Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?
A. Password change
B. Password reconciliation
C. Session suspension
D. Session termination
When using multiple Central Policy Managers (CPM), which one of the following Safes is shared by all CPMs?
A. PasswordManager
B. PasswordManager_Pending
C. PasswordManager_workspace
D. PasswordManager_ADIntemal
When managing SSH keys, the Central Policy Manager (CPM) stores the private key __________.
A. in the Vault
B. on the target server
C. in the Vault and on the target server
D. nowhere because the private key can always be generated from the public key
Which user is automatically added to all Safes and cannot be removed?
A. Auditor
B. Administrator
C. Master
D. Operator
Which of the following is considered a prerequisite for installing PSM?
A. IIS web services role
B. HTML5 Gateway
C. Provider
D. Remote Desktop Services
In a Simple Network Management Protocol (SNMP) integration it is recommended to use the Fully Qualified Domain Name (FQDN) when specifying the SNMP server address(es).
A. True
B. False
What is the purpose of the CyberArk Event Notification Engine service?
A. It sends email messages from the Central Policy Manager (CPM).
B. It sends email messages from the Vault.
C. It processes audit report messages.
D. It makes Vault data available to components.
Where does the Vault administrator configure in Password Vault Web Access (PVWA) the Fully Qualified Domain Name (FQDN) of the target email server during Simple Mail Transfer Protocol (SMTP) integration?
A. PVWA > Platform Management > Notification Settings
B. PVWA > Options > Notification Settings
C. PVWA > Administration > Notification Settings
D. PVWA > LDAP Integration > Notification Settings
If a transparent user matches two different directory mappings, how does the system determine which user template to use?
A. The system will use the template for the mapping listed first.
B. The system will use the template for the mapping listed last.
C. The system will grant all of the Vault authorizations from the two templates.
D. The system will grant only the Vault authorizations that are listed in both templates.