Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CyberArk Defender - PAM Question and Answers

CyberArk Defender - PAM

Last Update Apr 28, 2024
Total Questions : 239

We are offering FREE PAM-DEF CyberArk exam questions. All you do is to just go and sign up. Give your details, prepare PAM-DEF free exam questions and then go for complete pool of CyberArk Defender - PAM test questions that will help you more.

PAM-DEF pdf

PAM-DEF PDF

$35  $99.99
PAM-DEF Engine

PAM-DEF Testing Engine

$42  $119.99
PAM-DEF PDF + Engine

PAM-DEF PDF + Testing Engine

$56  $159.99
Questions 1

You are creating a new Rest API user that utilizes CyberArk Authentication.

What is a correct process to provision this user?

Options:

A.  

Private Ark Client > Tools > Administrative Tools > Users and Groups > New > User

B.  

Private Ark Client > Tools > Administrative Tools > Directory Mapping > Add

C.  

PVWA > User Provisioning > LDAP Integration > Add Mapping

D.  

PVWA > User Provisioning > Users and Groups > New > User

Discussion 0
Questions 2

A user with administrative privileges to the vault can only grant other users privileges that he himself has.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 3

You have been asked to create an account group and assign three accounts which belong to a cluster. When you try to create a new group, you receive an unauthorized error; however, you are able to edit other aspects of the account properties.

Which safe permission do you need to manage account groups?

Options:

A.  

create folders Most Voted

B.  

specify next account content

C.  

rename accounts

D.  

manage safe

Discussion 0
Questions 4

A user needs to view recorded sessions through the PVWA.

Without giving auditor access, which safes does a user need access to view PSM recordings? (Choose two.)

Options:

A.  

Recordings safe

B.  

Safe the account is in

C.  

System safe

D.  

PVWAConfiguration safe

E.  

VaultInternal safe

Discussion 0
Questions 5

What is the primary purpose of One Time Passwords?

Options:

A.  

Reduced risk of credential theft

B.  

More frequent password changes

C.  

Non-repudiation (individual accountability)

D.  

To force a 'collusion to commit' fraud ensuring no single actor may use a password without authorization.

Discussion 0
Questions 6

Which usage can be added as a service account platform?

Options:

A.  

Kerberos Tokens

B.  

IIS Application Pools

C.  

PowerShell Libraries

D.  

Loosely Connected Devices

Discussion 0
Questions 7

What are the minimum permissions to add multiple accounts from a file when using PVWA bulk-upload? (Choose three.)

Options:

A.  

add accounts

B.  

rename accounts

C.  

update account content

D.  

update account properties

E.  

view safe members

F.  

add safes

Discussion 0
Questions 8

What is the purpose of the password change process?

Options:

A.  

To test that CyberArk is storing accurate credentials for accounts

B.  

To change the password of an account according to organizationally defined password rules

C.  

To allow CyberArk to manage unknown or lost credentials

D.  

To generate a new complex password

Discussion 0
Questions 9

A user is receiving the error message “ITATS006E Station is suspended for User jsmith” when attempting to sign into the Password Vault Web Access (PVWA). Which utility would a Vault administrator use to correct this problem?

Options:

A.  

createcredfile.exe

B.  

cavaultmanager.exe

C.  

PrivateArk

D.  

PVWA

Discussion 0
Questions 10

Which is the primary purpose of exclusive accounts?

Options:

A.  

Reduced risk of credential theft

B.  

More frequent password changes

C.  

Non-repudiation (individual accountability)

D.  

To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorization

Discussion 0
Questions 11

Which of these accounts onboarding methods is considered proactive?

Options:

A.  

Accounts Discovery

B.  

Detecting accounts with PTA

C.  

A Rest API integration with account provisioning software

D.  

A DNA scan

Discussion 0
Questions 12

You are configuring a Vault HA cluster.

Which file should you check to confirm the correct drives have been assigned for the location of the Quorum and Safes data disks?

Options:

A.  

ClusterVault.ini

B.  

my.ini

C.  

vault.ini

D.  

