Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

ExamsBrite Dumps

CyberArk CDE Recertification Question and Answers

CyberArk CDE Recertification

Last Update Oct 15, 2025
Total Questions : 221

We are offering FREE PAM-CDE-RECERT CyberArk exam questions. All you do is to just go and sign up. Give your details, prepare PAM-CDE-RECERT free exam questions and then go for complete pool of CyberArk CDE Recertification test questions that will help you more.

PAM-CDE-RECERT pdf

PAM-CDE-RECERT PDF

$42  $104.99
PAM-CDE-RECERT Engine

PAM-CDE-RECERT Testing Engine

$50  $124.99
PAM-CDE-RECERT PDF + Engine

PAM-CDE-RECERT PDF + Testing Engine

$66  $164.99
Questions 1

What is the configuration file used by the CPM scanner when scanning UNIX/Linux devices?

Options:

A.  

UnixPrompts.ini

B.  

plink.exe

C.  

dbparm.ini

D.  

PVConfig.xml

Discussion 0
Questions 2

Which option in the PrivateArk client is used to update users' Vault group memberships?

Options:

A.  

Update > General tab

B.  

Update > Authorizations tab

C.  

Update > Member Of tab

D.  

Update > Group tab

Discussion 0
Questions 3

When creating Distributed Vault environment architecture, what is the maximum number of Vault servers that can be deployed''

Options:

A.  

5 - number of primary and satellite Vaults can be specified during installation

B.  

3- all primary

C.  

6-1 primary and 5 satellite

D.  

10-2 primary and 8 satellite

Discussion 0
Questions 4

A company requires challenge/response multi-factor authentication for PSMP sessions. Which server must you integrate with the CyberArk vault?

Options:

A.  

LDAP

B.  

PKI

C.  

SAML

D.  

RADIUS

Discussion 0
Questions 5

You have associated a logon account to one your UNIX cool accounts in the vault. When attempting to [b]change [/b] the root account’s password the CPM will…..

Options:

A.  

Log in to the system as root, then change root's password

B.  

Log in to the system as the logon account, then change roofs password

C.  

Log in to the system as the logon account, run the su command to log in as root, and then change root’s password.

D.  

None of these

Discussion 0
Questions 6

A Vault Administrator team member can log in to CyberArk, but for some reason, is not given Vault Admin rights.

Where can you check to verify that the Vault Admins directory mapping points to the correct AD group?

Options:

A.  

PVWA > User Provisioning > LDAP Integration > Mapping Criteria

B.  

PVWA > User Provisioning > LDAP Integration > Map Name

C.  

PVWA > Administration > LDAP Integration > Mappings

D.  

PVWA > Administration > LDAP Integration > AD Groups

Discussion 0
Questions 7

To enable the Automatic response “Add to Pending” within PTA when unmanaged credentials are found, what are the minimum permissions required by PTAUser for the PasswordManager_pending safe?

Options:

A.  

List Accounts, View Safe members, Add accounts (includes update properties), Update Account content, Update Account properties

B.  

List Accounts, Add accounts (includes update properties), Delete Accounts, Manage Safe

C.  

Add accounts (includes update properties), Update Account content, Update Account properties, View Audit

D.  

View Accounts, Update Account content, Update Account properties, Access Safe without confirmation, Manage Safe, View Audit

Discussion 0
Questions 8

What is a prerequisite step before CyberArk can be configured to support RADIUS authentication?

Options:

A.  

Log on to the PrivateArk Client, display the user properties of the user to configure, run the Authentication method drop-down list, and select RADIUS authentication.

B.  

In the RADIUS server, define the CyberArk Vault as RADIUS client/agent.

C.  

In the Vault Installation folder, run CAVaultManger as Administrator with the SecureSecretFiles command.

D.  

Navigate to /Server/Conf and open DBParms.ini and set the RadiusServersInfo parameter.

Discussion 0
Questions 9

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group Operations Staff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of Operations Managers never need to be able to use the show, copy or connect buttons themselves.

Which safe permission do you need to grant Operations Staff? Check all that apply.

Options:

A.  

Use Accounts

B.  

Retrieve Accounts

C.  

Authorize Password Requests

D.  

Access Safe without Authorization

Discussion 0
Questions 10

A logon account can be specified in the platform settings.

Options:

A.  

True

B.  

False

Discussion 0
Questions 11

You are installing HTML5 gateway on a Linux host using the RPM provided. After installing the Tomcat webapp, what is the next step in the installation process?

Options:

A.  

Deploy the HTML5 service (guacd)

B.  

Secure the connection between the guacd and the webapp

C.  

Secure the webapp and JWT validation endpoint

D.  

