DRAG DROP
Match the Status of Service on a DR Vault to what is displayed when it is operating normally in Replication mode.
Select and Place:
DRAG DROP
Match each component to its respective Log File location.
Select and Place:
For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.
A. Create an exception to the Master Policy to exclude the group from the workflow process.
B. Edit the master policy rule and modify the advanced `Access safe without approval' rule to include the group.
C. On the safe in which the account is stored grant the group the `Access safe without audit' authorization.
D. On the safe in which the account is stored grant the group the `Access safe without confirmation' authorization.
Which keys are required to be present in order to start the PrivateArk Server service?
A. Recovery public key
B. Recovery private key
C. Server key
D. Safe key
In the screenshot displayed, you just configured the usage in CyberArk and want to update its password. What is the least intrusive way to accomplish this?
A. Use the “change” button on the usage's details page.
B. Use the “change” button on the parent account's details page.
C. Use the “sync” button on the usage's details page.
D. Use the “reconcile” button on the parent account's details page.
You want to generate a license capacity report. Which tool accomplishes this?
A. Password Vault Web Access
B. PrivateArk Client
C. DiagnoseDB Report
D. RestAPI
In the Private Ark client, how do you add an LDAP group to a CyberArk group?
A. Select Update on the CyberArk group, and then click Add > LDAP Group
B. Select Update on the LDAP Group, and then click Add > LDAP Group
C. Select Member Of on the CyberArk group, and then click Add > LDAP Group
D. Select Member Of on the LDAP group, and then click Add > LDAP Group
Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire?
A. Privileged Accounts Inventory
B. Privileged Accounts Compliance Status
C. Activity Log
D. Privileged Accounts CPM Status
Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”?
A. Add to Pending
B. Rotate Credentials
C. Reconcile Credentials
D. Disable Account