Match each key to its recommended storage location.
A customer installed multiple PVWAs in the production environment behind a load balancer VIP. They subsequently observed that all incoming traffic from the load balancer VIP goes to only one PVWA, even though all the PVWAs are up and running. What could be the likely cause of this situation?
The Accounts Feed contains:
It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur
The vault supports Role Based Access Control.
When running a “Privileged Accounts Inventory” Report through the Reports page in PVWA on a specific safe, which permission/s are required on that safe to show complete account inventory information?
If a user is a member of more than one group that has authorizations on a safe, by default that user is granted________.
You receive this error:
“Error in changepass to user domain\user on domain server(\domain.(winRc=5) Access is denied.”
Which root cause should you investigate?
Which pre-requisite step must be completed before installing a Vault?
Which components support fault tolerance.
When creating an onboarding rule, it will be executed upon .
What is the maximum number of levels of authorization you can set up in Dual Control?
Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?
Which of the Following can be configured in the Master Poky? Choose all that apply.
Which option in the PrivateArk client is used to update users' Vault group memberships?
When managing SSH keys, the CPM stored the Private Key
It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.
The password upload utility must run from the CPM server
When onboarding multiple accounts from the Pending Accounts list, which associated setting must be the same across the selected accounts?
A Simple Mail Transfer Protocol (SMTP) integration is critical for monitoring Vault activity and facilitating workflow processes, such as Dual Control.
Which of the following statements are NOT true when enabling PSM recording for a target Windows server? (Choose all that apply)
For each listed prerequisite, identify if it is mandatory or not mandatory to run the PSM Health Check.
If the AccountUploader Utility is used to create accounts with SSH keys, which parameter do you use to set the full or relative path of the SSH private key file that will be attached to the account?
Which components can connect to a satellite Vault in distributed Vault architecture?
Users can be resulted to using certain CyberArk interfaces (e.g.PVWA or PACLI).
In a rule using “Privileged Session Analysis and Response” in PTA, which session options are available to configure as responses to activities?
Time of day or day of week restrictions on when password verifications can occur configured in ____________________.
Which utilities could you use to change debugging levels on the vault without having to restart the vault. Select all that apply.
What is the name of the Platform parameters that controls how long a password will stay valid when One Time Passwords are enabled via the Master Policy?
You are installing HTML5 gateway on a Linux host using the RPM provided. After installing the Tomcat webapp, what is the next step in the installation process?
You are creating a shared safe for the help desk.
What must be considered regarding the naming convention?