11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

PAM-DEF Exam Dumps - CyberArk Defender - PAM

Question # 4

Match each automatic remediation to the correct PTA security event.

Full Access
Question # 5

The Active Directory User configured for Windows Discovery needs which permission(s) or membership?

A.

Member of Domain Admin Group

B.

Member of LDAP Admin Group

C.

Read and Write Permissions

D.

Read Only Permissions

Full Access
Question # 6

Which report shows the accounts that are accessible to each user?

A.

Activity report

B.

Entitlement report

C.

Privileged Accounts Compliance Status report

D.

Applications Inventory report

Full Access
Question # 7

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group Operations Staff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of Operations Managers never need to be able to use the show, copy or connect buttons themselves.

Which safe permission do you need to grant Operations Staff? Check all that apply.

A.

Use Accounts

B.

Retrieve Accounts

C.

Authorize Password Requests

D.

Access Safe without Authorization

Full Access
Question # 8

The Password upload utility can be used to create safes.

A.

TRUE

B.

FALS

Full Access
Question # 9

Match each permission to where it can be found.

Full Access
Question # 10

Which report provides a list of account stored in the vault.

A.

Privileged Accounts Inventory

B.

Privileged Accounts Compliance Status

C.

Entitlement Report

D.

Active Log

Full Access
Question # 11

What is the primary purpose of One Time Passwords?

A.

Reduced risk of credential theft

B.

More frequent password changes

C.

Non-repudiation (individual accountability)

D.

To force a 'collusion to commit' fraud ensuring no single actor may use a password without authorization.

Full Access
Question # 12

ADR Vault became active due to a failure of the primary Vault. Service on the primary Vault has now been restored. Arrange the steps to return the DR vault to its normal standby mode in the correct sequence.

Full Access
Question # 13

To enable the Automatic response “Add to Pending” within PTA when unmanaged credentials are found, what are the minimum permissions required by PTAUser for the PasswordManager_pending safe?

A.

List Accounts, View Safe members, Add accounts (includes update properties), Update Account content, Update Account properties

B.

List Accounts, Add accounts (includes update properties), Delete Accounts, Manage Safe

C.

Add accounts (includes update properties), Update Account content, Update Account properties, View Audit

D.

View Accounts, Update Account content, Update Account properties, Access Safe without confirmation, Manage Safe, View Audit

Full Access
Question # 14

One can create exceptions to the Master Policy based on ____________________.

A.

Safes

B.

Platforms

C.

Policies

D.

Accounts

Full Access
Question # 15

Your customer, ACME Corp, wants to store the Safes Data in Drive D instead of Drive C.

Which file should you edit?

A.

TSparm.ini

B.

Vault.ini

C.

DBparm.ini

D.

user.ini

Full Access
Question # 16

What do you need on the Vault to support LDAP over SSL?

A.

CA Certificate(s) used to sign the External Directory certificate Most Voted

B.

RECPRV.key

C.

a private key for the external directory

D.

self-signed Certificate(s) for the Vault

Full Access
Question # 17

What does the minvalidity parameter on a platform policy determine?

A.

time between a password retrieval and the account becoming eligible for a password change

B.

timeout for users signed into the PVWA as configured in the global settings

C.

minimum amount of time that Just in Time access is valid

D.

time in minutes before an empty safe will be automatically deleted

Full Access
Question # 18

In your organization the “click to connect” button is not active by default.

How can this feature be activated?

A.

Policies > Master Policy > Allow EPV transparent connections > Inactive

B.

Policies > Master Policy > Session Management > Require privileged session monitoring and isolation > Add Exception

C.

Policies > Master Policy > Allow EPV transparent connections > Active

D.

Policies > Master Policy > Password Management

Full Access
Question # 19

Which accounts can be selected for use in the Windows discovery process? (Choose two.)

A.

an account stored in the Vault

B.

an account specified by the user

C.

the Vault Administrator

D.

any user with Auditor membership

E.

the PasswordManager user

Full Access
Question # 20

What does the Export Vault Data (EVD) utility do?

A.

exports data from the Vault to TXT or CSV files, or to MSSQL databases

B.

generates a backup file that can be used as a cold backup

C.

exports all passwords and imports them into another instance of CyberArk

D.

keeps two active vaults in sync

Full Access
Question # 21

You notice an authentication failure entry for the DR user in the ITALog.

What is the correct process to fix this error? (Choose two.)

A.

PrivateArk Client > Tools > Administrative Tools > Users and Groups > DR User > Update > Authentication > Update Password.

B.

