PAM-CDE-RECERT Dumps

PAM-CDE-RECERT Braindumps PAM-CDE-RECERT Real Questions PAM-CDE-RECERT Practice Test PAM-CDE-RECERT Actual Questions


CyberArk


PAM-CDE-RECERT


CyberArk CDE Recertification (PAM-CDE-RECERT)


https://killexams.com/pass4sure/exam-detail/PAM-CDE-RECERT

Question: 68


Which keys are required to be present in order to start the PrivateArk Server service?


  1. Recovery public key

  2. Recovery private key

  3. Server key

  4. Safe key Answer: A,C Question: 69

Which tools are used during a CPM renaming process?


  1. APIKeyManager Utility

  2. CreateCredFile Utility

  3. CPMinDomain_Hardening.ps1

  4. PMTerminal.exe

  5. Data Execution Prevention


Answer: A,B Question: 70

Which of the following components can be used to create a tape backup of the Vault?


  1. Disaster Recovery

  2. Distributed Vaults

  3. Replicate

  4. High Availability Answer: C Question: 71

Which authentication methods does PSM for SSH support?


  1. CyberArk Password, LDAP, RADIUS, SAML

  2. LDAP, Windows Authentication, SSH Keys

  3. RADIUS, Oracle SSO, CyberArk Password

  4. CyberArk Password, LDAP, RADIUS


Answer: D Question: 72

Accounts Discovery allows secure connections to domain controllers.


  1. TRUE

  2. FALSE


Answer: B Question: 73

It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur


  1. TRUE

  2. FALSE


Answer: A


Explanation:


Password verification can be restricted to specific days. This means that the CPM will only verify passwords on the days of the week specified in the VFExecutionDays parameter. The days of the week are represented by the first 3 letters of the name of the day. Sunday is represented by Sun, Monday by Mon, etc.


Question: 74


You received a notification from one of your CyberArk auditors that they are missing Vault level audit permissions. You confirmed that all auditors are missing the Audit Users Vault permission.


Where do you update this permission for all auditors?


  1. Private Ark Client > Tools > Administrative Tools > Directory Mapping > Vault Authorizations

  2. Private Ark Client > Tools > Administrative Tools > Users and Groups > Auditors > Authorizations tab

  3. PVWA User Provisioning > LDAP integration > Vault Auditors Mapping > Vault Authorizations

  4. PVWA> Administration > Configuration Options > LDAP integration > Vault Auditors Mapping > Vault Authorizations


Answer: B


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Managing-Users.htm


Question: 75


Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?


  1. Yes, when using the connect button, CyberArk uses the PMTerminal.exe process which bypasses the root SSH restriction.

  2. Yes, only if a logon account is associated with the root account and the user connects through the PSM-SSH connection component.

  3. Yes, if a logon account is associated with the root account.

  4. No, it is not possible. Answer: B Question: 76

DRAG DROP


Match each PTA alert category with the PTA sensors that collect the data for it.



Answer: B Question: 77

Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?


  1. Accounts Discovery

  2. Auto Detection

  3. Onboarding RestAPI functions

  4. PTA Rules Answer: B Question: 78

A user with administrative privileges to the vault can only grant other users privileges that he himself has.


  1. TRUE

  2. FALSE


Answer: B Question: 79

Which of the following properties are mandatory when adding accounts from a file? (Choose three.)


  1. Safe Name

  2. Platform ID

  3. All required properties specified in the Platform

  4. Username

  5. Address

  6. Hostname

Answer: A,B,C


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/NewUI/NewUI-Add-multiple-accounts-in-PVWA.htm


Question: 80


Which is the primary purpose of exclusive accounts?


  1. Reduced risk of credential theft

  2. More frequent password changes

  3. Non-repudiation (individual accountability)

  4. To force a âcollusion to commitâ fraud ensuring no single actor may use a password without authorization


Answer: C