Configure ASLR

Discussion 0
Questions 12

For a safe with Object Level Access enabled you can turn off Object Level Access Control when it no longer needed on the safe.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 13

When a group is granted the 'Authorize Account Requests' permission on a safe Dual Control requests must be approved by

Options:

A.  

Any one person from that group

B.  

Every person from that group

C.  

The number of persons specified by the Master Policy

D.  

That access cannot be granted to groups

Discussion 0
Questions 14

CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 15

When a DR Vault Server becomes an active vault, it will automatically fail back to the original state once the Primary Vault comes back online.

Options:

A.  

True; this is the default behavior

B.  

False; this is not possible

C.  

True, if the AllowFailback setting is set to “yes” in the padr.ini file

D.  

True, if the AllowFailback setting is set to “yes” in the dbparm.ini file

Discussion 0
Questions 16

Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?

Options:

A.  

Accounts Discovery

B.  

Auto Detection

C.  

Onboarding RestAPI functions

D.  

PTA Rules

Discussion 0
Questions 17

To use PSM connections while in the PVWA, what are the minimum safe permissions a user or group will need?

Options:

A.  

List Accounts, Use Accounts

B.  

List Accounts, Use Accounts, Retrieve Accounts

C.  

Use Accounts

D.  

List Accounts, Use Accounts, Retrieve Accounts, Access Safe without confirmation

Discussion 0
Questions 18

Which values are acceptable in the address field of an Account?

Options:

A.  

It must be a Fully Qualified Domain Name (FQDN)

B.  

It must be an IP address

C.  

It must be NetBIOS name

D.  

Any name that is resolvable on the Central Policy Manager (CPM) server is acceptable

Discussion 0
Questions 19

Within the Vault each password is encrypted by:

Options:

A.  

the server key

B.  

the recovery public key

C.  

the recovery private key

D.  

its own unique key

Discussion 0
Questions 20

You are onboarding an account that is not supported out of the box.

What should you do first to obtain a platform to import?

Options:

A.  

Create a service ticket in the customer portal explaining the requirements of the custom platform.

B.  

Search common community portals like stackoverflow, reddit, github for an existing platform.

C.  

From the platforms page, uncheck the “Hide non-supported platforms” checkbox and see if a platform meeting your needs appears.

D.  

Visit the CyberArk marketplace and search for a platform that meets your needs.

Discussion 0
Questions 21

Arrange the steps to restore a Vault using PARestore for a Backup in the correct sequence.

Options:

Discussion 0
Questions 22

In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?

Options:

A.  

True.

B.  

False. Because the user can also enter credentials manually using Secure Connect.

C.  

False. Because if credentials are not stored in the vault, the PSM will log into the target device as PSM Connect.

D.  

False. Because if credentials are not stored in the vault, the PSM will prompt for credentials.

Discussion 0
Questions 23

Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)

Options:

A.  

Store the CD in a physical safe and mount the CD every time Vault maintenance is performed

B.  

Copy the entire contents of the CD to the system Safe on the Vault

C.  

Copy the entire contents of the CD to a folder on the Vault Server and secure it with NTFS permissions

D.  

Store the server key in a Hardware Security Module (HSM) and copy the rest the keys from the CD to a folder on the Vault Server and secure it with NTFS permissions

Discussion 0
Questions 24

To ensure all sessions are being recorded, a CyberArk administrator goes to the master policy and makes configuration changes.

Which configuration is correct?

Options:

A.  

Require privileged session monitoring and isolation = inactive; Record and save session activity = active.

B.  

Require privileged session monitoring and isolation = inactive; Record and save session activity = inactive.

C.  

Require privileged session monitoring and isolation = active; Record and save session activity = active.

D.  

Require privileged session monitoring and isolation = active; Record and save session activity = inactive.

Discussion 0
Questions 25

A Reconcile Account can be specified in the Master Policy.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 26

tsparm.ini is the main configuration file for the Vault.

Options:

A.  

True

B.  

False

Discussion 0
Questions 27

What is a prerequisite step betore CyberArk can be configured to support RADIUS authentication?

Options:

A.  

Log on to the PrivateArk Client display the User properties to the user to configure, run the Authentication method dropdown list and select Radius authentication.

B.  

In the RADIUS server define the CyberArk Vault as a RADIUS client/agent

C.  

In the Vault installation folder, run CAVaultManager as administrator with the SecureSecretFiles command

D.  

Navigate to /Server/Conf and open DBParm mi and set the RadiusServerslnfo parameter

Discussion 0
Questions 28

In addition to bit rate and estimated total duration of recordings per day, what is needed to determine the amount of storage required for PSM recordings?

Options:

A.  

Retention period

B.  

Number of PSMs

C.  

Number of users

D.  

Number of targets

Discussion 0
Questions 29

A new HTML5 Gateway has been deployed in your organization.

Where do you configure the PSM to use the HTML5 Gateway?

Options:

A.  

Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details > Add PSM Gateway

B.  

Administration > Options > Privileged Session Management > Add Configured PSM Gateway Servers

C.  

Administration > Options > Privileged Session Management > Configured PSM Servers > Add PSM Gateway

D.  

Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details

Discussion 0
Questions 30

Match the Status of Service on a DR Vault to what is displayed when it is operating normally in Replication mode.

Options:

Discussion 0
Questions 31

PSM captures a record of each command that was executed in Unix.

Options:

A.  

TRIE

B.  

FALSE

Discussion 0
Questions 32

Which pre-requisite step must be completed before installing a Vault?

Options:

A.  

Join the server to the domain

B.  

install a clean operating system

C.  

install anti-virus software

D.  

Copy the master CD to a folder on the Vault server

Discussion 0
Questions 33

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests.

Options:

A.  

HeadStartInterval

B.  

Interval

C.  

ImmediateInterval

D.  

The CPM does not change the password under this circumstance

Discussion 0
Questions 34

A Logon Account can be specified in the Master Policy.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 35

Which of the following properties are mandatory when adding accounts from a file? (Choose three.)

Options:

A.  

Safe Name

B.  

Platform ID

C.  

All required properties specified in the Platform

D.  

Username

E.  

Address

F.  

Hostname

Discussion 0
Questions 36

You want to generate a license capacity report.

Which tool accomplishes this?

Options:

A.  

Password Vault Web Access

B.  

PrivateArk Client

C.  

DiagnoseDB Report

D.  

RestAPI

Discussion 0
Questions 37

What is the easiest way to duplicate an existing platform?

Options:

A.  

From PrivateArk, copy/paste the appropriate Policy.ini file; then rename it.

B.  

From the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform and then click Duplicate; name the new platform.

C.  

From PrivateArk, copy/paste the appropriate settings in PVConfiguration.xml; then update the policyName variable.

D.  

From the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform, manually update the platform settings and click “Save as” INSTEAD of save to duplicate and rename the platform.

Discussion 0
Questions 38

Which components support fault tolerance.

Options:

A.  

CPM and PVWA

B.  

PVWA and PSM

C.  

PSM and PTA

D.  

CPM and PTA

Discussion 0
Questions 39

Match each component to its respective Log File location.

Options:

Discussion 0
Questions 40

Which usage can be added as a service account platform?

Options:

A.  

Kerberos Tokens

B.  

IIS Application Pools

C.  

PowerShell Libraries

D.  

Loosely Connected Devices

Discussion 0
Questions 41

A customer is moving from an on-premises to a public cloud deployment. What is the best and most cost-effective option to secure the server key?

Options:

A.  

Install the Vault in the cloud the same way that you would in an on-premises environment Place the server key in a password protected folder on the operating system

B.  

Install the Vault in the cloud the same way that you would in an on-premises environment Purchase a Hardware Security Module to secure the server key

C.  

Install the Vault using the Amazon Machine Images and secure the server key using native cloud Key Management Systems

D.  

Install the Vault using the Amazon Machine Images and secure the server key with a Hardware Security Module

Discussion 0
Questions 42

Accounts Discovery allows secure connections to domain controllers.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 43

Which utilities could you use to change debugging levels on the vault without having to restart the vault. Select all that apply.

Options:

A.  

PAR Agent

B.  

PrivateArk Server Central Administration

C.  

Edit DBParm.ini in a text editor.

D.  

Setup.exe

Discussion 0
Questions 44

You are helping a customer prepare a Windows server for PSM installation. What is required for a successful installation?

Options:

A.  

Window 2012 KB4558843

B.  

Remote Desktop services (RDS) Session Host Roles

C.  

Windows 2016 KB4558843

D.  

Remote Desktop services (RDS) Session Broker

Discussion 0
Questions 45

A user has successfully conducted a short PSM session and logged off. However, the user cannot access the Monitoring tab to view the recordings.

What is the issue?

Options:

A.  

The user must login as PSMAdminConnect

B.  

The PSM service is not running

C.  

The user is not a member of the PVWAMonitor group

D.  

The user is not a member of the Auditors group

Discussion 0
Questions 46

Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?

Options:

A.  

Password change

B.  

Password reconciliation

C.  

Session suspension

D.  

Session termination

Discussion 0
Questions 47

You are installing multiple PVWAs behind a load balancer. Which statement is correct?

Options:

A.  