Create a new credential file, on the DR Vault, using the CreateCredFile utility and the newly set password.

С. Create a new credential file, on the Primary Vault, using the CreateCredFile utility and the newly set password.

C.

PVWA > User Provisioning > Users and Groups > DR User > Update Password.

D.

PrivateArk Client > Tools > Administrative Tools > Users and Groups > PAReplicate User > Update > Authentication > Update Password.

Full Access
Question # 22

It is possible to control the hours of the day during which a user may log into the vault.

A.

TRUE

B.

FALSE

Full Access
Question # 23

You have been asked to secure a set of shared accounts in CyberArk whose passwords will need to be used by end users. The account owner wants to be able to track who was using an account at any given moment.

Which security configuration should you recommend?

A.

Configure one-time passwords for the appropriate platform in Master Policy.

B.

Configure shared account mode on the appropriate safe.

C.

Configure both one-time passwords and exclusive access for the appropriate platform in Master Policy.

D.

Configure object level access control on the appropriate safe.

Full Access
Question # 24

What is the purpose of the Interval setting in a CPM policy?

A.

To control how often the CPM looks for System Initiated CPM work.

B.

To control how often the CPM looks for User Initiated CPM work.

C.

To control how long the CPM rests between password changes.

D.

To control the maximum amount of time the CPM will wait for a password change to complete.

Full Access
Question # 25

You want to generate a license capacity report.

Which tool accomplishes this?

A.

Password Vault Web Access

B.

PrivateArk Client

C.

DiagnoseDB Report

D.

RestAPI

Full Access
Question # 26

It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.

A.

TRUE

B.

FALS

Full Access
Question # 27

Match the Status of Service on a DR Vault to what is displayed when it is operating normally in Replication mode.

Full Access
Question # 28

Match the connection component to the corresponding OS/Function.

Full Access
Question # 29

Where can you check that the LDAP binding is using TCP/636?

A.

in Active Directory under "Users OU" => "User Properties" => "External Bindings" => "Port"

B.

in PVWA, under "LDAP Integration" => "LDAP" => "Directories" => "" => "Hosts" => "Host"

C.

in PrivateArk Client, under "Tools" => "Administrative Tools" => "Directory Mapping" => ""

D.

From the PVWA, connect to the domain controller using Test-NetConnection on Port 636.

Full Access
Question # 30

A newly created platform allows users to access a Linux endpoint. When users click to connect, nothing happens.

Which piece of the platform is missing?

A.

PSM-SSH Connection Component

B.

UnixPrompts.ini

C.

UnixProcess.ini

D.

PSM-RDP Connection Component

Full Access
Question # 31

Users are unable to launch Web Type Connection components from the PSM server. Your manager asked you to open the case with CyberArk Support.

Which logs will help the CyberArk Support Team debug the issue? (Choose three.)

A.

PSMConsole.log

B.

PSMDebug.log

C.

PSMTrace.log

D.

.Component.log

E.

PMconsole.log

F.

ITAlog.log

Full Access
Question # 32

Refer to the exhibit.

Why is user "EMEALevel2Support" unable to change the password for user "Operator"?

A.

EMEALevel2Support’s hierarchy level is not the same or higher than Operator.

B.

EMEALevel2Support does not have the "Manage Directory Mapping" role.

C.

Operator can only be reset by the Master user.

D.

EMEALevel2Support does not have rights to reset passwords for other users.

Full Access
Question # 33

You need to enable the PSM for all platforms.

Where do you perform this task?

A.

Platform Management > (Platform) > UI & Workflows

B.

Master Policy > Session Management

C.

Master Policy > Privileged Access Workflows

D.

Administration > Options > Connection Components

Full Access
Question # 34

Which statement about the Master Policy best describes the differences between one-time password and exclusive access functionality?

A.

Exclusive access means that only a specific group of users may use the account. After an account on a one-time password platform is used, the account is deleted from the safe automatically.

B.

Exclusive access locks the account indefinitely. One-time password can be used replace invalid account passwords.

C.

Exclusive access is enabled by default in the Master Policy. One-time password should only be enabled for emergencies.

D.

Exclusive access allows only one person to check-out an account at a time. One-time password schedules an account for a password change after the MinValidityPeriod period expires.

Full Access
Question # 35

When onboarding multiple accounts from the Pending Accounts list, which associated setting must be the same across the selected accounts?

A.

Platform

B.

Connection Component

C.

CPM

D.

Vault

Full Access
Question # 36

When creating an onboarding rule, it will be executed upon .

A.

All accounts in the pending accounts list

B.

