Question 21

Which CyberArk utility allows you to create lists of Master Policy Settings, owners and safes for output to text files or MSSQL databases?
  • Question 22

    Time of day or day of week restrictions on when password verifications can occur configured in
    ____________________.
  • Question 23

    For an account attached to a platform that requires Dual Control based on a Master Policy exception, how
    would you configure a group of users to access a password without approval.
  • Question 24

    You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
    How should this be configured to allow for password management using least privilege?
  • Question 25

    PSM for Windows (previously known as "RDP Proxy") supports connections to the following target systems