The Vault administrator can change the Vault license by uploading the new license to the system Safe.
How does the Vault administrator apply a new license file?
PTA can automatically suspend sessions if suspicious activities are detected in a privileged session, but only if the session is made via the CyberArk PSM.
You want to generate a license capacity report.
Which tool accomplishes this?
Which PTA sensors are required to detect suspected credential theft?
Users who have the 'Access Safe without confirmation' safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.
The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys.
How are these keys managed?
Match the Status of Service on a DR Vault to what is displayed when it is operating normally in Replication mode.
Which CyberArk utility allows you to create lists of Master Policy Settings, owners and safes for output to text files or MSSQL databases?
Which user is automatically added to all Safes and cannot be removed?
Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
When managing SSH keys, the CPM stored the Private Key
Which of these accounts onboarding methods is considered proactive?
When creating an onboarding rule, it will be executed upon .
You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How should this be configured to allow for password management using least privilege?
You need to enable the PSM for all platforms.
Where do you perform this task?
Which command configures email alerts within PTA if settings need to be changed post install?
The vault supports Role Based Access Control.
Which is the primary purpose of exclusive accounts?
Via Password Vault Web Access (PVWA), a user initiates a PSM connection to the target Linux machine using RemoteApp. When the client’s machine makes an RDP connection to the PSM server, which user will be utilized?
You have been asked to design the number of PVWAs a customer must deploy. The customer has three data centers with a distributed vault in each, requires high availability, and wants to use all vaults, at all times. How many PVWAs does the customer need?
You have been asked to identify the up or down status of Vault services.
Which CyberArk utility can you use to accomplish this task?
CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.
Which Master Policy Setting must be active in order to have an account checked-out by one user for a pre-determined amount of time?
A Vault administrator have associated a logon account to one of their Unix root accounts in the vault. When attempting to verify the root account’s password the Central Policy Manager (CPM) will:
Which of the following statements are NOT true when enabling PSM recording for a target Windows server? (Choose all that apply)
A user has successfully conducted a short PSM session and logged off. However, the user cannot access the Monitoring tab to view the recordings.
What is the issue?
What is the easiest way to duplicate an existing platform?
When onboarding multiple accounts from the Pending Accounts list, which associated setting must be the same across the selected accounts?
As vault Admin you have been asked to configure LDAP authentication for your organization's CyberArk users. Which permissions do you need to complete this task?
You are logging into CyberArk as the Master user to recover an orphaned safe.
Which items are required to log in as Master?