Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CyberArk PAM-DEF Practice Exam with Questions & Answers | Set: 6

Questions 51

What is the purpose of the Immediate Interval setting in a CPM policy?

Options:
A.

To control how often the CPM looks for System Initiated CPM work.

B.

To control how often the CPM looks for User Initiated CPM work.

C.

To control how often the CPM rests between password changes.

D.

To Control the maximum amount of time the CPM will wait for a password change to complete.

CyberArk PAM-DEF Premium Access
Questions 52

SAFE Authorizations may be granted to____________.

Select all that apply.

Options:
A.

Vault Users

B.

Vault Group

C.

LDAP Users

D.

LDAP Groups

Questions 53

Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?

Options:
A.

Accounts Discovery

B.

Auto Detection

C.

Onboarding RestAPI functions

D.

PTA Rules

Questions 54

You are onboarding an account that is not supported out of the box.

What should you do first to obtain a platform to import?

Options:
A.

Create a service ticket in the customer portal explaining the requirements of the custom platform.

B.

Search common community portals like stackoverflow, reddit, github for an existing platform.

C.

From the platforms page, uncheck the “Hide non-supported platforms” checkbox and see if a platform meeting your needs appears.

D.

Visit the CyberArk marketplace and search for a platform that meets your needs.

Questions 55

Match the built-in Vault User with the correct definition.

PAM-DEF Question 55

Options:
Questions 56

Which Master Policy Setting must be active in order to have an account checked-out by one user for a pre-determined amount of time?

Options:
A.

Require dual control password access Approval

B.

Enforce check-in/check-out exclusive access

C.

Enforce one-time password access

D.

Enforce check-in/check-out exclusive access & enforce one-time password access

Questions 57

You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.

How should this be configured to allow for password management using least privilege?

Options:
A.

Configure each CPM to use the correct logon account.

B.

Configure each CPM to use the correct reconcile account.

C.

Configure the UNIX platform to use the correct logon account.

D.

Configure the UNIX platform to use the correct reconcile account.

Questions 58

A password compliance audit found:

1) One-time password access of 20 domain accounts that are members of Domain Admins group in Active Directory are not being enforced.

2) All the sessions of connecting to domain controllers are not being recorded by CyberArk PSM.

What should you do to address these findings?

Options:
A.

Edit the Master Policy and add two policy exceptions: enable "Enforce one-time password access", enable "Record and save session activity".

B.

Edit safe properties and add two policy exceptions: enable "Enforce one-time password access", enable "Record and save session activity".

C.

Edit CPM Settings and add two policy exceptions: enable "Enforce one-time password access", enable "Record and save session activity".

D.

Contact the Windows Administrators and request them to add two policy exceptions at Active Directory Level: enable "Enforce one-time password access", enable "Record and save session activity".

Questions 59

What is the maximum number of levels of authorization you can set up in Dual Control?

Options:
A.

1

B.

2

C.

3

D.

4

Questions 60

You want to generate a license capacity report.

Which tool accomplishes this?

Options:
A.

Password Vault Web Access

B.

PrivateArk Client

C.

DiagnoseDB Report

D.

RestAPI