Pass the CyberArk CyberArk CDE Certification PAM-CDE-RECERT Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

To manage automated onboarding rules, a CyberArk user must be a member of which group?

Options:

A.

Vault Admins


B.

CPM User


C.

Auditors


D.

Administrators


Expert Solution
Questions # 32:

Which of the following Privileged Session Management (PSM) solutions support live monitoring of active sessions?

Options:

A.

PSM (i.e., launching connections by clicking on the connect button in the Password Vault Web Access (PVWA)


B.

PSM for Windows (previously known as RDP Proxy)


C.

PSM for SSH (previously known as PSM-SSH Proxy)


D.

All of the above


Expert Solution
Questions # 33:

The Password upload utility can be used to create safes.

Options:

A.

TRUE


B.

FALS


Expert Solution
Questions # 34:

VAULT authorizations may be granted to_____.

Options:

A.

Vault Users


B.

Vault Groups


C.

LDAP Users


D.

LDAP Groups


Expert Solution
Questions # 35:

In your organization the “click to connect” button is not active by default.

How can this feature be activated?

Options:

A.

Policies > Master Policy > Allow EPV transparent connections > Inactive


B.

Policies > Master Policy > Session Management > Require privileged session monitoring and isolation > Add Exception


C.

Policies > Master Policy > Allow EPV transparent connections > Active


D.

Policies > Master Policy > Password Management


Expert Solution
Questions # 36:

CyberArk user Neil is trying to connect to the Target Linux server 192.168.1.64 using a domain account ACME/linuxuser01 on Domain Acme.corp using PSM for SSH server 192.168.65.145. What is the correct syntax?

Options:

A.

Ssh neil@linuxuser01:acme.corp@192.168.1.64@192.168.1.45


B.

Ssh neil@linuxuser01#acme.corp@192.168.1.64@192.168.1.45


C.

Ssh neil@linuxuser01@192.168.1.64@192.168.65.145


D.

Ssh neil@linuxuser01@acme.corp@192.168.1.64@192.168.1.45


Expert Solution
Questions # 37:

The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys.

How are these keys managed?

Options:

A.

CyberArk stores Private keys in the Vault and updates Public keys on target systems.


B.

CyberArk stores Public keys in the Vault and updates Private keys on target systems.


C.

CyberArk does not store Public or Private keys and instead uses a reconcile account to create keys on demand.


D.

CyberArk stores both Private and Public keys and can update target systems with either key.


Expert Solution
Questions # 38:

Which permissions are needed for the Active Directory user required by the Windows Discovery process?

Options:

A.

Domain Admin


B.

LDAP Admin


C.

Read/Write


D.

Read


Expert Solution
Questions # 39:

Which authentication methods does PSM for SSH support?

Options:

A.

CyberArk Password, LDAP, RADIUS, SAML


B.

LDAP, Windows Authentication, SSH Keys


C.

RADIUS, Oracle SSO, CyberArk Password


D.

CyberArk Password, LDAP, RADIUS


Expert Solution
Questions # 40:

A customer is deploying PVWAs in the Amazon Web Services Public Cloud. Which load balancing option does CyberArk recommend?

Options:

A.

Network Load Balancer


B.

Classic Load Balancer


C.

HTTPS load balancer


D.

Public standard load balancer


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions