You are configuring a Vault HA cluster.
Which file should you check to confirm the correct drives have been assigned for the location of the Quorum and Safes data disks?
For Digital Vault Cluster in a high availability configuration, how does the cluster determine if a node is down?
Due to corporate storage constraints, you have been asked to disable session monitoring and recording for 500 testing accounts used for your lab environment.
How do you accomplish this?
Assuming a safe has been configured to be accessible during certain hours of the day, a Vault Admin may still access that safe outside of those hours.
In a rule using “Privileged Session Analysis and Response” in PTA, which session options are available to configure as responses to activities?
You want to give a newly-created group rights to review security events under the Security pane. You also want to be able to update the status of these events.
Where must you update the group to allow this?
Which CyberArk utility allows you to create lists of Master Policy Settings, owners and safes for output to text files or MSSQL databases?
Which statement is correct concerning accounts that are discovered, but cannot be added to the Vault by an automated onboarding rule?
When running a “Privileged Accounts Inventory” Report through the Reports page in PVWA on a specific safe, which permission/s are required on that safe to show complete account inventory information?
You are configuring CyberArk to use HTML5 gateways exclusively for PSM connections.
In the PVWA, where do you set DefaultConnectionMethod to HTML5?
An auditor initiates a live monitoring session to PSM server to view an ongoing live session. When the auditor’s machine makes an RDP connection the PSM server, which user will be used?
Which change could CyberArk make to the REST API that could cause existing scripts to fail?
It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur
If the AccountUploader Utility is used to create accounts with SSH keys, which parameter do you use to set the full or relative path of the SSH private key file that will be attached to the account?
Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)
Match the Status of Service on a DR Vault to what is displayed when it is operating normally in Replication mode.
A recently-hired colleague onboarded five new Local Accounts that are used for five standalone Windows Servers. After attempting to connect to the servers from PVWA, the colleague noticed that the "Connect" button was greyed out for all five new accounts.
What can you do to help your colleague resolve this issue? (Choose two.)
To use PSM connections while in the PVWA, what are the minimum safe permissions a user or group will need?
You notice an authentication failure entry for the DR user in the ITALog.
What is the correct process to fix this error? (Choose two.)
You are onboarding an account that is not supported out of the box.
What should you do first to obtain a platform to import?
You are logging into CyberArk as the Master user to recover an orphaned safe.
Which items are required to log in as Master?
A new HTML5 Gateway has been deployed in your organization.
Where do you configure the PSM to use the HTML5 Gateway?
When an account is unable to change its own password, how can you ensure that password reset with the reconcile account is performed each time instead of a change?
You have been asked to create an account group and assign three accounts which belong to a cluster. When you try to create a new group, you receive an unauthorized error; however, you are able to edit other aspects of the account properties.
Which safe permission do you need to manage account groups?
Which Master Policy Setting must be active in order to have an account checked-out by one user for a pre-determined amount of time?
To enable the Automatic response “Add to Pending” within PTA when unmanaged credentials are found, what are the minimum permissions required by PTAUser for the PasswordManager_pending safe?
In the Private Ark client under the Tools menu > Administrative Tools > Users and Groups, which option do you use to update users’ Vault group memberships?
The Vault administrator can change the Vault license by uploading the new license to the system Safe.
In PVWA, you are attempting to play a recording made of a session by user jsmith, but there is no option to “Fast Forward” within the video. It plays and only allows you to skip between commands instead. You are also unable to download the video.
What could be the cause?
As long as you are a member of the Vault Admins group you can grant any permission on any safe.
A new colleague created a directory mapping between the Active Directory groups and the Vault.
Where can the newly Configured directory mapping be tested?
It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.
What must you specify when configuring a discovery scan for UNIX? (Choose two.)
You received a notification from one of your CyberArk auditors that they are missing Vault level audit permissions. You confirmed that all auditors are missing the Audit Users Vault permission.
Where do you update this permission for all auditors?
A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request.
What is the correct location to identify users or groups who can approve?
You have been asked to identify the up or down status of Vault services.
Which CyberArk utility can you use to accomplish this task?
A newly created platform allows users to access a Linux endpoint. When users click to connect, nothing happens.
Which piece of the platform is missing?
You need to recover an account localadmin02 for target server 10.0.123.73 stored in Safe Team1.
What do you need to recover and decrypt the object? (Choose three.)
Which of the following PTA detections require the deployment of a Network Sensor or installing the PTA Agent on the domain controller?
To manage automated onboarding rules, a CyberArk user must be a member of which group?
Match each PTA alert category with the PTA sensors that collect the data for it.
PTA can automatically suspend sessions if suspicious activities are detected in a privileged session, but only if the session is made via the CyberArk PSM.
It is possible to control the hours of the day during which a user may log into the vault.
Which statement is true about setting the reconcile account at the platform level?
You are creating a Dual Control workflow for a team’s safe.
Which safe permissions must you grant to the Approvers group?
Users who have the 'Access Safe without confirmation' safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.
In addition to add accounts and update account contents, which additional permission on the safe is required to add a single account?