DBParm.ini

Discussion 0
Questions 13

In the Private Ark client under the Tools menu > Administrative Tools > Users and Groups, which option do you use to update users’ Vault group memberships?

Options:

A.  

Update > General tab

B.  

Update > Authorizations tab

C.  

Update > Member Of tab

D.  

Update > Group tab

Discussion 0
Questions 14

You are creating a Dual Control workflow for a team’s safe.

Which safe permissions must you grant to the Approvers group?

Options:

A.  

List accounts, Authorize account request

B.  

Retrieve accounts, Access Safe without confirmation

C.  

Retrieve accounts, Authorize account request

D.  

List accounts, Unlock accounts

Discussion 0
Questions 15

A new domain controller has been added to your domain. You need to ensure the CyberArk infrastructure can use the new domain controller for authentication.

Which locations must you update?

Options:

A.  

on the Vault server in Windows\System32\Etc\Hosts and in the PVWA Application under Administration > LDAP Integration > Directories > Hosts

B.  

on the Vault server in Windows\System32\Etc\Hosts and on the PVWA server in Windows\System32\Etc\Hosts

C.  

in the Private Ark client under Tools > Administrative Tools > Directory Mapping

D.  

on the Vault server in the certificate store and on the PVWA server in the certificate store

Discussion 0
Questions 16

The password upload utility must run from the CPM server

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 17

Match the built-in Vault User with the correct definition.

Options:

Discussion 0
Questions 18

The System safe allows access to the Vault configuration files.

Options:

A.  

TRUE

B.  

FALS

Discussion 0
Questions 19

What is required to enable access over SSH to a Unix account through both PSM and PSMP?

Options:

A.  

The platform must contain connection components for PSM-SSH and PSMP-SSH.

B.  

PSM and PSMP must already have stored the SSH Fingerprint for the Unix host.

C.  

The 'Enable PSMP' setting in the Unix platform must be set to Yes.

D.  

A duplicate platform (Called) with the PSMP settings must be created.

Discussion 0
Questions 20

Which accounts can be selected for use in the Windows discovery process? (Choose two.)

Options:

A.  

an account stored in the Vault

B.  

an account specified by the user

C.  

the Vault Administrator

D.  

any user with Auditor membership

E.  

the PasswordManager user

Discussion 0
Questions 21

Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”?

Options:

A.  

Add to Pending

B.  

Rotate Credentials

C.  

Reconcile Credentials

D.  

Disable Account

Discussion 0
Questions 22

What is the name of the Platform parameters that controls how long a password will stay valid when One Time Passwords are enabled via the Master Policy?

Options:

A.  

Min Validity Period

B.  

Interval

C.  

Immediate Interval

D.  

Timeout

Discussion 0
Questions 23

What is the primary purpose of Dual Control?

Options:

A.  

Reduced risk of credential theft

B.  

More frequent password changes

C.  

Non-repudiation (individual accountability)

D.  

To force a 'collusion to commit' fraud ensuring no single actor may use a password without authorization.

Discussion 0
Questions 24

You have been given the requirement that certain accounts cannot have their passwords updated during business hours.

How can you set up a configuration to meet this requirement?

Options:

A.  

Change settings on the CPM configuration safe so that access is permitted after business hours only.

B.  

Update the password change parameters of the platform to match the permitted time frame.

C.  

Disable automatic CPM management for all accounts that are assigned to this platform.

D.  

Add an exception to the Master Policy to allow the action for this platform during the permitted time.

Discussion 0
Questions 25

Which of the following files must be created or configured m order to run Password Upload Utility? Select all that apply.

Options:

A.  

PACli.ini

B.  

Vault.ini

C.  

conf.ini

D.  

A comma delimited upload file

Discussion 0
Questions 26

It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 27

PTA can automatically suspend sessions if suspicious activities are detected in a privileged session, but only if the session is made via the CyberArk PSM.

Options:

A.  

True

B.  

False, the PTA can suspend sessions whether the session is made via the PSM or not

Discussion 0
Questions 28

A new HTML5 Gateway has been deployed in your organization.

