Which of the following protocols need to be installed on a standalone vault server? Check all that apply.
A customer's environment has three data centers consisting of 5,000 servers in Germany, 10,000 servers in Canada, and 1,500 servers in Singapore. You want to manage target servers and avoid complex firewall rules. How many CPMs should you deploy?
When creating a distributed Vault environment architecture, what is the maximum number of Vault servers that can be deployed?
You want to change the name of the PVWAappuser of the second PVWA server.
Which steps are part of the process? (Choose two.)
What would be a good use case for the Disaster Recovery module?
Which tools are used during a CPM renaming process? (Choose two.)
In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.
At what point is a transparent user provisioned in the vault?
As Vault Admin, you have been asked to enable your organization's CyberArk users to authenticate using LDAP.
In addition to Audit Users, which permission do you need to complete this task?
If a customer has one data center and requires fault tolerance, how many PVWAs should be deployed?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
CyberArk Free Exams |
---|
![]() |