Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?
To ensure all sessions are being recorded, a CyberArk administrator goes to the master policy and makes configuration changes.
Which configuration is correct?
You received a notification from one of your CyberArk auditors that they are missing Vault level audit permissions. You confirmed that all auditors are missing the Audit Users Vault permission.
Where do you update this permission for all auditors?
What is the configuration file used by the CPM scanner when scanning UNIX/Linux devices?
As vault Admin you have been asked to configure LDAP authentication for your organization's CyberArk users. Which permissions do you need to complete this task?
Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)
Which utilities could you use to change debugging levels on the vault without having to restart the vault. Select all that apply.
A newly created platform allows users to access a Linux endpoint. When users click to connect, nothing happens.
Which piece of the platform is missing?
The Vault administrator can change the Vault license by uploading the new license to the system Safe.
To manage automated onboarding rules, a CyberArk user must be a member of which group?
Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?
A new domain controller has been added to your domain. You need to ensure the CyberArk infrastructure can use the new domain controller for authentication.
Which locations must you update?
Via Password Vault Web Access (PVWA), a user initiates a PSM connection to the target Linux machine using RemoteApp. When the client’s machine makes an RDP connection to the PSM server, which user will be utilized?
Users can be resulted to using certain CyberArk interfaces (e.g.PVWA or PACLI).
In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?
When on-boarding account using Accounts Feed, Which of the following is true?
For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.
In addition to disabling Windows services or features not needed for PVWA operations, which tasks does PVWA Hardening.ps1 perform when run?
What is the maximum number of levels of authorization you can set up in Dual Control?