Page 1 out of 16. Viewing questions 1-15 out of 235
Question 1
In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault.
A.
True.
B.
False. Because the user can also enter credentials manually using Ad-Hoc Access.
C.
False. Because if credentials are not stored in the vault, the PSM will log into the target device as PSMConnect.
D.
False. Because if credentials are not stored in the vault, the PSM will prompt for credentials.
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault. For which purpose are these credentials used?
A.
The credentials will be used later by the CPM to retrieve passwords from the Vault.
B.
The credentials are used by the installer to register the CPM in the CyberArk database.
C.
The credentials are used by the installer to authenticate to the Vault and create the Central Policy Manager (CPM) environment (Safes, users, etc.).
D.
The credentials will be used later by the CPM to update passwords in the Vault.
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?
A.
AAM Credential Provider (previously known as AIM Credential Provider)
B.
ExportVaultData utility
C.
PAReplicate utility
D.
Central Policy Manager
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
A Simple Network Management Protocol (SNMP) integration allows the Vault administrator to forward ITALOG records to a monitoring solution.
A.
True
B.
False
Answer:
B
User Votes:
A
50%
B
50%
Discussions
0/ 1000
Question 5
After the Vault server is installed, the Microsoft Windows firewall is now commandeered by the Vault. Can the administrator change these firewall rules?
A.
Yes, but the administrator can only modify the firewall rules by editing the dbparm.ini file and the restarting the Vault.
B.
Yes, the administrator can still modify firewall rules via the Windows firewall interface.
C.
No, the Vault does not permit any changes to the firewall due to security requirements.
D.
Yes, but the administrator can only modify the firewall rules by editing the FirewallRules.ini file and the restarting the Vault.
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
What is the process to remove object level access control from a Safe?
A.
Uncheck the 'Enable Object Level Access Control' on the Safe Details page in the PVWA.
B.
Uncheck the 'Enable Object Level Access Control' box in the Safe Properties in PrivateArk.
C.
This cannot be done.
D.
Remove all ACLs from the Safe.
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
Which of these accounts onboarding methods is considered proactive?
A.
Accounts Discovery
B.
Detecting accounts with PTA
C.
A Rest API integration with account provisioning software
D.
A DNA scan
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
What is the purpose of EVD?
A.
To extract vault metadata into an open database platform.
In a Disaster Recovery (DR) environment, which of the following should NEVER be configured for automatic failover due to the possibility of split-brain phenomenon?
A.
Password Vault Web Access (PVWA)
B.
PSM
C.
CPM
D.
PTA
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 13
When the PSM Gateway (also known as the HTML5 Gateway) is implemented, users must have an RDP client, such as MSTSC, installed on their endpoint in order to launch connections via the PSM.
A.
True
B.
False. When the PSM Gateway is implemented, the user only requires a browser in order launch a connection via the PSM.