Where do you configure the PSM to use the HTML5 Gateway?

Options:

A.  

Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details > Add PSM Gateway

B.  

Administration > Options > Privileged Session Management > Add Configured PSM Gateway Servers

C.  

Administration > Options > Privileged Session Management > Configured PSM Servers > Add PSM Gateway

D.  

Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details

Discussion 0
Questions 29

Which report provides a list of account stored in the vault.

Options:

A.  

Privileged Accounts Inventory

B.  

Privileged Accounts Compliance Status

C.  

Entitlement Report

D.  

Active Log

Discussion 0
Questions 30

Which parameter controls how often the CPM looks for Soon-to-be-expired Passwords that need to be changed.

Options:

A.  

HeadStartInterval

B.  

Interval

C.  

ImmediateInterval

D.  

The CPM does not change the password under this circumstance

Discussion 0
Questions 31

A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request.

What is the correct location to identify users or groups who can approve?

Options:

A.  

PVWA> Administration > Platform Configuration > Edit Platform > UI & Workflow > Dual Control> Approvers

B.  

PVWA> Policies > Access Control (Safes) > Safe Members > Workflow > Authorize Password Requests

C.  

PVWA> Account List > Edit > Show Advanced Settings > Dual Control > Direct Managers

D.  

PrivateArk > Admin Tools > Users and Groups > Auditors (Group Membership)

Discussion 0
Questions 32

To manage automated onboarding rules, a CyberArk user must be a member of which group?

Options:

A.  

Vault Admins

B.  

CPM User

C.  

Auditors

D.  

Administrators

Discussion 0
Questions 33

Accounts Discovery allows secure connections to domain controllers.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 34

Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire?

Options:

A.  

Privileged Accounts Inventory

B.  

Privileged Accounts Compliance Status

C.  

Activity Log

D.  

Privileged Accounts CPM Status

Discussion 0
Questions 35

Match each component to its respective Log File location.

Options:

Discussion 0
Questions 36

Which item is an option for PSM recording customization?

Options:

A.  

Windows events text recorder with automatic play-back

B.  

Windows events text recorder and universal keystrokes recording simultaneously

C.  

Universal keystrokes text recorder with windows events text recorder disabled

D.  

Custom audio recording for windows events

Discussion 0
Questions 37

Which Vault authorization does a user need to have assigned to able to generate the "Entitlement Report" from the reports page in PVWA? (Choose two.)

Options:

A.  

Manage Users

B.  

Audit Users

C.  

Read Activity

D.  

View Entitlements

E.  

List Accounts

Discussion 0
Questions 38

According to CyberArk, which issues most commonly cause installed components to display as disconnected in the System Health Dashboard? (Choose two.)

Options:

A.  

network instabilities/outages

B.  

vault license expiry

C.  

credential de-sync

D.  

browser compatibility issues

E.  

installed location file corruption

Discussion 0
Questions 39

Arrange the steps to restore a Vault using PARestore for a Backup in the correct sequence.

Options:

Discussion 0
Questions 40

As long as you are a member of the Vault Admins group you can grant any permission on any safe.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 41

Your organization requires all passwords be rotated every 90 days.

Where can you set this regulatory requirement?

Options:

A.  

Master Policy

B.  

Safe Templates

C.  

PVWAConfig.xml

D.  

Platform Configuration

Discussion 0
Questions 42

Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)

Options:

A.  

Store the CD in a physical safe and mount the CD every time Vault maintenance is performed

B.  

Copy the entire contents of the CD to the system Safe on the Vault

C.  

Copy the entire contents of the CD to a folder on the Vault Server and secure it with NTFS permissions

D.  

Store the server key in a Hardware Security Module (HSM) and copy the rest the keys from the CD to a folder on the Vault Server and secure it with NTFS permissions

Discussion 0
Questions 43

If a user is a member of more than one group that has authorizations on a safe, by default that user is granted________.

Options:

A.  

the vault will not allow this situation to occur.

B.  

only those permissions that exist on the group added to the safe first.

