PAM-DEF-SEN Dumps PAM-DEF-SEN Braindumps PAM-DEF-SEN Real Questions PAM-DEF-SEN Practice Test PAM-DEF-SEN Actual Questions CyberArk PAM-DEF-SEN CyberArk Defender PAM & Sentry https://killexams.com/pass4sure/exam-detail/PAM-DEF-SEN Question: 106 A SIEM integration allows you to forward ITALOG records to a monitoring solution. A. TRUE B. FALSE Answer: B Question: 107 In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults? A. AAM Credential Provider (previously known as AIM Credential Provider) B. ExportVaultData utility C. PAReplicate utility D. Central Policy Manager Answer: D Question: 108 What is the proper way to allow the Vault to resolve host names? A. Define a DNS server B. Define a WINS server C. Defining the local hosts file D. The Vault cannot resolve host names due to security standards Answer: C Question: 109 When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault? A. CyberArk Vault Disaster Recovery (DR), PrivateArk Database B. CyberArk Vault Disaster Recovery C. CyberArk Vault Disaster Recovery, PrivateArk Database, PrivateArk Server D. CyberArk Vault Disaster Recovery, PrivateArk Database, CyberArk Event Notification Engine Answer: D Question: 110 A safe was recently created by a user who is a member of the LDAP Vault Administrators group. Which of the following users does not have access to the newly created safe by default? A. Master B. Administrator C. Auditor D. Backup Answer: D Question: 111 What is the purpose of the password verify process? A. To test that CyberArk is storing accurate credentials for accounts. B. To change the password of an account according to organizationally defined password rules. C. To allow CyberArk to manage unknown or lost credentials. D. To generate a new complex password. Answer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Verifying- Passwords.htm#:~:text=The%20CPM%20can%20verify%20password,manually%20by%20 an%20authorized%20user. Question: 112 What is the primary purpose of Exclusive Accounts? A. Reduced risk of credential theft B. More frequent password changes C. Non-repudiation (individual accountability) D. To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorization Answer: C Question: 113 Accounts Discovery allows secure connections to domain controllers. A. TRU C. FALSE Answer: A Question: 114 Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests? A. HeadStartInterval B. Interval C. ImmediateInterval D. The CPM does not change the password under this circumstance Answer: C Question: 115 To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers must to be configured to communicate with the Primary Vault and Satellite Vaults. Which file needs to be changed on the PVWA to enable this setup? A. Vault.ini B. dbparm.ini C. pvwa.ini D. Satellite.ini Answer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.1/en/Content/PAS%20INST/Password-Vault- Web-Access-Installation.htm Question: 116 The ACME Company has been a CyberArk customer for many years. ACME Management has asked you to perform a “Health Check" review of the CyberArk deployment. During your analysis you discover that the PSM Component server is fully functional. The RDP SSL certificate is self-signed and the CyberArk Privileged Session Management Service is running under the Local Service. SSL 3.0 is enabled in the Registry. A. The PSM Component Server is configured as defined in PAS Installation Guide. B. The PSM Component Server has been installed correctly but PSM Hardening procedures have not been followed and must be rebuilt. C. The PSM Component Server has been installed correctly but PSM Hardening procedures have not been followed. Hardening procedures must be applied manually to the existing configuration. D. The PSM Component Server has been installed correctly but PVWA Hardening procedures have not been followed. Hardening procedures can be applied via the Installation Automation script or manually to the existing configuration. Answer: A Question: 117 Which of the following logs contain information about errors related to PTA? A. ITAlog.log B. diamond.log C. pm_error.log D. WebApplication.log Answer: B Question: 118 Which combination of safe member permissions will allow End Users to log in to a remote machine transparently but NOT show or copy the password? A. Use Accounts, Retrieve Accounts, List Accounts B. Use Accounts, List Accounts C. Use Accounts D. List Accounts, Retrieve Accounts Answer: D Question: 119 tsparm.ini is the main configuration file for the vault. A. TRUE B. FALSE Answer: B Question: 120 Is it possible to modify the CyberArk Vault Audit Log? A. Yes, a Vault administrator can modify the Audit log B. No, the audit trail is tamper proof and cannot be edited, not even by Master C. Yes, but only the Master user can modify the Audit log D. Yes, a Vault administrator can edit the Audit log but only with explicit permission from CyberArk Answer: B Question: 121 Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.) A. Suspected Credential Theft B. Over-Pass-The-Hash C. Golden Ticket D. Unmanaged Privileged Access Answer: A,B Question: 122 Multiple PVWA servers provide automatic load balancing. A. TRUE B. FALSE Answer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