Loading questions...
Updated
When on-boarding accounts using Accounts Feed, which of the following is true?
Select the best practice for storing the Master CD.
Which combination of safe member permissions will allow End Users to log in to a remote machine transparently but NOT show or copy the password?
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
PSM for Windows (previously known as RDP Proxy) supports connections to the following target systems: __________ .
Using the SSH Key Manager it is possible to allow Central Policy Manager (CPM) to manage SSH Keys similarly to passwords.
What is the purpose of the PrivateArk Database service?
The Vault Internal safe contains the configuration for an LDAP integration.
What is the purpose of the Allowed Safes parameter in a Central Policy Manager (CPM) policy? (Choose all that apply.)
The Vault Internal safe contains all of the configuration for the vault.
One time passwords reduce the risk of Pass the Hash vulnerabilities in Windows.
It is possible to restrict the time of day, or day of week that a verify process can occur
Support Examcademy
Your support keeps this platform running. Become a Supporter to remove all ads and unlock exclusive study tools.
When managing SSH keys, Central Policy Manager (CPM) automatically pushes the Private Key to all systems that use it.
Which one of the built-in Vault users is not automatically added to the safe when it is first created in PWA?
What conditions must be met in order to log into the vault as the Master user? (Choose all that apply.)
The vault supports a number of dual factor authentication methods.
In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault.
The Vault Server uses a modified version of the Microsoft Windows firewall.
Create a free account to unlock all questions for this exam.
Log In / Sign UpOne can create exceptions to the Master Policy based on ____________.
Auto-Detection can be configured to leverage LDAP/S.