Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

PAM-DEF PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

PAM-DEF PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: CyberArk Defender - PAM
  • Last Update: Apr 28, 2024
  • Questions and Answers: 239
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

PAM-DEF Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

PAM-DEF Practice Exam Questions with Answers CyberArk Defender - PAM Certification

Question # 6

Your organization has a requirement to allow users to “check out passwords” and connect to targets with the same account through the PSM.

What needs to be configured in the Master policy to ensure this will happen?

A.

Enforce check-in/check-out exclusive access = active; Require privileged session monitoring and isolation = active

B.

Enforce check-in/check-out exclusive access = inactive; Require privileged session monitoring and isolation = inactive

C.

Enforce check-in/check-out exclusive access = inactive; Record and save session activity = active

D.

Enforce check-in/check-out exclusive access = active; Record and save session activity = inactive

Full Access
Question # 7

An auditor needs to login to the PSM in order to live monitor an active session. Which user ID is used to establish the RDP connection to the PSM server?

A.

PSMConnect

B.

PSMMaster

C.

PSMGwUser

D.

PSMAdminConnect

Full Access
Question # 8

Customers who have the ‘Access Safe without confirmation’ safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.

A.

TRUE

B.

FALSE

Full Access
Question # 9

To manage automated onboarding rules, a CyberArk user must be a member of which group?

A.

Vault Admins

B.

CPM User

C.

Auditors

D.

Administrators

Full Access
Question # 10

PSM captures a record of each command that was executed in Unix.

A.

TRIE

B.

FALSE

Full Access
Question # 11

What is the purpose of the CyberArk Event Notification Engine service?

A.

It sends email messages from the Central Policy Manager (CPM)

B.

It sends email messages from the Vault

C.

It processes audit report messages

D.

It makes Vault data available to components

Full Access
Question # 12

You are logging into CyberArk as the Master user to recover an orphaned safe.

Which items are required to log in as Master?

A.

Master CD, Master Password, console access to the Vault server, Private Ark Client

B.

Operator CD, Master Password, console access to the PVWA server, PVWA access

C.

Operator CD, Master Password, console access to the Vault server, Recover.exe

D.

Master CD, Master Password, console access to the PVWA server, Recover.exe

Full Access
Question # 13

Which of the following files must be created or configured m order to run Password Upload Utility? Select all that apply.

A.

PACli.ini

B.

Vault.ini

C.

conf.ini

D.

A comma delimited upload file

Full Access
Question # 14

Which PTA sensors are required to detect suspected credential theft?

A.

Logs, Vault Logs

B.

Logs, Network Sensor, Vault Logs

C.

Logs, PSM Logs, CPM Logs

D.

Logs, Network Sensor, EPM

Full Access
Question # 15

If PTA is integrated with a supported SIEM solution, which detection becomes available?

A.

unmanaged privileged account

B.

privileged access to the Vault during irregular days

C.

riskySPN

D.

exposed credentials

Full Access
Question # 16

You received a notification from one of your CyberArk auditors that they are missing Vault level audit permissions. You confirmed that all auditors are missing the Audit Users Vault permission.

Where do you update this permission for all auditors?

A.

Private Ark Client > Tools > Administrative Tools > Directory Mapping > Vault Authorizations

B.

Private Ark Client > Tools > Administrative Tools > Users and Groups > Auditors > Authorizations tab

C.

PVWA User Provisioning > LDAP integration > Vault Auditors Mapping > Vault Authorizations

D.

PVWA> Administration > Configuration Options > LDAP integration > Vault Auditors Mapping > Vault Authorizations

Full Access
Question # 17

Which permissions are needed for the Active Directory user required by the Windows Discovery process?

A.

Domain Admin

B.

LDAP Admin

C.

Read/Write

D.

Read

Full Access
Question # 18

What is the primary purpose of One Time Passwords?

A.

Reduced risk of credential theft

B.

More frequent password changes

C.

Non-repudiation (individual accountability)

D.

To force a 'collusion to commit' fraud ensuring no single actor may use a password without authorization.

Full Access
Question # 19

dbparm.ini is the main configuration file for the Vault.

A.

True

B.

False

Full Access
Question # 20

Which certificate type do you need to configure the vault for LDAP over SSL?

A.

the CA Certificate that signed the certificate used by the External Directory

B.

a CA signed Certificate for the Vault server

C.

a CA signed Certificate for the PVWA server

D.

a self-signed Certificate for the Vault

Full Access
Question # 21

If the AccountUploader Utility is used to create accounts with SSH keys, which parameter do you use to set the full or relative path of the SSH private key file that will be attached to the account?

A.

KeyPath

B.

KeyFile

C.

ObjectName

D.

