Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)
A. Suspected Credential Theft
B. Over-Pass-The-Hash
C. Golden Ticket
D. Unmanaged Privileged Access
Which of the following sends out Simple Network Management Protocol (SNMP) traps?
A. PrivateArk Remote Control Agent
B. PrivateArk Server
C. CyberArk Event Notification Engine
D. CyberArk SNMP agent
A user has successfully conducted a short PSM session and logged off. However, the user cannot access the Monitoring tab to view the recordings. What is the issue?
A. The user must login as PSMAdminConnect.
B. The PSM service is not running.
C. The user is not a member of the PVWAMonitor group.
D. The user is not a member of the Auditors group.
In accordance with best practice. SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow CPM to manage root accounts.
A. Create a privileged account on the target server Allow this account the ability to SSH directly from the CPM machine Configure this account as the Reconcile account of the target server's root account.
B. Create a non-privileged account on the target server Allow this account the ability to SSH directly from the CPM machine. Configure this account as the Logon account of the target server's root account
C. Configure the Unix system to allow SSH logins.
D. Configure the CPM to allow SSH logins
The following applications are pre-configured to work with PSM. but first need to be installed on the PSM server.
A. SQL Plus
B. Putty
C. RDP
D. WinSCP
E. Toad
F. VMWare vSphere Client
G. Microsoft SQL Management Studio
Which type of automatic remediation can be performed by the PTA in case of a Suspecious Password Change security event?
A. Password Change
B. Password Reconcilation
C. Session Suspension
D. Session Terminiation
It is possible to restrict the time of day. or day of week that a change process can occur.
A. TRUE
B. FALSE
An SMTP integration allows you to forward audit records to a monitoring solution.
A. TRUE
B. FALSE