Question 31
PSM for SSH (previously known as PSM-SSH Proxy) supports connections to which of the following target systems?
Question 32
Which is the purpose of the interval setting in a Central Policy Manager (CPM) policy?
Question 33
Which of the following features are provided by Ad-Hoc Access (formerly Secure Connect)? (Choose three.)
Question 34
Where does the Vault administrator configure in Password Vault Web Access (PVWA) the Fully Qualified Domain Name (FQDN) of the domain controller during LDAP/S integration?
Question 35
What are the functions of the Remote Control Agent service? (Choose three.)