Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CyberArk Sentry CPC-CDE-RECERT Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

You are working with a customer who needs to create a new Safe Design. The customer wants to define a specific role named “Simple User” giving access to the Connect button only. Which rights should be given to this role on the Safes? (Choose two.)

Options:

A.

Use Accounts


B.

Update account properties


C.

List accounts


D.

View audit log


E.

Create folders


Expert Solution
Questions # 2:

In which platform configuration section under Automatic Password Management is the AllowedSafes platform parameter found?

Options:

A.

Privileged Account Management


B.

Additional Policy Settings


C.

General


D.

CPM plugin


Expert Solution
Questions # 3:

Your customer recently merged with a smaller organization. The customer's connector has no network connectivity to the smaller organization's infrastructure. You need to map LDAP users from both your customer and the smaller organization. How is this achieved?

Options:

A.

Create the required users in one directory and configure the Identity Connector to read that directory, as there can only be one Identity Connector.


B.

Create mappings for both directories from the original Identity Connector.


C.

Deploy Identity Connectors in the newly acquired infrastructure and create user mappings.


D.

Switch all users to SAML authentication as there can only be one Identity Connector.


Expert Solution
Questions # 4:

Which method can be used to directly authenticate users to PSM for SSH? (Choose three.)

Options:

A.

CyberArk authentication


B.

LDAP authentication


C.

RADIUS authentication


D.

Windows authentication


E.

SAML authentication


F.

OpenID Connect (OIDC) authentication


Expert Solution
Questions # 5:

Which option correctly describes the authentication differences between CyberArk Privilege Cloud and CyberArk PAM Self-Hosted?

Options:

A.

CyberArk Privilege Cloud only provides a username and password authentication without third-party IdP integration; CyberArk PAM Self-Hosted uses traditional on-premises methods such as Windows and LDAP. but lacks modern protocols such as SAML or OIDC.


B.

CyberArk Privilege Cloud uses cloud-based methods, integrating with CyberArk Identity for MFA. and supports SAML and OIDC; CyberArk PAM Self-Hosted depends on on-premises methods such as RADIUS and LDAP, but can adopt SAML or OIDC with additional setups.


C.

CyberArk Privilege Cloud requires on-premises components for all authentication and does not support other cloud-based authentication protocols; CyberArk PAM Self-Hosted offers a wide array of methods, including support for SAML. OIDC. and other modern protocols, without needing on-premises components.


D.

Both use the same authentication methods.


Expert Solution
Questions # 6:

What are dependencies to update or change the CPM credential? (Choose 2.)

Options:

A.

APIKeyManager.exe


B.

CreateCredFile.exe


C.

CPM/nDomain_Hardening.ps1


D.

CyberArk.TPC.exe


E.

Data Execution Prevention


Expert Solution
Questions # 7:

What creating a new safe, what is the default number of password versions stored if using 'Save latest account versions' within version management settings?

Options:

A.

5


B.

10


C.

30


D.

90


Expert Solution
Questions # 8:

After a scripted installation has successfully installed the PSM, which post-installation task is performed?

Options:

A.

The screen saver for the PSM local users is disabled.


B.

A new group called PSMShadowUsers is created.


C.

The PSMAdminConnect user password is reset.


D.

Remote desktop services are installed.


Expert Solution
Questions # 9:

You are implementing LDAPS Integration for a standard Privilege Cloud environment.

Which information must be provided to the CyberArk Privilege Cloud support team through a Service Request? (Choose 2.)

Options:

A.

LDAPS certificate chain for all domain controllers to be integrated


B.

LDAP bind username and password used to authenticate to the directory to be integrated

C Domain Base Context used to locate the users and groups in the Active Directory to be integrated


C.

Fully Qualified Domain Name and IP Address of the domain controllers to be integrated


D.

remote port set during secure tunnel configuration for each domain controller to be integrated


Expert Solution
Questions # 10:

Which users are Privilege Cloud Standard built-in users? (Choose 2.)

Options:

A.

NASCorp


B.

saascorps


C.

CyberArkAdmin


D.

remoteAccessAppUser


E.

PASReporterUser


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions