Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CyberArk PAM-SEN Practice Exam with Questions & Answers | Set: 3

Questions 21

Which of the following protocols need to be installed on a standalone vault server? Check all that apply.

Options:
A.

Client for Microsoft Networks

B.

QoS Packet Scheduler

C.

File and Printer Sharing for Microsoft Networks

D.

Internet Protocol version 4 (TCP/IPv4)

E.

NIC Teaming Driver, if applicable

CyberArk PAM-SEN Premium Access
Questions 22

A customer's environment has three data centers consisting of 5,000 servers in Germany, 10,000 servers in Canada, and 1,500 servers in Singapore. You want to manage target servers and avoid complex firewall rules. How many CPMs should you deploy?

Options:
A.

1

B.

3 total, 1 per data center

C.

15

D.

6 total, 2 per data center

Questions 23

When creating a distributed Vault environment architecture, what is the maximum number of Vault servers that can be deployed?

Options:
A.

5 - number of primary and satellite Vaults can be specified during installation

B.

3 - all primary

C.

6 - 1 primary and 5 satellite

D.

10 - 2 primary and 8 satellite

Questions 24

You want to change the name of the PVWAappuser of the second PVWA server.

Which steps are part of the process? (Choose two.)

Options:
A.

Update PVWA.ini with new user name

B.

Update Vault.ini with new user name

C.

Create new user in PrivateArk

D.

Rename user in PrivateArk

E.

Create new cred file for user

Questions 25

What would be a good use case for the Disaster Recovery module?

Options:
A.

Recovery Time Objectives or Recovery Point Objectives are at or near zero.

B.

Integration with an Enterprise Backup Solution is required.

C.

Off site replication is required.

D.

PSM is used.

Questions 26

Which tools are used during a CPM renaming process? (Choose two.)

Options:
A.

APIKeyManager Utility Most Voted

B.

CreateCredFile Utility Most Voted

C.

CPMInDomain_Hardening.ps1

D.

PMTerminal.exe

E.

Data Execution Prevention

Questions 27

In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.

Options:
A.

TRUE

B.

FALSE

Questions 28

At what point is a transparent user provisioned in the vault?

Options:
A.

When a directory mapping matching that user id is created.

B.

When a vault admin runs LDAP configuration wizard.

C.

The first time the user logs in.

D.

During the vault's nightly LD|^P refresh

Questions 29

As Vault Admin, you have been asked to enable your organization's CyberArk users to authenticate using LDAP.

In addition to Audit Users, which permission do you need to complete this task?

Options:
A.

Add Network Areas

B.

Manage Directory Mapping

C.

Add/Update Users

D.

Activate Users

Questions 30

If a customer has one data center and requires fault tolerance, how many PVWAs should be deployed?

Options:
A.

two or more

B.

one PVWA cluster

C.

one

D.

two PVWA clusters