Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?
A. TRUE
B. FALSE
Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)
A. Suspected Credential Theft
B. Over-Pass-The-Hash
C. Golden Ticket
D. Unmanaged Privileged Access
What is the chief benefit of PSM?
A. Privileged session isolation
B. Automatic password management
C. Privileged session recording
D. Privileged session isolation and privileged session recording
Which of the Following can be configured in the Master Policy? Choose all that apply
A. Dual Control
B. One Time Passwords
C. Exclusive Passwords
D. Password Reconciliation
E. Ticketing Integration
F. Required Properties
G. Custom Connection Components
H. Password Aging Rules
When the PSM Gateway (also known as the HTML5 Gateway) is implemented, users must have an RDP client, such as MSTSC, installed on their endpoint in order to launch connections via the PSM.
A. True
B. False. When the PSM Gateway is implemented, the user only requires a browser in order launch a connection via the PSM.
When working with the CyberArk Cluster, the Virtual IP is used by:
A. The CyberArk components to communicate with the Vault Cluster over the public network.
B. The Vault nodes for exchanging keep alive messages over the public network.
C. The CyberArk components to communicate with the Vault Cluster over the private network.
D. The Vault nodes for exchanging keep alive messages over the public network.
It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.
A. TRUE
B. FALSE
Which one of the built-in Vault users is not automatically added to the safe when it is first created in PVWA?
A. Master
B. Administrator
C. Auditor
D. Operator