You are creating a new Rest API user that utilizes CyberArk Authentication.
What is a correct process to provision this user?
In the Private Ark client, how do you add an LDAP group to a CyberArk group?
When onboarding multiple accounts from the Pending Accounts list, which associated setting must be the same across the selected accounts?
What is the purpose of the HeadStartlnterval setting m a platform?
What is the purpose of the CyberArk Event Notification Engine service?
Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
The Vault administrator can change the Vault license by uploading the new license to the system Safe.
Which user(s) can access all passwords in the Vault?
You need to enable the PSM for all platforms.
Where do you perform this task?
Which of the following components can be used to create a tape backup of the Vault?
PTA can automatically suspend sessions if suspicious activities are detected in a privileged session, but only if the session is made via the CyberArk PSM.
Which of the following PTA detections require the deployment of a Network Sensor or installing the PTA Agent on the domain controller?
A Simple Mail Transfer Protocol (SMTP) integration is critical for monitoring Vault activity and facilitating workflow processes, such as Dual Control.
A new HTML5 Gateway has been deployed in your organization.
Where do you configure the PSM to use the HTML5 Gateway?
Which service should NOT be running on the DR Vault when the primary Production Vault is up?
Which of the following Privileged Session Management (PSM) solutions support live monitoring of active sessions?
You have been asked to secure a set of shared accounts in CyberArk whose passwords will need to be used by end users. The account owner wants to be able to track who was using an account at any given moment.
Which security configuration should you recommend?
According to the DEFAULT Web Options settings, which group grants access to the REPORTS page?
What is the maximum number of levels of authorization you can set up in Dual Control?
When managing SSH keys, the CPM stores the Public Key
The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys.
How are these keys managed?
The Password upload utility can be used to create safes.
Which authentication methods does PSM for SSH support?
A Vault Administrator team member can log in to CyberArk, but for some reason, is not given Vault Admin rights.
Where can you check to verify that the Vault Admins directory mapping points to the correct AD group?
A customer installed multiple PVWAs in the production environment behind a load balancer VIP. They subsequently observed that all incoming traffic from the load balancer VIP goes to only one PVWA, even though all the PVWAs are up and running. What could be the likely cause of this situation?
What is a prerequisite step before CyberArk can be configured to support RADIUS authentication?
For a safe with Object Level Access enabled you can turn off Object Level Access Control when it no longer needed on the safe.
Which usage can be added as a service account platform?
PSM captures a record of each command that was executed in Unix.
The vault supports Role Based Access Control.
When a DR Vault Server becomes an active vault, it will automatically revert back to DR mode once the Primary Vault comes back online.