What conditions must be met in order to log into the vault as the Master user? Select all that apply
What is the primary purpose of One Time Passwords?
What is the name of the Platform parameter that determines the amount of time a person is allowed to use a One Time Password?
The vault server uses a modified version of the Microsoft Windows firewall
Which parameter controls how often the CPM looks for Exclusive Passwords that need to be changed?
Which service should NOT be running on the DR Vault when the primary Production Vault is up?
As long as you are a member of the Vault Admins group, you can grant any permission on any safe that you have access to.
Which IP port and Protocol are used by the CyberArk Secure Proprietary Protocol?
In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.
Where do you configure in PVWA the fully-qualified domain name (FQDN) of your target email server during SMTP integration?
What is the purpose of the password Change process?
In an SMTP integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SMTP server addresses).
To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers need to be configured to communicate with the Primary Vault and Satellite Vaults. What file needs to be changed on the PVWA to enable this setup?
All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe The members of the AD group UnixAdmms need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation The members of the AD group OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of OperationsManagers The members of OperationsManagers never need to be able to use the show, copy or connect buttons themselves.
Which safe permissions do you need to grant to UnixAdmins? Check all that apply
What is the purpose of the Interval setting in a CPM policy?
During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault. For which purpose are these credentials used?
The Vault can only integrate with a single Security Information and Event Management (SIEM) or SYSLOG server.
Ad-Hoc Access (formerly Secure Connect) provides the following features. (Choose all that apply.)
Assuming a safe has been configured to be accessible during certain hours of the day, a Vault Admin may still access that safe outside of those hours.
Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?
Multiple PSM Servers can be load balanced.
When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSM
The Vault does not support dual factor authentication.
Which file is used to integrate the Vault with the RADIUS server?
Time of day of week restrictions on when password changes can occur are configured in ________________.
When accessing the Vault via PVWA, is it possible, is it possible to configure multiple Dual Authentication Methods?
Select the best practice for storing the Master CD.
Vault admins must manually add the auditors group to newly created safes so auditors will have sufficient access to run reports.D18912E1457D5D1DDCBD40AB3BF70D5D
The Vault server requires WINS services to work properly.
Which one of the following reports is NOT generated by using the Password Vault Web Access (PVWA)?
Multiple PVWA servers provide automatic load balancing.
To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers must to be configured to communicate with the Primary Vault and Satellite Vaults. Which file needs to be changed on the PVWA to enable this setup?
Multiple PVWA servers are always all active
Any user can monitor live sessions in real time when initiating RDP connection via Secure Connect through PSM.
Which CyberArk components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts'? Select all that apply.