Exam Code : PAM-CDE-RECERT
Exam Name : CyberArk CDE Recertification (PAM-CDE-RECERT)
Vendor Name :
"CyberArk"
PAM-CDE-RECERT Dumps
PAM-CDE-RECERT Braindumps PAM-CDE-RECERT Real Questions PAM-CDE-RECERT Practice Test PAM-CDE-RECERT Actual Questions
CyberArk CDE Recertification (PAM-CDE-RECERT)
https://killexams.com/pass4sure/exam-detail/PAM-CDE-RECERT
Which keys are required to be present in order to start the PrivateArk Server service?
Recovery public key
Recovery private key
Server key
Safe key
Answer: A,C
Question: 69
Which tools are used during a CPM renaming process?
APIKeyManager Utility
CreateCredFile Utility
CPMinDomain_Hardening.ps1
PMTerminal.exe
Data Execution Prevention
Which of the following components can be used to create a tape backup of the Vault?
Disaster Recovery
Distributed Vaults
Replicate
High Availability
Answer: C
Question: 71
Which authentication methods does PSM for SSH support?
CyberArk Password, LDAP, RADIUS, SAML
LDAP, Windows Authentication, SSH Keys
RADIUS, Oracle SSO, CyberArk Password
CyberArk Password, LDAP, RADIUS
Accounts Discovery allows secure connections to domain controllers.
TRUE
FALSE
It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur
TRUE
FALSE
Explanation:
Password verification can be restricted to specific days. This means that the CPM will only verify passwords on the days of the week specified in the VFExecutionDays parameter. The days of the week are represented by the first 3 letters of the name of the day. Sunday is represented by Sun, Monday by Mon, etc.
You received a notification from one of your CyberArk auditors that they are missing Vault level audit permissions. You confirmed that all auditors are missing the Audit Users Vault permission.
Where do you update this permission for all auditors?
Private Ark Client > Tools > Administrative Tools > Directory Mapping > Vault Authorizations
Private Ark Client > Tools > Administrative Tools > Users and Groups > Auditors > Authorizations tab
PVWA User Provisioning > LDAP integration > Vault Auditors Mapping > Vault Authorizations
PVWA> Administration > Configuration Options > LDAP integration > Vault Auditors Mapping > Vault Authorizations
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Managing-Users.htm
Can the 'Connect' button be used to initiate an SSH connection, as root, to a Unix system when SSH access for root is denied?
Yes, when using the connect button, CyberArk uses the PMTerminal.exe process which bypasses the root SSH restriction.
Yes, only if a logon account is associated with the root account and the user connects through the PSM-SSH connection component.
Yes, if a logon account is associated with the root account.
No, it is not possible.
Answer: B
Question: 76
DRAG DROP
Match each PTA alert category with the PTA sensors that collect the data for it.
Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?
Accounts Discovery
Auto Detection
Onboarding RestAPI functions
PTA Rules
Answer: B
Question: 78
A user with administrative privileges to the vault can only grant other users privileges that he himself has.
TRUE
FALSE
Which of the following properties are mandatory when adding accounts from a file? (Choose three.)
Safe Name
Platform ID
All required properties specified in the Platform
Username
Address
Hostname
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/NewUI/NewUI-Add-multiple-accounts-in-PVWA.htm
Which is the primary purpose of exclusive accounts?
Reduced risk of credential theft
More frequent password changes
Non-repudiation (individual accountability)
To force a âcollusion to commitâ fraud ensuring no single actor may use a password without authorization