The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys.
How are these keys managed?
Answer : A
Which of these accounts onboarding methods is considered proactive?
Answer : B
When a DR Vault Server becomes an active vault, it will automatically revert back to DR mode once the Primary Vault comes back online.
Answer : B
Assuming a safe has been configured to be accessible during certain hours of the day, a Vault Admin may still access that safe outside of those hours.
Answer : B
Which Master Policy Setting must be active in order to have an account checked-out by one user for a pre-determined amount of time?
Answer : B
A new domain controller has been added to your domain. You need to ensure the CyberArk infrastructure can use the new domain controller for authentication.
Which locations must you update?
Answer : C
%20user%20management%20using%20LDAP%7C_____2
Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?
Answer : D