New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CyberArk Defender PAM-DEF Questions and answers with CertsForce

Viewing page 2 out of 8 pages
Viewing questions 11-20 out of questions
Questions # 11:

When running a “Privileged Accounts Inventory” Report through the Reports page in PVWA on a specific safe, which permission/s are required on that safe to show complete account inventory information?

Options:

A.

List Accounts, View Safe Members


B.

Manage Safe Owners


C.

List Accounts, Access Safe without confirmation


D.

Manage Safe, View Audit


Expert Solution
Questions # 12:

When the CPM connects to a database, which interface is most commonly used?

Options:

A.

Kerberos


B.

ODBC


C.

VBScript


D.

Sybase


Expert Solution
Questions # 13:

What is the purpose of the Immediate Interval setting in a CPM policy?

Options:

A.

To control how often the CPM looks for System Initiated CPM work.


B.

To control how often the CPM looks for User Initiated CPM work.


C.

To control how often the CPM rests between password changes.


D.

To Control the maximum amount of time the CPM will wait for a password change to complete.


Expert Solution
Questions # 14:

You received a notification from one of your CyberArk auditors that they are missing Vault level audit permissions. You confirmed that all auditors are missing the Audit Users Vault permission.

Where do you update this permission for all auditors?

Options:

A.

Private Ark Client > Tools > Administrative Tools > Directory Mapping > Vault Authorizations


B.

Private Ark Client > Tools > Administrative Tools > Users and Groups > Auditors > Authorizations tab


C.

PVWA User Provisioning > LDAP integration > Vault Auditors Mapping > Vault Authorizations


D.

PVWA> Administration > Configuration Options > LDAP integration > Vault Auditors Mapping > Vault Authorizations


Expert Solution
Questions # 15:

The vault supports Role Based Access Control.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Questions # 16:

A new HTML5 Gateway has been deployed in your organization.

Where do you configure the PSM to use the HTML5 Gateway?

Options:

A.

Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details > Add PSM Gateway


B.

Administration > Options > Privileged Session Management > Add Configured PSM Gateway Servers


C.

Administration > Options > Privileged Session Management > Configured PSM Servers > Add PSM Gateway


D.

Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details


Expert Solution
Questions # 17:

Which statement is correct concerning accounts that are discovered, but cannot be added to the Vault by an automated onboarding rule?

Options:

A.

They are added to the Pending Accounts list and can be reviewed and manually uploaded.


B.

They cannot be onboarded to the Password Vault.


C.

They must be uploaded using third party tools.


D.

They are not part of the Discovery Process.


Expert Solution
Questions # 18:

Which PTA sensors are required to detect suspected credential theft?

Options:

A.

Logs, Vault Logs


B.

Logs, Network Sensor, Vault Logs


C.

Logs, PSM Logs, CPM Logs


D.

Logs, Network Sensor, EPM


Expert Solution
Questions # 19:

Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?

Options:

A.

Accounts Discovery


B.

Auto Detection


C.

Onboarding RestAPI functions


D.

PTA Rules


Expert Solution
Questions # 20:

You want to generate a license capacity report.

Which tool accomplishes this?

Options:

A.

Password Vault Web Access


B.

PrivateArk Client


C.

DiagnoseDB Report


D.

RestAPI


Expert Solution
Viewing page 2 out of 8 pages
Viewing questions 11-20 out of questions