Address

Full Access
Question # 22

To change the safe where recordings are kept for a specific platform, which setting must you update in the platform configuration?

A.

SessionRecorderSafe Most Voted

B.

SessionSafe

C.

RecordingsPath

D.

RecordingLocation

Full Access
Question # 23

It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.

A.

TRUE

B.

FALS

Full Access
Question # 24

For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.

A.

Create an exception to the Master Policy to exclude the group from the workflow process.

B.

Edith the master policy rule and modify the advanced’ Access safe without approval’ rule to include the group.

C.

On the safe in which the account is stored grant the group the’ Access safe without audit’ authorization.

D.

On the safe in which the account is stored grant the group the’ Access safe without confirmation’ authorization.

Full Access
Question # 25

How much disk space do you need on a server to run a full replication with PAReplicate?

A.

500 GB

B.

1 TB

C.

same as disk size on Satellite Vault

D.

at least the same disk size as the Primary Vault

Full Access
Question # 26

Which user is automatically added to all Safes and cannot be removed?

A.

Auditor

B.

Administrator

C.

Master

D.

Operator

Full Access
Question # 27

Which CyberArk group does a user need to be part of to view recordings or live monitor sessions?

A.

Auditors

B.

Vault Admin

C.

DR Users

D.

Operators

Full Access
Question # 28

What does the minvalidity parameter on a platform policy determine?

A.

time between a password retrieval and the account becoming eligible for a password change

B.

timeout for users signed into the PVWA as configured in the global settings

C.

minimum amount of time that Just in Time access is valid

D.

time in minutes before an empty safe will be automatically deleted

Full Access
Question # 29

When on-boarding account using Accounts Feed, Which of the following is true?

A.

You must specify an existing Safe where are account will be stored when it is on boarded to the Vault

B.

You can specify the name of a new sale that will be created where the account will be stored when it is on-boarded to the Vault.

C.

You can specify the name of a new Platform that will be created and associated with the account

D.

Any account that is on boarded can be automatically reconciled regardless of the platform it is associated with.

Full Access
Question # 30

One can create exceptions to the Master Policy based on ____________________.

A.

Safes

B.

Platforms

C.

Policies

D.

Accounts

Full Access
Question # 31

What is the easiest way to duplicate an existing platform?

A.

From PrivateArk, copy/paste the appropriate Policy.ini file; then rename it.

B.

From the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform and then click Duplicate; name the new platform.

C.

From PrivateArk, copy/paste the appropriate settings in PVConfiguration.xml; then update the policyName variable.

D.

From the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform, manually update the platform settings and click “Save as” INSTEAD of save to duplicate and rename the platform.

Full Access
Question # 32

Which Master Policy Setting must be active in order to have an account checked-out by one user for a pre-determined amount of time?

A.

Require dual control password access Approval

B.

Enforce check-in/check-out exclusive access

C.

Enforce one-time password access

D.

Enforce check-in/check-out exclusive access & Enforce one-time password access

Full Access
Question # 33

You are configuring a Vault HA cluster.

Which file should you check to confirm the correct drives have been assigned for the location of the Quorum and Safes data disks?

A.

ClusterVault.ini

B.

my.ini

C.

vault.ini

D.

DBParm.ini

Full Access
Question # 34

A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request.

What is the correct location to identify users or groups who can approve?

A.

PVWA> Administration > Platform Configuration > Edit Platform > UI & Workflow > Dual Control> Approvers

B.

PVWA> Policies > Access Control (Safes) > Safe Members > Workflow > Authorize Password Requests

C.

PVWA> Account List > Edit > Show Advanced Settings > Dual Control > Direct Managers

D.

PrivateArk > Admin Tools > Users and Groups > Auditors (Group Membership)

Full Access
Question # 35

By default, members of which built-in groups will be able to view and configure Automatic Remediation and Session Analysis and Response in the PVWA?

A.

Vault Admins

B.

Security Admins

C.

Security Operators

D.

Auditors

Full Access
Question # 36

When creating an onboarding rule, it will be executed upon .

A.

All accounts in the pending accounts list

B.

Any future accounts discovered by a discovery process

C.

Both “All accounts in the pending accounts list” and “Any future accounts discovered by a discovery process”

Full Access
Question # 37

Due to network activity, ACME Corp’s PrivateArk Server became active on the OR Vault while the Primary Vault was also running normally. All the components continued to point to the Primary Vault.

Which steps should you perform to restore DR replication to normal?

A.

Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

B.

Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

C.

Shutdown PrivateArk Server on Primary Vault > Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

D.

Shutdown PrivateArk Server on DR Vault > Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

Full Access
Question # 38

If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?

A.

Configure the Provider to change the password to match the Vault’s Password

B.