Any future accounts discovered by a discovery process

C.

Both “All accounts in the pending accounts list” and “Any future accounts discovered by a discovery process”

Full Access
Question # 37

When managing SSH keys, the CPM stores the Public Key

A.

In the Vault

B.

On the target server

C.

A & B

D.

Nowhere because the public key can always be generated from the private key.

Full Access
Question # 38

dbparm.ini is the main configuration file for the Vault.

A.

True

B.

False

Full Access
Question # 39

If a user is a member of more than one group that has authorizations on a safe, by default that user is granted________.

A.

the vault will not allow this situation to occur.

B.

only those permissions that exist on the group added to the safe first.

C.

only those permissions that exist in all groups to which the user belongs.

D.

the cumulative permissions of all groups to which that user belongs.

Full Access
Question # 40

You are troubleshooting a PVWA slow response.

Which log files should you analyze first? (Choose two.)

A.

ITALog.log

B.

web.config

C.

CyberArk.WebApplication.log

D.

CyberArk.WebConsole.log

Full Access
Question # 41

How does the Vault administrator apply a new license file?

A.

Upload the license.xml file to the system Safe and restart the PrivateArk Server service

B.

Upload the license.xml file to the system Safe

C.

Upload the license.xml file to the Vault Internal Safe and restart the PrivateArk Server service

D.

Upload the license.xml file to the Vault Internal Safe

Full Access
Question # 42

Which service should NOT be running on the DR Vault when the primary Production Vault is up?

A.

PrivateArk Database

B.

PrivateArk Server

C.

CyberArk Vault Disaster Recovery (DR) service

D.

CyberArk Logical Container

Full Access
Question # 43

Your organization has a requirement to allow users to “check out passwords” and connect to targets with the same account through the PSM.

What needs to be configured in the Master policy to ensure this will happen?

A.

Enforce check-in/check-out exclusive access = active; Require privileged session monitoring and isolation = active

B.

Enforce check-in/check-out exclusive access = inactive; Require privileged session monitoring and isolation = inactive

C.

Enforce check-in/check-out exclusive access = inactive; Record and save session activity = active

D.

Enforce check-in/check-out exclusive access = active; Record and save session activity = inactive

Full Access
Question # 44

Where can PTA be configured to send alerts? (Choose two.)

A.

SIEM

B.

Email

C.

Google Analytics

D.

EVD

E.

PAReplicate

Full Access
Question # 45

What is the purpose of the Immediate Interval setting in a CPM policy?

A.

To control how often the CPM looks for System Initiated CPM work.

B.

To control how often the CPM looks for User Initiated CPM work.

C.

To control how often the CPM rests between password changes.

D.

To Control the maximum amount of time the CPM will wait for a password change to complete.

Full Access
Question # 46

Which dependent accounts does the CPM support out-of-the-box? (Choose three.)

A.

Solaris Configuration file

B.

Windows Services

C.

Windows Scheduled

D.

Windows DCOM Applications

E.

Windows Registry

F.

Key Tab file

Full Access
Question # 47

Customers who have the ‘Access Safe without confirmation’ safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.

A.

TRUE

B.

FALSE

Full Access
Question # 48

When running a “Privileged Accounts Inventory” Report through the Reports page in PVWA on a specific safe, which permission/s are required on that safe to show complete account inventory information?

A.

List Accounts, View Safe Members

B.

Manage Safe Owners

C.

List Accounts, Access Safe without confirmation

D.

Manage Safe, View Audit

Full Access
Question # 49

Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.

A.

Discovery and Audit (DMA)

B.

Auto Detection (AD)

C.

Export Vault Data (EVD)

D.

On Demand Privileges Manager (OPM)

E.

Accounts Discovery

Full Access
Question # 50

The Vault administrator can change the Vault license by uploading the new license to the system Safe.

A.

True

B.

False

Full Access
Question # 51

Platform settings are applied to _________.

A.

The entire vault.

B.

Network Areas

C.

Safes

D.

Individual Accounts

Full Access
Question # 52

Assuming a safe has been configured to be accessible during certain hours of the day, a Vault Admin may still access that safe outside of those hours.

A.

TRUE

B.

FALSE

Full Access
Question # 53

You created a new safe and need to ensure the user group cannot see the password, but can connect through the PSM.

Which safe permissions must you grant to the group? (Choose two.)

A.

List Accounts Most Voted

B.

Use Accounts Most Voted

C.

Access Safe without Confirmation

D.

Retrieve Files

E.

Confirm Request

Full Access
Question # 54

Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?

