CyberArk Defender – PAM

Here you have the best CyberArk PAM-DEF practice exam questions

  • You have 113 total questions to study from
  • Each page has 5 questions, making a total of 23 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on December 15, 2024
Question 1 of 113

What do you need on the Vault to support LDAP over SSL?

    Correct Answer: A

    To support LDAP over SSL on the Vault, you need the CA Certificate(s) that were used to sign the External Directory certificate. This ensures that the Vault can establish a secure connection with the external directory by validating the certificate chain.

Question 2 of 113

You are troubleshooting a PVWA slow response.

Which log files should you analyze first? (Choose two.)

    Correct Answer: C, D

    To troubleshoot a slow response in the PVWA (Privileged Vault Web Access), you should analyze the CyberArk.WebApplication.log and CyberArk.WebConsole.log files. These logs contain relevant information about the web application and console interactions, which are critical for identifying performance issues.

Question 3 of 113

What is the easiest way to duplicate an existing platform?

    Correct Answer: B

    The easiest way to duplicate an existing platform is to navigate to the platforms page through the PVWA, select an existing platform that is similar to the new target account platform, and then click Duplicate. This method streamlines the process by providing a built-in feature specifically for duplicating platforms and allows the user to name the new platform immediately, minimizing manual steps.

Question 4 of 113

DRAG DROP -

Match each key to its recommended storage location.

    Correct Answer:

    For optimal security based on standard practices: The Recovery Private Key should be stored in a Physical Safe to ensure it is kept secure from digital threats. The Recovery Public Key can be stored on the Vault Server Disk Drive, as it generally does not require the same level of protection as private keys. The Server Key should be stored in a Hardware Security Module (HSM) to provide strong protection and management for cryptographic keys. Lastly, SSH Keys should be stored in the Vault to protect them securely and allow for controlled access and management.

Question 5 of 113

Due to corporate storage constraints, you have been asked to disable session monitoring and recording for 500 testing accounts used for your lab environment.

How do you accomplish this?

    Correct Answer: A

    To disable session monitoring and recording for specific accounts, you need to add exceptions to the master policy for the relevant platforms. This allows you to selectively disable these features rather than applying the changes across all platforms or configurations indiscriminately. Hence, the correct approach is to access the Master Policy, select Session Management, add Exceptions to the platform(s), and disable Session Monitoring and Recording policies.