Which one of the following reports is NOT generated by using the PVWA?
A. Account Inventory
B. Application Inventory
C. Safes List
D. Compliance Status
Customers who have the `Access Safe without confirmation' safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.
A. TRUE
B. FALSE
Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?
A. Accounts Discovery
B. Auto Detection
C. Onboarding RestAPI functions
D. PTA Rules
When managing SSH keys, the CPM stores the Public Key
A. In the Vault
B. On the target server
C. A and B
D. Nowhere because the public key can always be generated from the private key.
Which CyberArk group does a user need to be part of to view recordings or live monitor sessions?
A. Auditors
B. Vault Admin
C. DR Users
D. Operators
You are creating a new Rest API user that utilizes CyberArk Authentication. What is a correct process to provision this user?
A. Private Ark Client > Tools > Administrative Tools > Users and Groups > New > User
B. Private Ark Client > Tools > Administrative Tools > Directory Mapping > Add
C. PVWA > User Provisioning > LDAP Integration > Add Mapping
D. PVWA > User Provisioning > Users and Groups > New > User
Which command configures email alerts within PTA if settings need to be changed post install?
A. /opt/tomcat/utility/emailConfiguration.sh
B. /opt/PTA/emailConfiguration.sh
C. /opt/PTA/utility/emailConfig.sh
D. /opt/tomcat/utility/emailSetup.sh
Which permissions are needed for the Active Directory user required by the Windows Discovery process?
A. Domain Admin
B. LDAP Admin
C. Read/Write
D. Read
Your organization has a requirement to allow users to “check out passwords” and connect to targets with the same account through the PSM. What needs to be configured in the Master policy to ensure this will happen?
A. Enforce check-in/check-out exclusive access = active; Require privileged session monitoring and isolation = active
B. Enforce check-in/check-out exclusive access = inactive; Require privileged session monitoring and isolation = inactive
C. Enforce check-in/check-out exclusive access = inactive; Record and save session activity = active
D. Enforce check-in/check-out exclusive access = active; Record and save session activity = inactive