Question 56

You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How should this be configured to allow for password management using least privilege?
  • Question 57

    PTA can automatically suspend sessions if suspicious activities are detected in a privileged session, but only if the session is made via the CyberArk PSM.
  • Question 58

    Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?
  • Question 59

    Which item is an option for PSM recording customization?
  • Question 60

    You have associated a logon account to one of your UNIX root accounts in the vault. When attempting to change the root account's password the CPM will...