Latest PAM-CDE-RECERT Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : PAM-CDE-RECERT
Exam Name : CyberArk CDE Recertification (PAM-CDE-RECERT)
Vendor Name : "CyberArk"







PAM-CDE-RECERT Dumps

PAM-CDE-RECERT Braindumps PAM-CDE-RECERT Real Questions PAM-CDE-RECERT Practice Test PAM-CDE-RECERT Actual Questions


CyberArk


PAM-CDE-RECERT


CyberArk CDE Recertification (PAM-CDE-RECERT)


https://killexams.com/pass4sure/exam-detail/PAM-CDE-RECERT


Question: 68


Which keys are required to be present in order to start the PrivateArk Server service?


  1. Recovery public key

  2. Recovery private key

  3. Server key

  4. Safe key

    Answer: A,C
    Question: 69

Which tools are used during a CPM renaming process?


  1. APIKeyManager Utility

  2. CreateCredFile Utility

  3. CPMinDomain_Hardening.ps1

  4. PMTerminal.exe

  5. Data Execution Prevention




Answer: A,B
Question: 70

Which of the following components can be used to create a tape backup of the Vault?


  1. Disaster Recovery

  2. Distributed Vaults

  3. Replicate

  4. High Availability

    Answer: C
    Question: 71

Which authentication methods does PSM for SSH support?


  1. CyberArk Password, LDAP, RADIUS, SAML

  2. LDAP, Windows Authentication, SSH Keys

  3. RADIUS, Oracle SSO, CyberArk Password

  4. CyberArk Password, LDAP, RADIUS




Answer: D
Question: 72

Accounts Discovery allows secure connections to domain controllers.


  1. TRUE

  2. FALSE




Answer: B
Question: 73

It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur


  1. TRUE

  2. FALSE




Answer: A



Explanation:


Password verification can be restricted to specific days. This means that the CPM will only verify passwords on the days of the week specified in the VFExecutionDays parameter. The days of the week are represented by the first 3 letters of the name of the day. Sunday is represented by Sun, Monday by Mon, etc.



Question: 74


You received a notification from one of your CyberArk auditors that they are missing Vault level audit permissions. You confirmed that all auditors are missing the Audit Users Vault permission.


Where do you update this permission for all auditors?


  1. Private Ark Client > Tools > Administrative Tools > Directory Mapping > Vault Authorizations

  2. Private Ark Client > Tools > Administrative Tools > Users and Groups > Auditors > Authorizations tab

  3. PVWA User Provisioning > LDAP integration > Vault Auditors Mapping > Vault Authorizations

  4. PVWA> Administration > Configuration Options > LDAP integration > Vault Auditors Mapping > Vault Authorizations




Answer: B



Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Managing-Users.htm



Question: 75


Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?


  1. Yes, when using the connect button, CyberArk uses the PMTerminal.exe process which bypasses the root SSH restriction.

  2. Yes, only if a logon account is associated with the root account and the user connects through the PSM-SSH connection component.

  3. Yes, if a logon account is associated with the root account.

  4. No, it is not possible.

    Answer: B
    Question: 76

DRAG DROP


Match each PTA alert category with the PTA sensors that collect the data for it.





Answer: B
Question: 77

Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?


  1. Accounts Discovery

  2. Auto Detection

  3. Onboarding RestAPI functions

  4. PTA Rules

    Answer: B
    Question: 78

A user with administrative privileges to the vault can only grant other users privileges that he himself has.


  1. TRUE

  2. FALSE




Answer: B
Question: 79

Which of the following properties are mandatory when adding accounts from a file? (Choose three.)


  1. Safe Name

  2. Platform ID

  3. All required properties specified in the Platform

  4. Username

  5. Address

  6. Hostname



Answer: A,B,C



Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/NewUI/NewUI-Add-multiple-accounts-in-PVWA.htm



Question: 80


Which is the primary purpose of exclusive accounts?


  1. Reduced risk of credential theft

  2. More frequent password changes

  3. Non-repudiation (individual accountability)

  4. To force a âcollusion to commitâ fraud ensuring no single actor may use a password without authorization




Answer: C