A.

Accounts Discovery

B.

Auto Detection

C.

Onboarding RestAPI functions

D.

PTA Rules

Full Access
Question # 55

You want to create a new onboarding rule.

Where do you accomplish this?

A.

In PVWA, click Reports > Unmanaged Accounts > Rules

B.

In PVWA, click Options > Platform Management > Onboarding Rules

C.

In PrivateArk, click Tools > Onboarding Rules

D.

In PVWA, click Accounts > Onboarding Rules

Full Access
Question # 56

PSM for Windows (previously known as “RDP Proxy”) supports connections to the following target systems

A.

Windows

B.

UNIX

C.

Oracle

D.

All of the above

Full Access
Question # 57

You are configuring a Vault HA cluster.

Which file should you check to confirm the correct drives have been assigned for the location of the Quorum and Safes data disks?

A.

ClusterVault.ini

B.

my.ini

C.

vault.ini

D.

DBParm.ini

Full Access
Question # 58

It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occur

A.

TRUE

B.

FALS

Full Access
Question # 59

Which utilities could you use to change debugging levels on the vault without having to restart the vault. Select all that apply.

A.

PAR Agent

B.

PrivateArk Server Central Administration

C.

Edit DBParm.ini in a text editor.

D.

Setup.exe

Full Access
Question # 60

Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire?

A.

Privileged Accounts Inventory

B.

Privileged Accounts Compliance Status

C.

Activity Log

D.

Privileged Accounts CPM Status

Full Access
Question # 61

What is the purpose of the PrivateArk Server service?

A.

Executes password changes

B.

Maintains Vault metadata

C.

Makes Vault data accessible to components

D.

Sends email alerts from the Vault

Full Access
Question # 62

tsparm.ini is the main configuration file for the Vault.

A.

True

B.

False

Full Access
Question # 63

An auditor initiates a live monitoring session to PSM server to view an ongoing live session. When the auditor’s machine makes an RDP connection the PSM server, which user will be used?

A.

PSMAdminConnect

B.

Shadowuser

C.

PSMConnect

D.

Credentials stored in the Vault for the target machine

Full Access
Question # 64

Which values are acceptable in the address field of an Account?

A.

It must be a Fully Qualified Domain Name (FQDN)

B.

It must be an IP address

C.

It must be NetBIOS name

D.

Any name that is resolvable on the Central Policy Manager (CPM) server is acceptable

Full Access
Question # 65

Which one the following reports is NOT generated by using the PVWA?

A.

Accounts Inventory

B.

Application Inventory

C.

Sales List

D.

Convince Status

Full Access
Question # 66

SAFE Authorizations may be granted to____________.

Select all that apply.

A.

Vault Users

B.

Vault Group

C.

LDAP Users

D.

LDAP Groups

Full Access
Question # 67

Which file must be edited on the Vault to configure it to send data to PTA?

A.

dbparm.ini

B.

PARAgent.ini

C.

my.ini

D.

padr.ini

Full Access
Question # 68

Which statement is true about setting the reconcile account at the platform level?

A.

This is the only way to enable automatic reconciliation of account passwords.

B.

CPM performance will be improved when the reconcile account is set at the platform level.

C.

A rule can be used to specify the reconcile account dynamically or a specific reconcile account can be selected.

D.

This configuration prevents the association from becoming broken if the reconcile account is moved to a different safe.

Full Access
Question # 69

You are logging into CyberArk as the Master user to recover an orphaned safe.

Which items are required to log in as Master?

A.

Master CD, Master Password, console access to the Vault server, Private Ark Client

B.

Operator CD, Master Password, console access to the PVWA server, PVWA access

C.

Operator CD, Master Password, console access to the Vault server, Recover.exe

D.

Master CD, Master Password, console access to the PVWA server, Recover.exe

Full Access
Question # 70

A new HTML5 Gateway has been deployed in your organization.

Where do you configure the PSM to use the HTML5 Gateway?

A.

Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details > Add PSM Gateway

B.

Administration > Options > Privileged Session Management > Add Configured PSM Gateway Servers

C.

Administration > Options > Privileged Session Management > Configured PSM Servers > Add PSM Gateway

D.

Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details

Full Access
Question # 71

The System safe allows access to the Vault configuration files.

A.

TRUE

B.

FALS

Full Access
Question # 72

Where can a user with the appropriate permissions generate a report? (Choose two.)

A.

PVWA > Reports

B.

PrivateArk Client

C.

Cluster Vault Manager

D.

PrivateArk Server Monitor

E.

PARClient

Full Access