Accounts Discovery, you can configure a Windows discovery to scan______________.
Which Master Policy Setting(s) must be active in order to have an account checked-out by one user for a predetermined amount of time?
CyberArk implements license limits by controlling the number and types of users that can be provisioned in the Vault.
In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?
When managing SSH keys. CPM automatically pushes the Public Key to the target system.
During the process of installing the CPM, you will be asked to provide the credentials for an administrate user in the Vault. What are these credentials used for?
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so
that the CPM could resume management automatically?
Which one of the built-in Vault users is not automatically added to the safe when it is first created in PVWA?
One of your users is receiving the error message “ITATS006E Station is suspended for User jsmith” when
attempting to sign in to the pvwa. Which utility would you use to correct this problem?
The Remote Desktop Services role installed on PSM must be properly licensed by Microsoft.
What conditions must be met in order to log into the vault as the Master user? Select all that apply
When using multiple Central Policy Managers (CPM), which one of the following Safes is shared by all CPMs?
CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.
When the PSM Gateway (also known as the HTML5 Gateway) is implemented, users must have an RDP client, such as MSTSC, installed on their endpoint in order to launch connections via the PSM.
Which of the following sends out Simple Network Management Protocol (SNMP) traps?
Users complain they are unsuccessful attempting to authenticate to the PVWA web site. After entering their
credentials, they receive a “Timeout has expired”. You test the URL using multiple browsers and receive the
same error. The CyberArk.WebApplication.log shows the “ITACM012S Timeout has expired” log entry.
What is the next troubleshooting step you should take?
An SNMP integration allows you to forward audit records from the vault to the SIEM.
Can you forward audit records to your monitoring solution via SIEM integration?
Which of the following Privileged Session Management solutions provide a detailed audit log of session activities?
When accessing the Vault via PVWA, is it possible, is it possible to configure multiple Dual Authentication Methods?
CyberArk creates exceptions for Data Execution Prevention (DEP) on selected executable files. This is done as part of installing which of the following components?
After the Vault administrator configures syslog integration on the Vault, the Vault will be able to.
Using the SSH Key Manager it is possible to allow CPM to manage SSH Keys similarly to passwords.
Which type of automatic remediation can be performed by the PTA in case of a Suspecious Password Change security event?
When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?
After the Vault server is installed, the Microsoft Windows firewall is now commandeered by the Vault. Can the administrator change these firewall rules?
The Vault administrator can change the Vault license by uploading the new license to the system Safe.
Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.
It is possible to restrict the time of day. or day of week that a change process can occur
The following applications are pre-configured to work with PSM. but first need to be installed on the PSM server.