Question 6 of 113

A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request.

What is the correct location to identify users or groups who can approve?

    Correct Answer: B

    To identify users or groups who can approve a password request that is under dual control, navigate to PVWA (Privileged Vault Web Access) > Policies > Access Control (Safes) > Select the safe > Safe Members > Workflow > Authorize Password Requests. This path allows you to see the members who are authorized to approve password requests, which is essential for the dual control process.

Question 7 of 113

What must you specify when configuring a discovery scan for UNIX? (Choose two.)

    Correct Answer: C, D

    When configuring a discovery scan for UNIX, it is essential to specify the root password for each machine because this allows the scanning process to authenticate and access the necessary information on each target machine. Additionally, you must provide a list of machines to scan, so the discovery process knows which machines need to be scanned. Both of these elements are critical for conducting a successful and comprehensive discovery scan.

Question 8 of 113

To change the safe where recordings are kept for a specific platform, which setting must you update in the platform configuration?

    Correct Answer: A

    To change the safe where recordings are kept for a specific platform, you must update the 'SessionRecorderSafe' setting in the platform configuration. This setting specifies the name of the safe that will store recordings of activities for accounts associated with the platform.

Question 9 of 113

Which processes reduce the risk of credential theft? (Choose two.)

    Correct Answer: B, D

    Requiring a password change every X days ensures that even if credentials are compromised, the window of opportunity for misuse is limited, since the credentials will frequently be rotated. Enforcing one-time password access significantly reduces the risk of credential theft because the password expires after a single use, making it much harder for unauthorized users to reuse stolen credentials. These processes directly focus on reducing risks associated with credential theft.

Question 10 of 113

You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.

How can this be configured to allow for password management using least privilege?

    Correct Answer: C

    To allow for password management using least privilege, the correct approach is to configure the UNIX platform to use the correct logon account. This ensures that the CPM can log in using a secondary account with the necessary permissions instead of directly using the root account. By doing this, the CPM gains the ability to manage the root account's password without having direct root access, which adheres to the principle of least privilege.