A company requires challenge/response multi-factor authentication for PSMP sessions. Which server must you integrate with the CyberArk vault?
Which configuration file and Vault utility are used to migrate the server key to an HSM?
A Vault Administrator team member can log in to CyberArk, but for some reason, is not given Vault Admin rights.
Where can you check to verify that the Vault Admins directory mapping points to the correct AD group?
For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.
By default, members of which built-in groups will be able to view and configure Automatic Remediation and Session Analysis and Response in the PVWA?
Which CyberArk group does a user need to be part of to view recordings or live monitor sessions?
Which components can connect to a satellite Vault in distributed Vault architecture?
Which certificate type do you need to configure the vault for LDAP over SSL?
Your organization has a requirement to allow users to “check out passwords†and connect to targets with the same account through the PSM.
What needs to be configured in the Master policy to ensure this will happen?
Users can be resulted to using certain CyberArk interfaces (e.g.PVWA or PACLI).
In a rule using “Privileged Session Analysis and Response†in PTA, which session options are available to configure as responses to activities?
You are creating a shared safe for the help desk.
What must be considered regarding the naming convention?
PSM for Windows (previously known as “RDP Proxyâ€) supports connections to the following target systems
A user is receiving the error message “ITATS006E Station is suspended for User jsmith†when attempting to sign into the Password Vault Web Access (PVWA). Which utility would a Vault administrator use to correct this problem?
Match the Status of Service on a DR Vault to what is displayed when it is operating normally in Replication mode.
You are configuring the vault to send syslog audit data to your organization's SIEM solution. What is a valid value for the SyslogServerProtocol parameter in DBPARM.ini file?
As long as you are a member of the Vault Admins group, you can grant any permission on any safe that you have access to.
An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?
Which keys are required to be present in order to start the PrivateArk Server service?
Vault admins must manually add the auditors group to newly created safes so auditors will have sufficient access to run reports.
When onboarding multiple accounts from the Pending Accounts list, which associated setting must be the same across the selected accounts?
One can create exceptions to the Master Policy based on ____________________.
Which of the following Privileged Session Management (PSM) solutions support live monitoring of active sessions?
As long as you are a member of the Vault Admins group you can grant any permission on any safe.
You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How should this be configured to allow for password management using least privilege?
You received a notification from one of your CyberArk auditors that they are missing Vault level audit permissions. You confirmed that all auditors are missing the Audit Users Vault permission.
Where do you update this permission for all auditors?
A new domain controller has been added to your domain. You need to ensure the CyberArk infrastructure can use the new domain controller for authentication.
Which locations must you update?
Due to network activity, ACME Corp’s PrivateArk Server became active on the OR Vault while the Primary Vault was also running normally. All the components continued to point to the Primary Vault.
Which steps should you perform to restore DR replication to normal?
When running a “Privileged Accounts Inventory†Report through the Reports page in PVWA on a specific safe, which permission/s are required on that safe to show complete account inventory information?
What is the name of the Platform parameters that controls how long a password will stay valid when One Time Passwords are enabled via the Master Policy?
Arrange the steps to install the Password Vault Web Access (PVWA) in the correct sequence
An auditor initiates a live monitoring session to PSM server to view an ongoing live session. When the auditor’s machine makes an RDP connection the PSM server, which user will be used?
Your organization requires all passwords be rotated every 90Â days.
Where can you set this regulatory requirement?
A Vault administrator have associated a logon account to one of their Unix root accounts in the vault. When attempting to verify the root account’s password the Central Policy Manager (CPM) will:
You are logging into CyberArk as the Master user to recover an orphaned safe.
Which items are required to log in as Master?
To enable the Automatic response “Add to Pending†within PTA when unmanaged credentials are found, what are the minimum permissions required by PTAUser for the PasswordManager_pending safe?
Users are unable to launch Web Type Connection components from the PSM server. Your manager asked you to open the case with CyberArk Support.
Which logs will help the CyberArk Support Team debug the issue? (Choose three.)
Target account platforms can be restricted to accounts that are stored m specific Safes using the Allowed Safes property.
All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group Operations Staff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of Operations Managers never need to be able to use the show, copy or connect buttons themselves.
Which safe permission do you need to grant Operations Staff? Check all that apply.
Assuming a safe has been configured to be accessible during certain hours of the day, a Vault Admin may still access that safe outside of those hours.
What is the configuration file used by the CPM scanner when scanning UNIX/Linux devices?
If a user is a member of more than one group that has authorizations on a safe, by default that user is granted________.
To manage automated onboarding rules, a CyberArk user must be a member of which group?
You are installing multiple PVWAs behind a load balancer. Which statement is correct?
Time of day or day of week restrictions on when password verifications can occur configured in ____________________.
Which statement is correct concerning accounts that are discovered, but cannot be added to the Vault by an automated onboarding rule?
Which of the following properties are mandatory when adding accounts from a file? (Choose three.)
It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occur
You are helping a customer prepare a Windows server for PSM installation. What is required for a successful installation?