Port 1858 must be opened between the load balancer and the PVWAs

B.  

The load balancer must be configured in DNS round robin.

C.  

The load balancer must support "sticky sessions".

D.  

The LoadBalancerClientAddressHeader parameter in the PVwA.ini file must be set.

Discussion 0
Questions 48

After installing the first PSM server and before installing additional PSM servers you must ensure the user performing the installation is not a direct owner of which safe?

Options:

A.  

PSMUnmanagedSessionAccounts Safe

B.  

PSMRecordmgsSessionAccounts Safe

C.  

PSMUnmanagedApphcationAccounts Safe

D.  

PSMSessionBackupAccounts Safe

Discussion 0
Questions 49

Users can be resulted to using certain CyberArk interfaces (e.g.PVWA or PACLI).

Options:

A.  

TRUE

B.  

FALS

Discussion 0
Questions 50

If the AccountUploader Utility is used to create accounts with SSH keys, which parameter do you use to set the full or relative path of the SSH private key file that will be attached to the account?

Options:

A.  

KeyPath

B.  

KeyFile

C.  

ObjectName

D.  

Address

Discussion 0
Questions 51

It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.

Options:

A.  

TRUE

B.  

FALS

Discussion 0
Questions 52

Customers who have the ‘Access Safe without confirmation’ safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 53

Match the log file name with the CyberArk Component that generates the log.

Options:

Discussion 0
Questions 54

Which of the following Privileged Session Management (PSM) solutions support live monitoring of active sessions?

Options:

A.  

PSM (i.e., launching connections by clicking on the connect button in the Password Vault Web Access (PVWA)

B.  

PSM for Windows (previously known as RDP Proxy)

C.  

PSM for SSH (previously known as PSM-SSH Proxy)

D.  

All of the above

Discussion 0
Questions 55

In the screenshot displayed, you just configured the usage in CyberArk and want to update its password.

What is the least intrusive way to accomplish this?

Options:

A.  

Use the “change” button on the usage’s details page.

B.  

Use the “change” button on the parent account’s details page.

C.  

Use the “sync” button on the usage’s details page.

D.  

Use the “reconcile” button on the parent account’s details page.

Discussion 0
Questions 56

What is mandatory for a PVWA installation?

Options:

A.  

A DNS entry for PVWA url must be created.

B.  

A company signed TLS certificate must be imported into the server

C.  

A vault Administrator user must be used to register the PVWA

D.  

Data Execution Prevention must be disabled.

Discussion 0
Questions 57

CyberArk recommends implementing object level access control on all Safes.

Options:

A.  

True

B.  

False

Discussion 0
Questions 58

You have been asked to turn off the time access restrictions for a safe.

Where is this setting found?

Options:

A.  

PrivateArk

B.  

RestAPI

C.  

Password Vault Web Access (PVWA)

D.  

Vault

Discussion 0
Questions 59

You have been asked to design the number of PVWAs a customer must deploy. The customer has three data centers with a distributed vault in each, requires high availability, and wants to use all vaults, at all times. How many PVWAs does the customer need?

Options:

A.  

six

B.  

four

C.  

two

D.  

three

Discussion 0
Questions 60

What is the chief benefit of PSM?

Options:

A.  

Privileged session isolation

B.  

Automatic password management

C.  

Privileged session recording

D.  

‘Privileged session isolation’ and ‘Privileged session recording’

Discussion 0
Questions 61

The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys.

How are these keys managed?

Options:

A.  

CyberArk stores Private keys in the Vault and updates Public keys on target systems.

B.  

CyberArk stores Public keys in the Vault and updates Private keys on target systems.

C.  

CyberArk does not store Public or Private keys and instead uses a reconcile account to create keys on demand.

D.  

CyberArk stores both Private and Public keys and can update target systems with either key.

Discussion 0
Questions 62

Target account platforms can be restricted to accounts that are stored m specific Safes using the Allowed Safes property.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 63

It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occur

Options:

A.  

TRUE

B.  

FALS

Discussion 0
Questions 64

Match each key to its recommended storage location.

Options:

Discussion 0
Questions 65

When a DR Vault Server becomes an active vault, it will automatically revert back to DR mode once the Primary Vault comes back online.

Options:

A.  

True; this is the default behavior

B.  

False, the Vault administrator must manually set the DR Vault to DR mode by setting “FailoverMode=no” in the padr.ini file

C.  

True, if the AllowFailback setting is set to “yes” in the padr.ini file

D.  

False, the Vault administrator must manually set the DR Vault to DR mode by setting “FailoverMode=no” in the dbparm.ini file

Discussion 0
Questions 66

Users who have the 'Access Safe without confirmation' safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0