CyberArk Sentry PAM
Last Update Dec 2, 2024
Total Questions : 136
We are offering FREE PAM-SEN CyberArk exam questions. All you do is to just go and sign up. Give your details, prepare PAM-SEN free exam questions and then go for complete pool of CyberArk Sentry PAM test questions that will help you more.
Which files does the Vault Installation Wizard prompt you for during the Vault install?
What authentication methods can be implemented to enforce Two-Factor Authentication (2FA) for users authenticating to CyberArk using both the PVWA (through the browser) and the PrivateArk Client?
You are installing a CPM.
In addition to Add Safes, Add/Update Users, Reset Users’ Passwords and Manage Server File Categories, which Vault authorization(s) does a CyberArk user need to install the CPM?
In which file must the attribute ‘SignAuthnRequest=”true”’ be added to the PartnerIdentityProvider element to support signed SAML requests?
When SAML authentication is used to sign in to the PVWA, which service performs the actual authentication?
What is the name of the account used to establish the initial RDP session from the end user client machine to the PSM server?
What is the recommended method to determine if a PVWA is unavailable and should be disabled in a load balancing pool?
In large-scale environments, it is important to enable the CPM to focus its search operations on specific Safes instead of scanning all Safes it sees in the Vault.
How is this accomplished?
You are installing multiple PVWAs behind a load balancer.
Which statement is correct?
Which file would you modify to configure the vault to send SNMP traps to your monitoring solution?
In order to avoid conflicts with the hardening process, third party applications like Antivirus and Backup Agents should be installed on the Vault server before installing the Vault.
When configuring RADIUS authentication, which utility is used to create a file containing an encrypted version of the RADIUS secret?
In addition to bit rate and estimated total duration of recordings per day, what is needed to determine the amount of storage required for PSM recordings?
Which of the following protocols need to be installed on a standalone vault server? Check all that apply.
The RemoteApp feature of PSM allows seamless Application windows (i e the Desktop of the PSM server will not be visible)
What is a prerequisite step before CyberArk can be configured to support RADIUS authentication?
In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.
You are setting up a Linux host to act as an HTML 5 gateway for PSM sessions.
Which servers need to be trusted by the Linux host to secure communications through the gateway?
After installing the first PSM server and before installing additional PSM servers, you must ensure the user performing the installation is not a direct owner of which safe?
The PrivateArk clients allows a user to view the contents of the vault like a filesystem.
A customer has three data centers distributed globally and wants highly-available PSM connections in each segmented zone. In addition, the customer needs a highly-available PSM connection for the CyberArk Admins.
What will best satisfy this customer's needs?
Which components can connect to a satellite Vault in a distributed Vault architecture?
What is determined by the "MaxConcurrentConnections" setting within a platform?
During the PSM installation process, Safes and a User are created.
In addition to Add Safes, Add/Update Users, Reset Users’ Passwords, and Activate Users, which authorization(s) does the Vault user installing the PSM need to enable them to be successfully created?
Which configuration file and Vault utility are used to migrate the server key to an HSM?
When a DR vault server becomes an active vault, it will automatically fail back to the original state once the primary vault comes back online.
A customer has five main data centers with one PVWA in each center under different URLs.
How can you make this setup fault tolerant?
Which of the following are supported authentication methods for CyberArk? Check all that apply
A vault admin received an email notification that a password verification process has failed Which service sent the message?
If a transparent user matches two different directory mappings, how does the system determine which user template to use?
You are installing the HTML5 gateway on a Linux host using the RPM provided.
After installing the Tomcat webapp, what is the next step in the installation process?
To enable LDAP over SSL for a Vault when DNS lookups are blocked, which step must be completed?