Which PTA sensors are required to detect suspected credential theft? (Choose two.)
Which PTA sensors are required to detect suspected credential theft? (Choose two.)
To detect suspected credential theft, it is essential to monitor relevant logs that capture relevant activities regarding credential use. Logs and Vault Logs are critical in detecting such activities. Logs provide a broad spectrum of recorded activities that can indicate anomalies or unauthorized access attempts, while Vault Logs specifically monitor access and retrieval of credentials from the Vault, potentially flagging unauthorized or suspicious actions.
The answer is A and B. https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/12.0/en/Content/PTA/What-Does-PTA-Detect.htm?tocpath=End%20User%7CSecurity%20Events%7C_____4
It is AB
https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/12.0/en/Content/PTA/What-Does-PTA-Detect.htm?tocpath=End%20User%7CSecurity%20Events%7C_____4
B -A user connects to a machine or a cloud service without first retrieving the required credentials from the Vault. E- Suspected credential theft occurred on a specific endpoint ( Endpoint Privileged Management). BE is correct.