You have associated a logon account to one your UNIX cool accounts in the vault. When attempting to [b]change [/b] the root account’s password the CPM will…..
Which of the following PTA detections require the deployment of a Network Sensor or installing the PTA Agent on the domain controller?
An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?
Time of day or day of week restrictions on when password verifications can occur configured in ____________________.
PSM for Windows (previously known as “RDP Proxy”) supports connections to the following target systems
For Digital Vault Cluster in a high availability configuration, how does the cluster determine if a node is down?
You have been asked to secure a set of shared accounts in CyberArk whose passwords will need to be used by end users. The account owner wants to be able to track who was using an account at any given moment.
Which security configuration should you recommend?
You are onboarding an account that is not supported out of the box.
What should you do first to obtain a platform to import?
Which Master Policy Setting must be active in order to have an account checked-out by one user for a pre-determined amount of time?
You are helping a customer prepare a Windows server for PSM installation. What is required for a successful installation?
For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.
You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How should this be configured to allow for password management using least privilege?
Your organization requires all passwords be rotated every 90 days.
Where can you set this regulatory requirement?
Which of the following components can be used to create a tape backup of the Vault?
To ensure all sessions are being recorded, a CyberArk administrator goes to the master policy and makes configuration changes.
Which configuration is correct?
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?
Ad-Hoc Access (formerly Secure Connect) provides the following features. Choose all that apply.