Ad-Hoc Access (formerly Secure Connect) provides the following features. Choose all that apply.
A. PSM connections to target devices that are not managed by CyberArk.
B. Session Recording.
C. Real-time live session monitoring.
D. PSM connections from a terminal without the need to login to the PVWA.
If a customer has one data center and requires high availability, how many PVWA's should be deployed.
A. Two
B. One PVWA cluster
C. One
D. Two PVWA Cluster
What are the basic network requirements to deploy a CPM server?
A. Port 1858 to Vault and port 443 to PVWA
B. Port 1858 only
C. All ports to the vault
D. Port UDP/1858 to vault and all required ports to the targets and port 389 to the PSM.
To manage automated onboarding rules, a CyberArk user must be a member of which group?
A. Vault Admins
B. CPM User
C. Auditors
D. Administrators
What is the purpose of the CyberArk Event Notification Engine service?
A. It sends email messages from the Central Policy Manager (CPM)
B. It sends email messages from the Vault
C. It processes audit report messages
D. It makes Vault data available to components
If a user is a member of more than one group that has authorizations on a safe, by default that user is granted________.
A. the vault will not allow this situation to occur.
B. only those permissions that exist on the group added to the safe first.
C. only those permissions that exist in all groups to which the user belongs.
D. the cumulative permissions of all groups to which that user belongs.
A Vault administrator have associated a logon account to one of their Unix root accounts in the vault. When attempting to verify the root account's password the Central Policy Manager (CPM) will:
A. ignore the logon account and attempt to log in as root
B. prompt the end user with a dialog box asking for the login account to use
C. log in first with the logon account, then run the SU command to log in as root using the password in the Vault
D. none of these
A Simple Mail Transfer Protocol (SMTP) integration is critical for monitoring Vault activity and facilitating workflow processes, such as Dual Control.
A. True
B. False
Which of these accounts onboarding methods is considered proactive?
A. Accounts Discovery
B. Detecting accounts with PTA
C. A Rest API integration with account provisioning software
D. A DNA scan