Question 21
Which CyberArk utility allows you to create lists of Master Policy Settings, owners and safes for output to text files or MSSQL databases?
Question 22
Time of day or day of week restrictions on when password verifications can occur configured in
____________________.
____________________.
Question 23
For an account attached to a platform that requires Dual Control based on a Master Policy exception, how
would you configure a group of users to access a password without approval.
would you configure a group of users to access a password without approval.
Question 24
You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How should this be configured to allow for password management using least privilege?
How should this be configured to allow for password management using least privilege?
Question 25
PSM for Windows (previously known as "RDP Proxy") supports connections to the following target systems