A company has multiple business units that have their own set of vendors. Each business unit has a distinct role to manage vendor access. The business units want to have full control over the invitation process for their set of vendors.
After inviting the user to the Remote Access portal, which permissions should be delegated?
What are common ways that organizations leverage the CyberArk Blueprint for Identity Security Success? (Choose three.)
Ato understand the identity attack chain
Bto discover all digital identities
Cto describe the explicit order of operations for Identity Security
Dto assess an organization’s security posture
Eto build an Identity Security roadmap
Fto secure their human identities
You need to identity the most powerful accounts in your organization to prepare for the initial PAM onboarding process.
Which tools or features can be used to locate and onboard these accounts? (Choose two.)
ADiscovery and Audit (DNA)
BCyberArk’s Command Line Interface (PACLI)
COnboarding and Secure Account Feed
DAccounts Discovery
EPrivilege Account Matrix (PAM) XLS
You are adding a new application in the Remote Access portal.
Which authentication methods can you use to authenticate users to the PVWA? (Choose two.)
APassword
BOpenID
CCertificate
DSAML
EOTP
DRAG DROP
Match the connection component to the corresponding OS/Function.
Question 6
CyberArk PAM-DEF official exam objectives/topics
0
Question 7
CyberArk PAM-DEF official exam objectives/topics
Question 8
CyberArk PAM-DEF official exam objectives/topics
Question 9
CyberArk PAM-DEF official exam objectives/topics
Question 10
CyberArk PAM-DEF official exam objectives/topics
Question 11
CyberArk PAM-DEF official exam objectives/topics
Question 12
CyberArk PAM-DEF official exam objectives/topics
Question 13
CyberArk PAM-DEF official exam objectives/topics
Question 14
CyberArk PAM-DEF official exam objectives/topics
Question 15
CyberArk PAM-DEF official exam objectives/topics
Question 16
CyberArk PAM-DEF official exam objectives/topics
Question 17
CyberArk PAM-DEF official exam objectives/topics
Question 18
CyberArk PAM-DEF official exam objectives/topics
Question 19
CyberArk PAM-DEF official exam objectives/topics
Question 20
CyberArk PAM-DEF official exam objectives/topics
Question 21
CyberArk PAM-DEF official exam objectives/topics
Question 22
CyberArk PAM-DEF official exam objectives/topics
Question 23
CyberArk PAM-DEF official exam objectives/topics
Question 24
CyberArk PAM-DEF official exam objectives/topics
Question 25
CyberArk PAM-DEF official exam objectives/topics
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ad
Want a break from the ads?
Become a Supporter and enjoy a completely ad-free experience, plus unlock Learn Mode, Exam Mode, AstroTutor AI, and more.
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
Ask AstroTutor
0
What are valid ways to invite vendors using the Remote Access portal? (Choose two.)
AUse the vendor invitation form.
BCall the vendor users and have them scan a QR code.
CUse the self-service invitation URL.
DAdd the vendors in PVWA and send them their password.
EContact CyberArk support to help invite the vendors.
Which tools can you use to identify the machines and accounts that create the highest risk and are exposed to lateral movement? (Choose two.)
AAccounts Discovery Feed
BCyberArk DNA Report
CREST API Scripts
DCyberArk DNA Map
EGet-LocalUser Powershell cmdlet
Where can you find resources to learn more about the CyberArk Blueprint? (Choose two.)
ACyberArk Blueprint Webpage
BReferences within the Identity Security Platform
CProduct Webinars
DCyberArk University Course
What do you need on the Vault to support LDAP over SSL?
ACA Certificate(s) used to sign the External Directory certificate
BRECPRV.key
Ca private key for the external directory
Dself-signed Certificate(s) for the Vault
What is the easiest way to duplicate an existing platform?
AFrom PrivateArk, copy/paste the appropriate Policy.ini file; then rename it.
BFrom the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform and then click Duplicate; name the new platform.
CFrom PrivateArk, copy/paste the appropriate settings in PVConfiguration.xml; then update the policyName variable.