C.  

only those permissions that exist in all groups to which the user belongs.

D.  

the cumulative permissions of all groups to which that user belongs.

Discussion 0
Questions 44

What does the minvalidity parameter on a platform policy determine?

Options:

A.  

time between a password retrieval and the account becoming eligible for a password change

B.  

timeout for users signed into the PVWA as configured in the global settings

C.  

minimum amount of time that Just in Time access is valid

D.  

time in minutes before an empty safe will be automatically deleted

Discussion 0
Questions 45

What is the maximum number of levels of authorization you can set up in Dual Control?

Options:

A.  

1

B.  

2

C.  

3

D.  

4

Discussion 0
Questions 46

Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.

Options:

A.  

Discovery and Audit (DMA)

B.  

Auto Detection (AD)

C.  

Export Vault Data (EVD)

D.  

On Demand Privileges Manager (OPM)

E.  

Accounts Discovery

Discussion 0
Questions 47

Assuming a safe has been configured to be accessible during certain hours of the day, a Vault Admin may still access that safe outside of those hours.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 48

Select the best practice for storing the Master CD.

Options:

A.  

Copy the files to the Vault server and discard the CD

B.  

Copy the contents of the CD to a Hardware Security Module (HSM) and discard the CD

C.  

Store the CD in a secure location, such as a physical safe

D.  

Store the CD in a secure location, such as a physical safe, and copy the contents of the CD to a folder secured with NTFS permissions on the Vault

Discussion 0
Questions 49

A new HTML5 Gateway has been deployed in your organization.

From the PVWA, arrange the steps to configure a PSM host to use the HTML5 Gateway in the correct sequence.

Options:

Discussion 0
Questions 50

Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?

Options:

A.  

Password change

B.  

Password reconciliation

C.  

Session suspension

D.  

Session termination

Discussion 0
Questions 51

dbparm.ini is the main configuration file for the Vault.

Options:

A.  

True

B.  

False

Discussion 0
Questions 52

In your organization the “click to connect” button is not active by default.

How can this feature be activated?

Options:

A.  

Policies > Master Policy > Allow EPV transparent connections > Inactive

B.  

Policies > Master Policy > Session Management > Require privileged session monitoring and isolation > Add Exception

C.  

Policies > Master Policy > Allow EPV transparent connections > Active

D.  

Policies > Master Policy > Password Management

Discussion 0
Questions 53

Ad-Hoc Access (formerly Secure Connect) provides the following features. Choose all that apply.

Options:

A.  

PSM connections to target devices that are not managed by CyberArk.

B.  

Session Recording.

C.  

Real-time live session monitoring.

D.  

PSM connections from a terminal without the need to login to the PVWA.

Discussion 0
Questions 54

You want to give a newly-created group rights to review security events under the Security pane. You also want to be able to update the status of these events.

Where must you update the group to allow this?

Options:

A.  

in the PTAAuthorizationGroups parameter, found in Administration > Options > PTA

B.  

in the PTAAuthorizationGroups parameter, found in Administration > Options > General

C.  

in the SecurityEventsAuthorizationGroups parameter, found in Administration > Security > Options

D.  

in the SecurityEventsFeedAuthorizationGroups parameter, found in Administration > Options > General

Discussion 0
Questions 55

Which values are acceptable in the address field of an Account?

Options:

A.  

It must be a Fully Qualified Domain Name (FQDN)

B.  

It must be an IP address

C.  

It must be NetBIOS name

D.  

Any name that is resolvable on the Central Policy Manager (CPM) server is acceptable

Discussion 0
Questions 56

When a DR Vault Server becomes an active vault, it will automatically fail back to the original state once the Primary Vault comes back online.

Options:

A.  

True; this is the default behavior

B.  

False; this is not possible

C.  

True, if the AllowFailback setting is set to “yes” in the padr.ini file

D.  

True, if the AllowFailback setting is set to “yes” in the dbparm.ini file

Discussion 0
Questions 57

Target account platforms can be restricted to accounts that are stored m specific Safes using the Allowed Safes property.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 58

When are external vault users and groups synchronized by default?

