Join the discussion
Question 1/126
If a user is a member of more than one group that has authorizations on a safe, by default that user is granted________.
Correct Answer: D
Add Comments
- Other Question (126q)
- Q1. If a user is a member of more than one group that has authorizations on a safe, by default...
- Q2. Where can you check that the LDAP binding is using TCP/636?...
- Q3. Arrange the steps to restore a Vault using PARestore for a Backup in the correct sequence....
- Q4. A logon account can be specified in the platform settings....
- Q5. It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process...
- Q6. What does the minvalidity parameter on a platform policy determine?...
- Q7. You are logging into CyberArk as the Master user to recover an orphaned safe. Which items ...
- Q8. Match the Status of Service on a DR Vault to what is displayed when it is operating normal...
- Q9. Which CyberArk utility allows you to create lists of Master Policy Settings, owners and sa...
- Q10. Which statement about the Master Policy best describes the differences between one-time pa...
- Q11. A user requested access to view a password secured by dual-control and is unsure who to co...
- Q12. In a default CyberArk installation, which group must a user be a member of to view the "re...
- Q13. Target account platforms can be restricted to accounts that are stored m specific Safes us...
- Q14. Users are unable to launch Web Type Connection components from the PSM server. Your manage...
- Q15. A user with administrative privileges to the vault can only grant other users privileges t...
- Q16. As long as you are a member of the Vault Admins group you can grant any permission on any ...
- Q17. Which of the following logs contains information about errors related to PTA?...
- Q18. When an account is unable to change its own password, how can you ensure that password res...
- Q19. Arrange the steps to restore a Vault using PARestore for a Backup in the correct sequence....
- Q20. Which Master Policy Setting must be active in order to have an account checked-out by one ...
- Q21. Which user(s) can access all passwords in the Vault?...
- Q22. Match each key to its recommended storage location. (Exhibit)...
- Q23. In order to connect to a target device through PSM, the account credentials used for the c...
- Q24. Your organization has a requirement to allow users to "check out passwords" and connect to...
- Q25. You need to recover an account localadmin02 for target server 10.0.123.73 stored in Safe T...
- Q26. Which of the following PTA detections require the deployment of a Network Sensor or instal...
- Q27. Match the built-in Vault User with the correct definition. (Exhibit)...
- Q28. The vault supports Role Based Access Control.
- Q29. If PTA is integrated with a supported SIEM solution, which detection becomes available?...
- Q30. You have been asked to turn off the time access restrictions for a safe. Where is this set...
- Q31. VAULT authorizations may be granted to_____.
- Q32. Which user is automatically added to all Safes and cannot be removed?...
- Q33. Which of the following components can be used to create a tape backup of the Vault?...
- Q34. What is the purpose of the PrivateArk Database service?...
- Q35. When a group is granted the 'Authorize Account Requests' permission on a safe Dual Control...
- Q36. If a password is changed manually on a server, bypassing the CPM, how would you configure ...
- Q37. Customers who have the 'Access Safe without confirmation' safe permission on a safe where ...
- Q38. DRAG DROP Match each permission to where it can be found. (Exhibit)...
- Q39. A Simple Mail Transfer Protocol (SMTP) integration is critical for monitoring Vault activi...
- Q40. Users are unable to launch Web Type Connection components from the PSM server. Your manage...
- Q41. Within the Vault each password is encrypted by:...
- Q42. Match the Status of Service on a DR Vault to what is displayed when it is operating normal...
- Q43. Where can reconcile and/or logon accounts be linked to an account? (Choose two.)...
- Q44. In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX sys...
- Q45. Which permissions are needed for the Active Directory user required by the Windows Discove...
- Q46. A user has successfully conducted a short PSM session and logged off. However, the user ca...
- Q47. It is possible to restrict the time of day, or day of week that a [b]verify[/b] process ca...
- Q48. Which file must be edited on the Vault to configure it to send data to PTA?...
- Q49. DRAG DROP Match each key to its recommended storage location. (Exhibit)...
- Q50. A Simple Mail Transfer Protocol (SMTP) integration is critical for monitoring Vault activi...
- Q51. The Active Directory User configured for Windows Discovery needs which permission(s) or me...
- Q52. Your customer, ACME Corp, wants to store the Safes Data in Drive D instead of Drive C. Whi...
- Q53. tsparm.ini is the main configuration file for the Vault....
- Q54. What is the primary purpose of Dual Control?
- Q55. To enable the Automatic response "Add to Pending" within PTA when unmanaged credentials ar...
- Q56. You are creating a shared safe for the help desk. What must be considered regarding the na...
- Q57. Which PTA sensors are required to detect suspected credential theft?...
- Q58. When managing SSH keys, the CPM stored the Private Key...
- Q59. dbparm.ini is the main configuration file for the Vault....
- Q60. Before failing back to the production infrastructure after a DR exercise, what must you do...
- Q61. A new domain controller has been added to your domain. You need to ensure the CyberArk inf...
- Q62. In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX sys...
