Question 56
You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How should this be configured to allow for password management using least privilege?
How should this be configured to allow for password management using least privilege?
Question 57
PTA can automatically suspend sessions if suspicious activities are detected in a privileged session, but only if the session is made via the CyberArk PSM.
Question 58
Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?
Question 59
Which item is an option for PSM recording customization?
Question 60
You have associated a logon account to one of your UNIX root accounts in the vault. When attempting to change the root account's password the CPM will...