CyberArk PAM DEF
Q: 1
DRAG DROP Match the built-in Vault User with the correct definition. 
Drag & Drop
Q: 2
Via Password Vault Web Access (PVWA), a user initiates a PSM connection to the target Linux
machine using RemoteApp. When the client’s machine makes an RDP connection to the PSM server,
which user will be utilized?
Options
Q: 3
As long as you are a member of the Vault Admins group you can grant any permission on any safe.
Options
Q: 4
Which utilities could you use to change debugging levels on the vault without having to restart the
vault. Select all that apply.
Options
Q: 5
Which change could CyberArk make to the REST API that could cause existing scripts to fail?
Options
Q: 6
Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH
access for root is denied?
Options
Q: 7
DRAG DROP Arrange the steps to restore a Vault using PARestore for a Backup in the correct sequence. 
Drag & Drop
Q: 8
DRAG DROP Match each permission to where it can be found. 
Drag & Drop
Q: 9
It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occur
Options
Q: 10
Customers who have the ‘Access Safe without confirmation’ safe permission on a safe where
accounts are configured for Dual control, still need to request approval to use the account.
Options
Question 1 of 10