New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the CyberArk Defender PAM-DEF Questions and answers with CertsForce

Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions
Questions # 31:

The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys.

How are these keys managed?

Options:

A.

CyberArk stores Private keys in the Vault and updates Public keys on target systems.


B.

CyberArk stores Public keys in the Vault and updates Private keys on target systems.


C.

CyberArk does not store Public or Private keys and instead uses a reconcile account to create keys on demand.


D.

CyberArk stores both Private and Public keys and can update target systems with either key.


Expert Solution
Questions # 32:

Which statement about the Master Policy best describes the differences between one-time password and exclusive access functionality?

Options:

A.

Exclusive access means that only a specific group of users may use the account. After an account on a one-time password platform is used, the account is deleted from the safe automatically.


B.

Exclusive access locks the account indefinitely. One-time password can be used replace invalid account passwords.


C.

Exclusive access is enabled by default in the Master Policy. One-time password should only be enabled for emergencies.


D.

Exclusive access allows only one person to check-out an account at a time. One-time password schedules an account for a password change after the MinValidityPeriod period expires.


Expert Solution
Questions # 33:

Due to network activity, ACME Corp’s PrivateArk Server became active on the OR Vault while the Primary Vault was also running normally. All the components continued to point to the Primary Vault.

Which steps should you perform to restore DR replication to normal?

Options:

A.

Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault


B.

Shutdown PrivateArk Server on DR Vault > Start replication on DR vault


C.

Shutdown PrivateArk Server on Primary Vault > Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault


D.

Shutdown PrivateArk Server on DR Vault > Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault


Expert Solution
Questions # 34:

An auditor initiates a live monitoring session to PSM server to view an ongoing live session. When the auditor’s machine makes an RDP connection the PSM server, which user will be used?

Options:

A.

PSMAdminConnect


B.

Shadowuser


C.

PSMConnect


D.

Credentials stored in the Vault for the target machine


Expert Solution
Questions # 35:

Select the best practice for storing the Master CD.

Options:

A.

Copy the files to the Vault server and discard the CD


B.

Copy the contents of the CD to a Hardware Security Module (HSM) and discard the CD


C.

Store the CD in a secure location, such as a physical safe


D.

Store the CD in a secure location, such as a physical safe, and copy the contents of the CD to a folder secured with NTFS permissions on the Vault


Expert Solution
Questions # 36:

A new domain controller has been added to your domain. You need to ensure the CyberArk infrastructure can use the new domain controller for authentication.

Which locations must you update?

Options:

A.

on the Vault server in Windows\System32\Etc\Hosts and in the PVWA Application under Administration > LDAP Integration > Directories > Hosts


B.

on the Vault server in Windows\System32\Etc\Hosts and on the PVWA server in Windows\System32\Etc\Hosts


C.

in the Private Ark client under Tools > Administrative Tools > Directory Mapping


D.

on the Vault server in the certificate store and on the PVWA server in the certificate store


Expert Solution
Questions # 37:

VAULT authorizations may be granted to_____.

Options:

A.

Vault Users


B.

Vault Groups


C.

LDAP Users


D.

LDAP Groups


Expert Solution
Questions # 38:

Where can you check that the LDAP binding is using TCP/636?

Options:

A.

in Active Directory under "Users OU" => "User Properties" => "External Bindings" => "Port"


B.

in PVWA, under "LDAP Integration" => "LDAP" => "Directories" => "" => "Hosts" => "Host"


C.

in PrivateArk Client, under "Tools" => "Administrative Tools" => "Directory Mapping" => ""


D.

From the PVWA, connect to the domain controller using Test-NetConnection on Port 636.


Expert Solution
Questions # 39:

You want to give a newly-created group rights to review security events under the Security pane. You also want to be able to update the status of these events.

Where must you update the group to allow this?

Options:

A.

in the PTAAuthorizationGroups parameter, found in Administration > Options > PTA


B.

in the PTAAuthorizationGroups parameter, found in Administration > Options > General


C.

in the SecurityEventsAuthorizationGroups parameter, found in Administration > Security > Options


D.

in the SecurityEventsFeedAuthorizationGroups parameter, found in Administration > Options > General


Expert Solution
Questions # 40:

It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.

Options:

A.

TRUE


B.

FALSE


Expert Solution
Viewing page 4 out of 8 pages
Viewing questions 31-40 out of questions