Options:

A.  

They are synchronized once every 24 hours between 1 AM and 5 AM. Most Voted

B.  

They are synchronized once every 24 hours between 7 PM and 12 AM.

C.  

They are synchronized every 2 hours.

D.  

They are not synchronized according to a specific schedule.

Discussion 0
Questions 59

In a rule using “Privileged Session Analysis and Response” in PTA, which session options are available to configure as responses to activities?

Options:

A.  

Suspend, Terminate, None

B.  

Suspend, Terminate, Lock Account

C.  

Pause, Terminate, None

D.  

Suspend, Terminate

Discussion 0
Questions 60

When the CPM connects to a database, which interface is most commonly used?

Options:

A.  

Kerberos

B.  

ODBC

C.  

VBScript

D.  

Sybase

Discussion 0
Questions 61

tsparm.ini is the main configuration file for the Vault.

Options:

A.  

True

B.  

False

Discussion 0
Questions 62

When creating an onboarding rule, it will be executed upon .

Options:

A.  

All accounts in the pending accounts list

B.  

Any future accounts discovered by a discovery process

C.  

Both “All accounts in the pending accounts list” and “Any future accounts discovered by a discovery process”

Discussion 0
Questions 63

When Dual Control is enabled a user must first submit a request in the Password Vault Web Access (PVWA) and receive approval before being able to launch a secure connection via PSM for Windows (previously known as RDP Proxy).

Options:

A.  

True

B.  

False, a user can submit the request after the connection has already been initiated via the PSM for Windows

Discussion 0
Questions 64

What must you specify when configuring a discovery scan for UNIX? (Choose two.)

Options:

A.  

Vault Administrator

B.  

CPM Scanner

C.  

root password for each machine

D.  

list of machines to scan

E.  

safe for discovered accounts

Discussion 0
Questions 65

Which CyberArk utility allows you to create lists of Master Policy Settings, owners and safes for output to text files or MSSQL databases?

Options:

A.  

Export Vault Data

B.  

Export Vault Information

C.  

PrivateArk Client

D.  

Privileged Threat Analytics

Discussion 0
Questions 66

Which of the following PTA detections are included in the Core PAS offering?

Options:

A.  

Suspected Credential Theft

B.  

Over-Pass-The Hash

C.  

Golden Ticket

D.  

Unmanaged Privileged Access

Discussion 0
Questions 67

During a High Availability node switch you notice an error and the Cluster Vault Manager Utility fails back to the original node.

Which log files should you check to investigate the cause of the issue? (Choose three.)

Options:

A.  

CyberArk Webconsole.log

B.  

VaultD

B.  

log

C.  

PM_Error.log

D.  

ITALog.log

E.  

ClusterVault.console.log

F.  

logiccontainer.log

Discussion 0
Questions 68

You have been asked to turn off the time access restrictions for a safe.

Where is this setting found?

Options:

A.  

PrivateArk Client

B.  

RestAPI

C.  

PVWA

D.  

Vault

Discussion 0
Questions 69

When should vault keys be rotated?

Options:

A.  

when it is copied to file systems outside the vault

B.  

annually

C.  

whenever a CyberArk user leaves the organization

D.  

when migrating to a new data center

Discussion 0
Questions 70

Due to network activity, ACME Corp’s PrivateArk Server became active on the OR Vault while the Primary Vault was also running normally. All the components continued to point to the Primary Vault.

Which steps should you perform to restore DR replication to normal?

Options:

A.  

Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

B.  

Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

C.  

Shutdown PrivateArk Server on Primary Vault > Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

D.  

Shutdown PrivateArk Server on DR Vault > Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

Discussion 0
Questions 71

Vault admins must manually add the auditors group to newly created safes so auditors will have sufficient access to run reports.

Options:

A.  

TRUE

B.  

FALSE

Discussion 0
Questions 72

When managing SSH keys, the CPM stored the Private Key

Options:

A.  

In the Vault

B.  

On the target server

C.  

A & B

D.  

Nowhere because the private key can always be generated from the public key.

Discussion 0