CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.
You are installing HTML5 gateway on a Linux host using the RPM provided. After installing the Tomcat webapp, what is the next step in the installation process?
Vault admins must manually add the auditors group to newly created safes so auditors will have sufficient access to run reports.
When a group is granted the 'Authorize Account Requests' permission on a safe Dual Control requests must be approved by
To manage automated onboarding rules, a CyberArk user must be a member of which group?
An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?
In addition to bit rate and estimated total duration of recordings per day, what is needed to determine the amount of storage required for PSM recordings?
Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)
PSM for Windows (previously known as “RDP Proxy”) supports connections to the following target systems
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?
It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur
Which command configures email alerts within PTA if settings need to be changed post install?
If a customer has one data center and requires high availability, how many PVWA's should be deployed.
Which CyberArk utility allows you to create lists of Master Policy Settings, owners and safes for output to text files or MSSQL databases?