You have been asked to identify the up or down status of Vault services.
Which CyberArk utility can you use to accomplish this task?
Answer : C
DRAG DROP -
Match each key to its recommended storage location.
Answer :
What is a valid combination of primary and secondary layers of authentication to a company's two-factor authentication policy?
Answer : D
DRAG DROP -
Match each PTA alert category with the PTA sensors that collect the data for it.
Answer :
You are beginning the post-install process after the PSM installation is completed
What must you do?
Answer : C
A customer's environment has three data centers consisting of 5,000 servers in Germany, 10,000 servers Canada, 1,500 servers in Singapore. You want to manage target servers and avoid complex firewall rules.
How many CPMs should you deploy?
Answer : D
How should you configure PSM for SSH to support load balancing?
Answer : C
Which statement is correct concerning accounts that are discovered, but cannot be added to the Vault by an automated onboarding rule?
Answer : A
Which of the following properties are mandatory when adding accounts from a file? (Choose three.)
Answer : BDF
To manage automated onboarding rules, a CyberArk user must be a member of which group?
Answer : A
Which CyberArk group does a user need to be part of to view recordings or live monitor sessions?
Answer : B
After installing the first PSM server and before installing additional PSM servers, you must ensure the user performing the installation is not a direct owner of which safe?
Answer : A
You are creating a shared safe for the help desk.
What must be considered regarding the naming convention?
Answer : D
What is the configuration file used by the CPM scanner when scanning UNIX/Linux devices?
Answer : D
You are setting up a Linux host to act as an HTML 5 gateway for PSM sessions.
Which servers need to be trusted by the Linux host to secure communications through the gateway?
Answer : B
Have any questions or issues ? Please dont hesitate to contact us