DFrom the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform, manually update the platform settings and click "Save as" INSTEAD of save to duplicate and rename the platform.
Which parameters can be used to harden the Credential Files (CredFiles) while using CreateCredFile Utility? (Choose three.)
AOS Username
BCurrent machine IP
CCurrent machine hostname
DOperating System Type (Linux/Windows/HP-UX)
EVault IP Address
FTime Frame
You created a new safe and need to ensure the user group cannot see the password, but can connect through the PSM.
Which safe permissions must you grant to the group? (Choose two.)
AList Accounts
BUse Accounts
CAccess Safe without Confirmation
DRetrieve Files
EConfirm Request
You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How can this be configured to allow for password management using least privilege?
AConfigure each CPM to use the correct logon account.
BConfigure each CPM to use the correct reconcile account.
CConfigure the UNIX platform to use the correct logon account.
DConfigure the UNIX platform to use the correct reconcile account.
When are external vault users and groups synchronized by default?
AThey are synchronized once every 24 hours between 1 AM and 5 AM.
BThey are synchronized once every 24 hours between 7 PM and 12 AM.
CThey are synchronized every 2 hours.
DThey are not synchronized according to a specific schedule.
Where can a user with the appropriate permissions generate a report? (Choose two.)
APVWA > Reports
BPrivateArk Client
CCluster Vault Manager
DPrivateArk Server Monitor
EPARClient
Users are unable to launch Web Type Connection components from the PSM server. Your manager asked you to open the case with CyberArk Support.
Which logs will be most useful for the CyberArk Support Team to debug the issue? (Choose three.)
APSMConsole.log
BPSMDebug.log
CPSMTrace.log
D<Session_ID>.Component.log
EPMconsole.log
FITALog.log
You have been asked to identify the up or down status of Vault Services.
Which CyberArk utility can you use to accomplish this task?
APrivateArk Central Administration Console
BPAS Reporter
CPrivateArk Remote Control Agent
DSyslog
Which file must be edited on the Vault to configure it to send data to PTA?
Adbparm.ini
BPARAgent.ini
Cmy.ini
Dpadr.ini
DRAG DROP -
A new HTML5 Gateway has been deployed in your organization.
From the PVWA, arrange the steps to configure a PSM host to use the HTML5 Gateway in the correct sequence.
To change the safe where recordings are kept for a specific platform, which setting must you update in the platform configuration?
ASessionRecorderSafe
BSessionSafe
CRecordingsPath
DRecordingLocation
A new colleague created a directory mapping between the Active Directory groups and the Vault.
Where can the newly Configured directory mapping be tested?
AConnect to the Active Directory and ensure the organizational unit exists.
BConnect to Sailpoint (or similar tool) to ensure the organizational unit is correctly named; log in to the PVWA with "Administrator" and confirm authentication succeeds.
CSearch for members that exist only in the mapping group to grant them safe permissions through the PVWA.
DConnect to the PrivateArk Client with the Administrator Account to see if there is a user in the Vault Admin Group.
Which Automatic Remediation is configurable for a PTA detection of a "Suspected Credential Theft"?
AAdd to Pending
BRotate Credentials
CReconcile Credentials
DDisable Account
DRAG DROP -
ADR Vault became active due to a failure of the primary Vault. Service on the primary Vault has now been restored. Arrange the steps to return the DR vault to its normal standby mode in the correct sequence.
You want to create a new onboarding rule.
Where do you accomplish this?
AIn PVWA, click Reports > Unmanaged Accounts > Rules
BIn PVWA, click Options > Platform Management > Onboarding Rules
CIn PrivateArk, click Tools > Onboarding Rules
DIn PVWA, click Accounts > Onboarding Rules
What does the Export Vault Data (EVD) utility do?
Aexports data from the Vault to TXT or CSV files, or to MSSQL databases
Bgenerates a backup file that can be used as a cold backup
Cexports all passwords and imports them into another instance of CyberArk