Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CyberArk CDE Recertification Question and Answers

CyberArk CDE Recertification

Last Update May 18, 2024
Total Questions : 207

We are offering FREE PAM-CDE-RECERT CyberArk exam questions. All you do is to just go and sign up. Give your details, prepare PAM-CDE-RECERT free exam questions and then go for complete pool of CyberArk CDE Recertification test questions that will help you more.

PAM-CDE-RECERT pdf

PAM-CDE-RECERT PDF

$35  $99.99
PAM-CDE-RECERT Engine

PAM-CDE-RECERT Testing Engine

$42  $119.99
PAM-CDE-RECERT PDF + Engine

PAM-CDE-RECERT PDF + Testing Engine

$56  $159.99
Questions 1

What is the purpose of the Immediate Interval setting in a CPM policy?

Options:

A.  

To control how often the CPM looks for System Initiated CPM work.

B.  

To control how often the CPM looks for User Initiated CPM work.

C.  

To control how often the CPM rests between password changes.

D.  

To Control the maximum amount of time the CPM will wait for a password change to complete.

Discussion 0
Questions 2

Which Master Policy Setting must be active in order to have an account checked-out by one user for a pre-determined amount of time?

Options:

A.  

Require dual control password access Approval

B.  

Enforce check-in/check-out exclusive access

C.  

Enforce one-time password access

D.  

Enforce check-in/check-out exclusive access & Enforce one-time password access

Discussion 0
Questions 3

A user is receiving the error message “ITATS006E Station is suspended for User jsmith” when attempting to sign into the Password Vault Web Access (PVWA). Which utility would a Vault administrator use to correct this problem?

Options:

A.  

createcredfile.exe

B.  

cavaultmanager.exe

C.  

PrivateArk

D.  

PVWA

Discussion 0
Questions 4

The System safe allows access to the Vault configuration files.

Options:

A.  

TRUE

B.  

FALS

Discussion 0
Questions 5

Which is the primary purpose of exclusive accounts?

Options:

A.  

Reduced risk of credential theft

B.  

More frequent password changes

C.  

Non-repudiation (individual accountability)

D.  

To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorization

Discussion 0
Questions 6

Which of these accounts onboarding methods is considered proactive?

Options:

A.  

Accounts Discovery

B.  

Detecting accounts with PTA

C.  

A Rest API integration with account provisioning software

D.  

A DNA scan

Discussion 0
Questions 7

Your customer, ACME Corp, wants to store the Safes Data in Drive D instead of Drive C.

Which file should you edit?

Options:

A.  

TSparm.ini

B.  

Vault.ini

C.  

DBparm.ini

D.  

user.ini

Discussion 0
Questions 8

If a customer has one data center and requires high availability, how many PVWA's should be deployed.

Options:

A.  

Two

B.  

One PVWA cluster

C.  

One

D.  

Two PVWA Cluster

Discussion 0
Questions 9

The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys.

How are these keys managed?

Options:

A.  

CyberArk stores Private keys in the Vault and updates Public keys on target systems.

B.  

CyberArk stores Public keys in the Vault and updates Private keys on target systems.

C.  

CyberArk does not store Public or Private keys and instead uses a reconcile account to create keys on demand.

D.  

CyberArk stores both Private and Public keys and can update target systems with either key.

Discussion 0
Questions 10

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group Operations Staff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of Operations Managers never need to be able to use the show, copy or connect buttons themselves.

Which safe permission do you need to grant Operations Staff? Check all that apply.

Options:

A.  

Use Accounts

B.  

Retrieve Accounts

C.  

Authorize Password Requests

D.  

Access Safe without Authorization

Discussion 0
Questions 11

In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?

Options:

A.  

True.

B.  

False. Because the user can also enter credentials manually using Secure Connect.

C.  

False. Because if credentials are not stored in the vault, the PSM will log into the target device as PSM Connect.

D.  

False. Because if credentials are not stored in the vault, the PSM will prompt for credentials.

Discussion 0
Questions 12

If the AccountUploader Utility is used to create accounts with SSH keys, which parameter do you use to set the full or relative path of the SSH private key file that will be attached to the account?

Options:

A.  

KeyPath

B.  

KeyFile

C.  

ObjectName

D.  

Address

Discussion 0
Questions 13

In addition to bit rate and estimated total duration of recordings per day, what is needed to determine the amount of storage required for PSM recordings?

Options:

A.  

Retention period

B.  

Number of PSMs

C.  

Number of users

D.  

Number of targets

Discussion 0
Questions 14

Your organization requires all passwords be rotated every 90 days.

Where can you set this regulatory requirement?

Options:

A.  

Master Policy

B.  

Safe Templates

C.  

PVWAConfig.xml

D.  

Platform Configuration

Discussion 0
Questions 15

Your customer has five main data centers with one PVWA in each center under different URLs. How can you make this setup fault tolerant?

