If the AccountUploader Utility is used to create accounts with SSH keys, which parameter do you use to set the full or relative path of the SSH private key file that will be attached to the account?
AKeyPath
BKeyFile
CObjectName
DAddress
Which tools are used during a CPM renaming process? (Choose two.)
AAPIKeyManager Utility
BCreateCredFile Utility
CCPM//nDomain_Hardening.ps1
DPMTerminal.exe
EData Execution Prevention
Which of the following properties are mandatory when adding accounts from a file? (Choose three.)
ASafe Name
BPlatform ID
CAll required properties specified in the Platform
DUsername
EAddress
FHostname
There is a requirement for a password to change between 01:00 and 03:00 on Saturdays and Sundays; however, this does not work consistently.
Which platform setting may be the cause?
AThe Interval setting for the platform is incorrect and must be less than 120.
BThe ImmediateInterval setting for the platform is incorrect and must be greater than or equal to 1.
CThe DaysToRun setting for the platform is incorrect and must be set to Sat,Sun.
DThe HeadStartInterval setting for the platform is incorrect and must be set to 0.
Question 6
Deploy and configure CyberArk’s Identity Security solution
0
Question 7
Deploy and configure CyberArk’s Identity Security solution
Question 8
Deploy and configure CyberArk’s Identity Security solution
Question 9
Deploy and configure CyberArk’s Identity Security solution
Question 10
Daily maintenance and operation to support the on-going performance of the CyberArk Identity Security solution
Question 11
Daily maintenance and operation to support the on-going performance of the CyberArk Identity Security solution
Question 12
Deploy and configure CyberArk’s Identity Security solution
Question 13
Deploy and configure CyberArk’s Identity Security solution
Question 14
Daily maintenance and operation to support the on-going performance of the CyberArk Identity Security solution
Question 15
Deploy and configure CyberArk’s Identity Security solution
Question 16
Deploy and configure CyberArk’s Identity Security solution
Question 17
Deploy and configure CyberArk’s Identity Security solution
Question 18
Deploy and configure CyberArk’s Identity Security solution
Question 19
CyberArk Identity Security solution
Question 20
Deploy and configure CyberArk’s Identity Security solution
Question 21
Deploy and configure CyberArk’s Identity Security solution
Question 22
Daily maintenance and operation to support the on-going performance of the CyberArk Identity Security solution
Question 23
Deploy and configure CyberArk’s Identity Security solution
Question 24
Deploy and configure CyberArk’s Identity Security solution
Question 25
Deploy and configure CyberArk’s Identity Security solution
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
What is a valid combination of primary and secondary layers of authentication to a company's two-factor authentication policy?
ARSA SecurID Authentication (in PVWA) and LDAP Authentication
BCyberArk Authentication and RADIUS Authentication
COracle SSO (in PVWA) and SAML Authentication
DLDAP Authentication and RADIUS Authentication
DRAG DROP -
Match each key to its recommended storage location.
Refer to the exhibit:
A customer is building a development environment in the Amazon Public Cloud through Amazon Web Services.
What is an ideal specification for the Vault if it will only hold less than 1000 accounts?
At2.micro
Bt3.medium
Cm5.large
Dc5.large
DRAG DROP -
Match each PTA alert category with the PTA sensors that collect the data for it.
Which command configures email alerts within PTA if settings need to be changed post install?
A/opt/tomcat/utility/emailConfiguration.sh
B/opt/PTA/emai!Configuration.sh
C/opt/PTA/utility/emailConfig.sh
D/opt/tomcat/utiity/emailSetup.sh
DRAG DROP
Match the Status of Services on a DR Vault to what is displayed when it is operating normally in Replication mode.
Which components support fault tolerance?
ACPM and PVWA
BPVWA and PSM
CPSM and PTA
DCPM and PTA
You have been asked to configure SNMP remote monitoring for your organization's Vault servers.
In the PARAgent.ini, which parameter specifies the destination of the Vault SNMP traps?
ASNMPHostIP
BSNMPTrapPort
CSNMPCommunity
DSNMPVersion
You receive this error:
"Error in changepass to user domain\user on domain server(\domain.(winRc=5) Access is denied."
Which root cause should you investigate?
AThe account does not have sufficient permissions to change its own password.
BThe domain controller is unreachable.
CThe password has been changed recently and minimum password age is preventing the change.
DThe CPM service is disabled and will need to be restarted.
Your organization has a requirement to allow users to "check out passwords" and connect to targets with the same account through the PSM.
What needs to be configured in the Master policy to ensure this will happen?
AEnforce check-in/check-out exclusive access = active; Require privileged session monitoring and isolation = active
CEnforce check-in/check-out exclusive access = inactive; Record and save session activity = active
DEnforce check-in/check-out exclusive access = active; Record and save session activity = inactive
You are onboarding an account that is not supported out of the box.
What should you do first to obtain a platform to import?
ACreate a service ticket in the customer portal explaining the requirements of the custom platform.
BSearch common community portals like stackoverflow, reddit, github for an existing platform.
CFrom the platforms page, uncheck the "Hide non-supported platforms" checkbox and see if a platform meeting your needs appears.
DVisit the CyberArk marketplace and search for a platform that meets your needs.
You are installing the HTML5 gateway on a Linux host using the RPM provided.
After installing the Tomcat webapp, what is the next step in the installation process?
ADeploy the HTML5 service (guacd).
BSecure the connection between the guacd and the webapp.
CSecure the webapp and JWT vailidation endpoint.
DConfigure ASLR.
You have been asked to design the number of PVWAs a customer must deploy. The customer has three data centers with a distributed Vault in each, requires high availability, and wants to use all Vaults at all times.
How many PVWAs does the customer need?
A6
B4
C2
D3
The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys.
How are these keys managed?
ACyberArk stores Private keys in the Vault and updates Public keys on target systems.
BCyberArk stores Public keys in the Vault and updates Private keys on target systems.
CCyberArk does not store Public or Private keys and instead uses a reconcile account to create keys on demand
DCyberArk stores both Private and Public keys and can update target systems with either key.
A new domain controller has been added to your domain. You need to ensure the CyberArk infrastructure can use the new domain controller for authentication.
Which locations must you update?
Aon the Vault server in Windows\System32\Etc\Hosts and in the PVWA Application under Administration > LDAP Integration > Directories > Hosts
Bon the Vault server in Windows\System32\Etc\Hosts and on the PVWA server in Windows\System32\Etc\Hosts
Cin the Private Ark client under Tools > Administrative Tools > Directory Mapping
Don the Vault server in the certificate store and on the PVWA server in the certificate store
When creating Distributed Vault environment architecture, what is the maximum number of Vault servers that can be deployed?
A5 - number of primary and satellite Vaults can be specified during installation
B3 - all primary
C6 - 1 primary and 5 satellite
D10 - 2 primary and 8 satellite
Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire?
APrivileged Accounts Inventory
BPrivileged Accounts Compliance Status
CActivity Log
DPrivileged Accounts CPM Status
What are the basic network requirements to deploy a CPM server?
Aport 1858 to vault and port 443 to PVWA
Bport 1858 only
Call ports to the vault
Dport UDP/1858 to vault and all required ports to targets and port 389 to the PSM
Which parameter must be provided when registering a primary Vault in Azure, but not in Amazon Web Services?
A/RecPub
B/AdminPass
C/MasterPass
D/RDPGateway
Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)