Which onboarding method is used to integrate CyberArk with the accounts provisioning process?
A. Accounts Discovery
B. Auto Detection
C. Onboarding RestAPI functions
D. PTA rules
During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault. For which purpose are these credentials used?
A. The credentials will be used later by the CPM to retrieve passwords from the Vault.
B. The credentials are used by the installer to register the CPM in the CyberArk database.
C. The credentials are used by the installer to authenticate to the Vault and create the Central Policy Manager (CPM) environment (Safes, users. etc.).
D. The credentials will be used later by the CPM to update passwords in the Vault.
Which is the purpose of a linked account?
A. To ensure that a particular collection of accounts all have the same password.
B. To ensure a particular set of accounts all change at the same time.
C. To connect the CPM to a target system.
D. To allow the use of additional passwords within a password management process.
Which of the following is considered a prerequisite for installing PSM?
A. IIS web services role
B. HTML5 Gateway
C. Provider
D. Remote Desktop Services
Which file does the Vault administrator need to edit in order to configure the integration of the Vault with the radius server?
A. radius.ini
B. PARagent.ini
C. ENEConf.ini
D. dbparm.ini
When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?
A. CyberArk Vault Disaster Recovery (DR), PrivateArk Database
B. CyberArk Vault Disaster Recovery
C. CyberArk Vault Disaster Recovery, PrivateArk Database, PrivateArk Server
D. CyberArk Vault Disaster Recovery, PrivateArk Database, CyberArk Event Notification Engine
PSM for SSH (previously known as PSM-SSH Proxy) supports connections to which of the following target systems?
A. Windows
B. Unix
C. Oracle
D. All of the above
Which of the following is NOT a use case for installing multiple Central Policy Managers (CPM)?
A. A single CPM cannot accommodate the total number of accounts managed.
B. Accounts are managed in multiple sites or VLANs protected by firewall.
C. Reduce network traffic across WAN links.
D. Provide load-balancing capabilities when managing passwords on target devices.
If a transparent user matches two different directory mappings, how does the system determine which user template to use?
A. The system will use the template for the mapping listed first.
B. The system will use the template for the mapping listed last.
C. The system will grant all of the Vault authorizations from the two templates.
D. The system will grant only the Vault authorizations that are listed in both templates.
Time of day or day of week restrictions on when password reconciliations can occur are configured in the __________.
A. Master Policy
B. platform settings
C. Safe settings
D. account details