Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CyberArk PAM-DEF - CyberArk Defender - PAM

Page: 6 / 8
Total 239 questions

PSM captures a record of each command that was executed in Unix.

A.

TRIE

B.

FALSE

Which of the following statements are NOT true when enabling PSM recording for a target Windows server? (Choose all that apply)

A.

The PSM software must be instated on the target server

B.

PSM must be enabled in the Master Policy (either directly, or through exception)

C.

PSMConnect must be added as a local user on the target server

D.

RDP must be enabled on the target server

Which processes reduce the risk of credential theft? (Choose two.)

A.

require dual control password access approval

B.

require password change every X days

C.

enforce check-in/check-out exclusive access

D.

enforce one-time password access

Which values are acceptable in the address field of an Account?

A.

It must be a Fully Qualified Domain Name (FQDN)

B.

It must be an IP address

C.

It must be NetBIOS name

D.

Any name that is resolvable on the Central Policy Manager (CPM) server is acceptable

Where can a user with the appropriate permissions generate a report? (Choose two.)

A.

PVWA > Reports

B.

PrivateArk Client

C.

Cluster Vault Manager

D.

PrivateArk Server Monitor

E.

PARClient

In the Private Ark client, how do you add an LDAP group to a CyberArk group?

A.

Select Update on the CyberArk group, and then click Add > LDAP Group

B.

Select Update on the LDAP Group, and then click Add > LDAP Group

C.

Select Member Of on the CyberArk group, and then click Add > LDAP Group

D.

Select Member Of on the LDAP group, and then click Add > LDAP Group

What is the purpose of a linked account?

A.

To ensure that a particular collection of accounts all have the same password.

B.

To ensure a particular set of accounts all change at the same time.

C.

To connect the CPNI to a target system.

D.

To allow more than one account to work together as part of a password management process.

You have been given the requirement that certain accounts cannot have their passwords updated during business hours.

How can you set up a configuration to meet this requirement?

A.

Change settings on the CPM configuration safe so that access is permitted after business hours only.

B.

Update the password change parameters of the platform to match the permitted time frame.

C.

Disable automatic CPM management for all accounts that are assigned to this platform.

D.

Add an exception to the Master Policy to allow the action for this platform during the permitted time.

Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?

A.

Use Accounts, Retrieve Accounts, List Accounts

B.

Use Accounts, List Accounts

C.

Use Accounts

D.

List Accounts, Retrieve Accounts

In a default CyberArk installation, which group must a user be a member of to view the “reports” page in PVWA?

A.

PVWAMonitor

B.

ReportUsers

C.

PVWAReports

D.

Operators