- Q63. You created a new platform by duplicating the out-of-box Linux through the SSH platform. W...
- Q64. You need to enable the PSM for all platforms. Where do you perform this task?...
- Q65. VAULT authorizations may be granted to_____.
- Q66. For each listed prerequisite, identify if it is mandatory or not mandatory to run the PSM ...
- Q67. You are configuring CyberArk to use HTML5 gateways exclusively for PSM connections. In the...
- Q68. In your organization the "click to connect" button is not active by default. How can this ...
- Q69. Match each PTA alert category with the PTA sensors that collect the data for it. (Exhibit)...
- Q70. Via Password Vault Web Access (PVWA), a user initiates a PSM connection to the target Linu...
- Q71. When a DR Vault Server becomes an active vault, it will automatically revert back to DR mo...
- Q72. Match the log file name with the CyberArk Component that generates the log. (Exhibit)...
- Q73. For Digital Vault Cluster in a high availability configuration, how does the cluster deter...
- Q74. You receive this error: "Error in changepass to user domain\user on domain server(\domain....
- Q75. Within the Vault each password is encrypted by:...
- Q76. When a DR Vault Server becomes an active vault, it will automatically fail back to the ori...
- Q77. A new HTML5 Gateway has been deployed in your organization. Where do you configure the PSM...
- Q78. The Vault administrator can change the Vault license by uploading the new license to the s...
- Q79. A Vault administrator have associated a logon account to one of their Unix root accounts i...
- Q80. An auditor needs to login to the PSM in order to live monitor an active session. Which use...
- Q81. What must you specify when configuring a discovery scan for UNIX? (Choose two.)...
- Q82. One can create exceptions to the Master Policy based on ____________________....
- Q83. When should vault keys be rotated?
- Q84. What is the purpose of the Immediate Interval setting in a CPM policy?...
- Q85. Where can a user with the appropriate permissions generate a report? (Choose two.)...
- Q86. You want to generate a license capacity report. Which tool accomplishes this?...
- Q87. A new colleague created a directory mapping between the Active Directory groups and the Va...
- Q88. During a High Availability node switch you notice an error and the Cluster Vault Manager U...
- Q89. Match the connection component to the corresponding OS/Function. (Exhibit)...
- Q90. One can create exceptions to the Master Policy based on ____________________....
- Q91. Where can you assign a Reconcile account? (Choose two.)...
- Q92. Platform settings are applied to _________.
- Q93. Ad-Hoc Access (formerly Secure Connect) provides the following features. Choose all that a...
- Q94. What does the minvalidity parameter on a platform policy determine?...
- Q95. What is the purpose of the CyberArk Event Notification Engine service?...
- Q96. A Vault administrator have associated a logon account to one of their Unix root accounts i...
- Q97. Which of these accounts onboarding methods is considered proactive?...
- Q98. What is the purpose of the CyberArk Event Notification Engine service?...
- Q99. You have been asked to create an account group and assign three accounts which belong to a...
- Q100. Which of the Following can be configured in the Master Poky? Choose all that apply....
- Q101. When Dual Control is enabled a user must first submit a request in the Password Vault Web ...
- Q102. Users who have the 'Access Safe without confirmation' safe permission on a safe where acco...
- Q103. Which Automatic Remediation is configurable for a PTA detection of a "Suspected Credential...
- Q104. Users who have the 'Access Safe without confirmation' safe permission on a safe where acco...
- Q105. Refer to the exhibit. (Exhibit) Why is user "EMEALevel2Support" unable to change the passw...
- Q106. DRAG DROP Match the log file name with the CyberArk Component that generates the log. (Exh...
- Q107. In the Private Ark client under the Tools menu > Administrative Tools > Users and Gr...
- Q108. How do you create a cold storage backup?
- Q109. What is the purpose of the PrivateArk Server service?...
- Q110. Which user is automatically added to all Safes and cannot be removed?...
- Q111. What is the purpose of the Immediate Interval setting in a CPM policy?...
- Q112. Which of these accounts onboarding methods is considered proactive?...
- Q113. What is required to enable access over SSH to a Unix account through both PSM and PSMP?...
- Q114. When a group is granted the 'Authorize Account Requests' permission on a safe Dual Control...
- Q115. When creating an onboarding rule, it will be executed upon ....
- Q116. You are configuring a Vault HA cluster. Which file should you check to confirm the correct...
- Q117. Which of the following components can be used to create a tape backup of the Vault?...
- Q118. You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the...
- Q119. Which usage can be added as a service account platform?...
- Q120. The vault supports Role Based Access Control.
- Q121. You are creating a new Rest API user that utilizes CyberArk Authentication. What is a corr...
- Q122. You notice an authentication failure entry for the DR user in the ITALog. What is the corr...
- Q123. You are configuring CyberArk to use HTML5 gateways exclusively for PSM connections. In the...
- Q124. You have been asked to identify the up or down status of Vault services. Which CyberArk ut...
- Q125. All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled f...
- Q126. DRAG DROP Match the built-in Vault User with the correct definition. (Exhibit)...
