In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?
Where can reconcile and/or logon accounts be linked to an account? (Choose two.)
Users who have the 'Access Safe without confirmation' safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.
To use PSM connections while in the PVWA, what are the minimum safe permissions a user or group will need?
Match the Status of Service on a DR Vault to what is displayed when it is operating normally in Replication mode.
Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)
Which Master Policy Setting must be active in order to have an account checked-out by one user for a pre-determined amount of time?
You are configuring a Vault HA cluster.
Which file should you check to confirm the correct drives have been assigned for the location of the Quorum and Safes data disks?
To manage automated onboarding rules, a CyberArk user must be a member of which group?
You created a new safe and need to ensure the user group cannot see the password, but can connect through the PSM.
Which safe permissions must you grant to the group? (Choose two.)
Which service should NOT be running on the DR Vault when the primary Production Vault is up?
You receive this error:
“Error in changepass to user domain\user on domain server(\domain.(winRc=5) Access is denied.”
Which root cause should you investigate?
It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur
Which of the Following can be configured in the Master Poky? Choose all that apply.
Your organization requires all passwords be rotated every 90 days.
Where can you set this regulatory requirement?
If PTA is integrated with a supported SIEM solution, which detection becomes available?
Due to corporate storage constraints, you have been asked to disable session monitoring and recording for 500 testing accounts used for your lab environment.
How do you accomplish this?
In addition to add accounts and update account contents, which additional permission on the safe is required to add a single account?
Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
Which permissions are needed for the Active Directory user required by the Windows Discovery process?
In the Private Ark client under the Tools menu > Administrative Tools > Users and Groups, which option do you use to update users’ Vault group memberships?
What is required to enable access over SSH to a Unix account through both PSM and PSMP?
You have been asked to create an account group and assign three accounts which belong to a cluster. When you try to create a new group, you receive an unauthorized error; however, you are able to edit other aspects of the account properties.
Which safe permission do you need to manage account groups?
A new colleague created a directory mapping between the Active Directory groups and the Vault.
Where can the newly Configured directory mapping be tested?
Which of the following files must be created or configured m order to run Password Upload Utility? Select all that apply.
For a safe with Object Level Access enabled you can turn off Object Level Access Control when it no longer needed on the safe.
It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.
A new HTML5 Gateway has been deployed in your organization.
From the PVWA, arrange the steps to configure a PSM host to use the HTML5 Gateway in the correct sequence.
An auditor initiates a live monitoring session to PSM server to view an ongoing live session. When the auditor’s machine makes an RDP connection the PSM server, which user will be used?
To change the safe where recordings are kept for a specific platform, which setting must you update in the platform configuration?
If the AccountUploader Utility is used to create accounts with SSH keys, which parameter do you use to set the full or relative path of the SSH private key file that will be attached to the account?
Vault admins must manually add the auditors’ group to newly created safes so auditors will have sufficient access to run reports.
To ensure all sessions are being recorded, a CyberArk administrator goes to the master policy and makes configuration changes.
Which configuration is correct?
Which utilities could you use to change debugging levels on the vault without having to restart the vault. Select all that apply.
What is the correct process to install a custom platform from the CyberArk Marketplace?
During a High Availability node switch you notice an error and the Cluster Vault Manager Utility fails back to the original node.
Which log files should you check to investigate the cause of the issue? (Choose three.)
What are the minimum permissions to add multiple accounts from a file when using PVWA bulk-upload? (Choose three.)
For each listed prerequisite, identify if it is mandatory or not mandatory to run the PSM Health Check.
Time of day or day of week restrictions on when password verifications can occur configured in ____________________.
You need to recover an account localadmin02 for target server 10.0.123.73 stored in Safe Team1.
What do you need to recover and decrypt the object? (Choose three.)
What is the configuration file used by the CPM scanner when scanning UNIX/Linux devices?
CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.
For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.