Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CyberArk PAM-CDE-RECERT Practice Exam with Questions & Answers | Set: 4

Questions 31

In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?

Options:
A.

True.

B.

False. Because the user can also enter credentials manually using Secure Connect.

C.

False. Because if credentials are not stored in the vault, the PSM will log into the target device as PSM Connect.

D.

False. Because if credentials are not stored in the vault, the PSM will prompt for credentials.

Questions 32

Which permissions are needed for the Active Directory user required by the Windows Discovery process?

Options:
A.

Domain Admin

B.

LDAP Admin

C.

Read/Write

D.

Read

Questions 33

If a customer has one data center and requires high availability, how many PVWA's should be deployed.

Options:
A.

Two

B.

One PVWA cluster

C.

One

D.

Two PVWA Cluster

Questions 34

Which step is required to register a Vault manually in Amazon Web Services using CAVaultManager?

Options:
A.

Specify Amazon as the cloud vendor using the CloudVendor Flag

B.

After running the postinstall utility, restart the "PrivateArk Server" service

C.

Specify the Cloud region using the /CloudRegion flag

D.

Specify whether the Vault is distributed or stand alone

Questions 35

You are creating a Dual Control workflow for a team’s safe.

Which safe permissions must you grant to the Approvers group?

Options:
A.

List accounts, Authorize account request

B.

Retrieve accounts, Access Safe without confirmation

C.

Retrieve accounts, Authorize account request

D.

List accounts, Unlock accounts

Questions 36

You are configuring the vault to send syslog audit data to your organization's SIEM solution. What is a valid value for the SyslogServerProtocol parameter in DBPARM.ini file?

Options:
A.

TLS

B.

SSH

C.

SMTP

D.

SNMP

Questions 37

In addition to disabling Windows services or features not needed for PVWA operations, which tasks does PVWA Hardening.ps1 perform when run?

Options:
A.

Performs IIS hardening: Imports the CyberArk INF configuration

B.

Performs IIS hardening: Configures all group policy settings

C.

Performs IIS hardening: Renames the local Administrator Account

D.

Configures Windows Firewall: Removes all installation files.

Questions 38

In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX system. What is the BEST way to allow CPM to manage root accounts.

Options:
A.

Create a privileged account on the target server. Allow this account the ability to SSH directly from the CPM machine. Configure this account as the Reconcile account of the target server’s root account.

B.

Create a non-privileged account on the target server. Allow this account the ability to SSH directly from the CPM machine. Configure this account as the Logon account of the target server’s root account.

C.

Configure the Unix system to allow SSH logins.

D.

Configure the CPM to allow SSH logins.

Questions 39

Which command configures email alerts within PTA if settings need to be changed post install?

Options:
A.

/opt/tomcat/utility/emailConfiguration.sh

B.

/opt/PTA/emailConfiguration.sh

C.

/opt/PTA/utility/emailConfig.sh

D.

/opt/tomcat/utility/emailSetup.sh

Questions 40

tsparm.ini is the main configuration file for the Vault.

Options:
A.

True

B.

False