Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?
A. Yes, when using the connect button, CyberArk uses the PMTerminal.exe process which bypasses the root SSH restriction.
B. Yes, only if a logon account is associated with the root account and the user connects through the PSM-SSH connection component.
C. Yes, if a logon account is associated with the root account.
D. No, it is not possible.
Your organization has a requirement to allow users to "check out passwords" and connect to targets with the same account through the PSM. What needs to be configured in the Master policy to ensure this will happen?
A. Enforce check-in/check-out exclusive access = active; Require privileged session monitoring and isolation = active
B. Enforce check-in/check-out exclusive access = inactive; Require privileged session monitoring and isolation = inactive
C. Enforce check-in/check-out exclusive access = inactive; Record and save session activity = active
D. Enforce check-in/check-out exclusive access = active; Record and save session activity = inactive
CyberArk user Neil is trying to connect to the Target Linux server 192.168.1.64 using a domain account ACME/linuxuser01 on Domain Acme.corp using PSM for SSH server 192.168.65.145. What is the correct syntax?
A. Ssh neil@linuxuser01:[email protected]@192.168.1.45
B. Ssh neil@linuxuser01#[email protected]@192.168.1.45
C. Ssh neil@[email protected]@192.168.65.145
D. Ssh neil@[email protected]@[email protected]
Which of the Following can be configured in the Master Poky? Choose all that apply.
A. Dual Control
B. One Time Passwords
C. Exclusive Passwords
D. Password Reconciliation
E. Ticketing Integration
F. Required Properties
G. Custom Connection Components
H. Password Aging Rules
Target account platforms can be restricted to accounts that are stored m specific Safes using the Allowed Safes property.
A. TRUE
B. FALSE
Which components support fault tolerance.
A. CPM and PVWA
B. PVWA and PSM
C. PSM and PTA
D. CPM and PTA
You are creating a new Rest API user that utilizes CyberArk Authentication. What is a correct process to provision this user?
A. Private Ark Client > Tools > Administrative Tools > Users and Groups > New > User
B. Private Ark Client > Tools > Administrative Tools > Directory Mapping > Add
C. PVWA > User Provisioning > LDAP Integration > Add Mapping
D. PVWA > User Provisioning > Users and Groups > New > User
Which of the following PTA detections are included in the Core PAS offering?
A. Suspected Credential Theft
B. Over-Pass-The Hash
C. Golden Ticket
D. Unmanaged Privileged Access
Which statement is correct concerning accounts that are discovered, but cannot be added to the Vault by an automated onboarding rule?
A. They are added to the Pending Accounts list and can be reviewed and manually uploaded.
B. They cannot be onboarded to the Password Vault.
C. They must be uploaded using third party tools.
D. They are not part of the Discovery Process.
A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request. What is the correct location to identify users or groups who can approve?
A. PVWA> Administration > Platform Configuration > Edit Platform > UI and Workflow > Dual Control> Approvers
B. PVWA> Policies > Access Control (Safes) > Safe Members > Workflow > Authorize Password Requests
C. PVWA> Account List > Edit > Show Advanced Settings > Dual Control > Direct Managers
D. PrivateArk > Admin Tools > Users and Groups > Auditors (Group Membership)