Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CyberArk PAM-CDE-RECERT Practice Exam with Questions & Answers | Set: 3

Questions 21

CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.

Options:
A.

TRUE

B.

FALSE

Questions 22

If the AccountUploader Utility is used to create accounts with SSH keys, which parameter do you use to set the full or relative path of the SSH private key file that will be attached to the account?

Options:
A.

KeyPath

B.

KeyFile

C.

ObjectName

D.

Address

Questions 23

SAFE Authorizations may be granted to____________.

Select all that apply.

Options:
A.

Vault Users

B.

Vault Group

C.

LDAP Users

D.

LDAP Groups

Questions 24

How does the Vault administrator apply a new license file?

Options:
A.

Upload the license.xml file to the system Safe and restart the PrivateArk Server service

B.

Upload the license.xml file to the system Safe

C.

Upload the license.xml file to the Vault Internal Safe and restart the PrivateArk Server service

D.

Upload the license.xml file to the Vault Internal Safe

Questions 25

Target account platforms can be restricted to accounts that are stored m specific Safes using the Allowed Safes property.

Options:
A.

TRUE

B.

FALSE

Questions 26

Arrange the steps to restore a Vault using PARestore for a Backup in the correct sequence.

PAM-CDE-RECERT Question 26

Options:
Questions 27

What is the chief benefit of PSM?

Options:
A.

Privileged session isolation

B.

Automatic password management

C.

Privileged session recording

D.

‘Privileged session isolation’ and ‘Privileged session recording’

Questions 28

Which option in the PrivateArk client is used to update users' Vault group memberships?

Options:
A.

Update > General tab

B.

Update > Authorizations tab

C.

Update > Member Of tab

D.

Update > Group tab

Questions 29

dbparm.ini is the main configuration file for the Vault.

Options:
A.

True

B.

False

Questions 30

You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.

How should this be configured to allow for password management using least privilege?

Options:
A.

Configure each CPM to use the correct logon account.

B.

Configure each CPM to use the correct reconcile account.

C.

Configure the UNIX platform to use the correct logon account.

D.

Configure the UNIX platform to use the correct reconcile account.