Options:

A.  

This setup is already fault tolerant

B.  

Install more PVWAs in each data center

C.  

Continuously monitor PVWA status and send users the link to another PVWA if issues are encountered

D.  

Load balance all PVWAs under same urL

Discussion 0
Questions 16

What is the purpose of the HeadStartlnterval setting m a platform?

Options:

A.  

It determines how far in advance audit data is collected tor reports

B.  

It instructs the CPM to initiate the password change process X number of days before expiration.

C.  

It instructs the AIM Provider to ‘skip the cache' during the defined time period

D.  

It alerts users of upcoming password changes x number of days before expiration.

Discussion 0
Questions 17

dbparm.ini is the main configuration file for the Vault.

Options:

A.  

True

B.  

False

Discussion 0
Questions 18

What is the purpose of a linked account?

Options:

A.  

To ensure that a particular collection of accounts all have the same password.

B.  

To ensure a particular set of accounts all change at the same time.

C.  

To connect the CPNI to a target system.

D.  

To allow more than one account to work together as part of a password management process.

Discussion 0
Questions 19

Which of the following Privileged Session Management solutions provide a detailed audit log of session activities?

Options:

A.  

PSM (i.e., launching connections by clicking on the "Connect" button in the PVWA)

B.  

PSM for Windows (previously known as RDP Proxy)

C.  

PSM for SSH (previously known as PSM SSH Proxy)

D.  

All of the above

Discussion 0
Questions 20

An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?

Options:

A.  

PSMConnect

B.  

PSMMaster

C.  

PSMGwUser

D.  

PSMAdminConnect

Discussion 0
Questions 21

When on-boarding account using Accounts Feed, Which of the following is true?

Options:

A.  

You must specify an existing Safe where are account will be stored when it is on boarded to the Vault

B.  

You can specify the name of a new sale that will be created where the account will be stored when it is on-boarded to the Vault.

C.  

You can specify the name of a new Platform that will be created and associated with the account

D.  

Any account that is on boarded can be automatically reconciled regardless of the platform it is associated with.

Discussion 0
Questions 22

The Password upload utility can be used to create safes.

Options:

A.  

TRUE

B.  

FALS

Discussion 0
Questions 23

Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?

Options:

A.  

Password change

B.  

Password reconciliation

C.  

Session suspension

D.  

Session termination

Discussion 0
Questions 24

Which of the following components can be used to create a tape backup of the Vault?

Options:

A.  

Disaster Recovery

B.  

Distributed Vaults

C.  

Replicate

D.  

High Availability

Discussion 0
Questions 25

Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.

Options:

A.  

Discovery and Audit (DMA)

B.  

Auto Detection (AD)

C.  

Export Vault Data (EVD)

D.  

On Demand Privileges Manager (OPM)

E.  

Accounts Discovery

Discussion 0
Questions 26

Which permissions are needed for the Active Directory user required by the Windows Discovery process?

Options:

A.  

Domain Admin

B.  

LDAP Admin

C.  

Read/Write

D.  

Read

Discussion 0
Questions 27

Which of the following PTA detections are included in the Core PAS offering?

Options:

A.  

Suspected Credential Theft

B.  

Over-Pass-The Hash

C.  

Golden Ticket

D.  

Unmanaged Privileged Access

Discussion 0
Questions 28

CyberArk user Neil is trying to connect to the Target Linux server 192.168.1.64 using a domain account ACME/linuxuser01 on Domain Acme.corp using PSM for SSH server 192.168.65.145. What is the correct syntax?

Options:

A.  

Ssh neil@linuxuser01:acme.corp@192.168.1.64@192.168.1.45

B.  

Ssh neil@linuxuser01#acme.corp@192.168.1.64@192.168.1.45

C.  

Ssh neil@linuxuser01@192.168.1.64@192.168.65.145

D.  

Ssh neil@linuxuser01@acme.corp@192.168.1.64@192.168.1.45

Discussion 0
Questions 29

Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire?

Options:

A.  

Privileged Accounts Inventory

B.  

Privileged Accounts Compliance Status

C.  

Activity Log

D.  

Privileged Accounts CPM Status

Discussion 0
Questions 30

To ensure all sessions are being recorded, a CyberArk administrator goes to the master policy and makes configuration changes.

Which configuration is correct?

Options:

A.  

Require privileged session monitoring and isolation = inactive; Record and save session activity = active.

B.  

Require privileged session monitoring and isolation = inactive; Record and save session activity = inactive.

C.  

Require privileged session monitoring and isolation = active; Record and save session activity = active.

D.  

Require privileged session monitoring and isolation = active; Record and save session activity = inactive.

Discussion 0
Questions 31

Which option in the Private Ark client is used to update users’ Vault group memberships?

Options:

A.  

Update > General tab

B.  

Update > Authorizations tab

C.  

Update > Member Of tab

D.  

Update > Group tab

Discussion 0