PAM-DEF 無料問題集「CyberArk Defender - PAM」
You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How should this be configured to allow for password management using least privilege?
How should this be configured to allow for password management using least privilege?
正解:C
解答を投票する
解説: (JPNTest メンバーにのみ表示されます)