Associate a reconcile account and configure the platform to reconcile automatically

C.

Associate a logon account and configure the platform to reconcile automatically

D.

Run the correct auto detection process to rediscover the password

Full Access
Question # 39

When should vault keys be rotated?

A.

when it is copied to file systems outside the vault

B.

annually

C.

whenever a CyberArk user leaves the organization

D.

when migrating to a new data center

Full Access
Question # 40

What are the minimum permissions to add multiple accounts from a file when using PVWA bulk-upload? (Choose three.)

A.

add accounts

B.

rename accounts

C.

update account content

D.

update account properties

E.

view safe members

F.

add safes

Full Access
Question # 41

Which parameter controls how often the CPM looks for Soon-to-be-expired Passwords that need to be changed.

A.

HeadStartInterval

B.

Interval

C.

ImmediateInterval

D.

The CPM does not change the password under this circumstance

Full Access
Question # 42

The System safe allows access to the Vault configuration files.

A.

TRUE

B.

FALS

Full Access
Question # 43

For Digital Vault Cluster in a high availability configuration, how does the cluster determine if a node is down?

A.

The heartbeat s no longer detected on the private network.

B.

The shared storage array is offline.

C.

An alert is generated in the Windows Event log.

D.

The Digital Vault Cluster does not detect a node failure.

Full Access
Question # 44

You want to build a connector that connects to a website through the Web applications for PSM framework.

Which default connector do you duplicate and modify?

A.

PSM-ChromeSample

B.

PSM-WebForm

C.

PSM-WebApp

D.

PSM-WebAppSample

Full Access
Question # 45

A password compliance audit found:

1) One-time password access of 20 domain accounts that are members of Domain Admins group in Active Directory are not being enforced.

2) All the sessions of connecting to domain controllers are not being recorded by CyberArk PSM.

What should you do to address these findings?

A.

Edit the Master Policy and add two policy exceptions: enable "Enforce one-time password access", enable "Record and save session activity".

B.

Edit safe properties and add two policy exceptions: enable "Enforce one-time password access", enable "Record and save session activity".

C.

Edit CPM Settings and add two policy exceptions: enable "Enforce one-time password access", enable "Record and save session activity".

D.

Contact the Windows Administrators and request them to add two policy exceptions at Active Directory Level: enable "Enforce one-time password access", enable "Record and save session activity".

Full Access
Question # 46

When a DR Vault Server becomes an active vault, it will automatically fail back to the original state once the Primary Vault comes back online.

A.

True; this is the default behavior

B.

False; this is not possible

C.

True, if the AllowFailback setting is set to “yes” in the padr.ini file

D.

True, if the AllowFailback setting is set to “yes” in the dbparm.ini file

Full Access
Question # 47

What does the Export Vault Data (EVD) utility do?

A.

exports data from the Vault to TXT or CSV files, or to MSSQL databases

B.

generates a backup file that can be used as a cold backup

C.

exports all passwords and imports them into another instance of CyberArk

D.

keeps two active vaults in sync

Full Access
Question # 48

A Vault Administrator team member can log in to CyberArk, but for some reason, is not given Vault Admin rights.

Where can you check to verify that the Vault Admins directory mapping points to the correct AD group?

A.

PVWA > User Provisioning > LDAP Integration > Mapping Criteria

B.

PVWA > User Provisioning > LDAP Integration > Map Name

C.

PVWA > Administration > LDAP Integration > Mappings

D.

PVWA > Administration > LDAP Integration > AD Groups

Full Access
Question # 49

Which accounts can be selected for use in the Windows discovery process? (Choose two.)

A.

an account stored in the Vault

B.

an account specified by the user

C.

the Vault Administrator

D.

any user with Auditor membership

E.

the PasswordManager user

Full Access
Question # 50

Secure Connect provides the following. Choose all that apply.

A.

PSM connections to target devices that are not managed by CyberArk.

B.

Session Recording

C.

Real-time live session monitoring.

D.

PSM connections from a terminal without the need to login to the PVWA

Full Access
Question # 51

You have been asked to identify the up or down status of Vault services.

Which CyberArk utility can you use to accomplish this task?

A.

Vault Replicator

B.

PAS Reporter

C.

Remote Control Agent

D.

Syslog

Full Access
Question # 52

Which of the following properties are mandatory when adding accounts from a file? (Choose three.)

A.

Safe Name

B.

Platform ID

C.

All required properties specified in the Platform

D.

Username

E.

Address

F.

Hostname

Full Access
Question # 53

What is the configuration file used by the CPM scanner when scanning UNIX/Linux devices?

A.

UnixPrompts.ini

B.

plink.exe

C.

dbparm.ini

D.

PVConfig.xml

Full Access
Question # 54

It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occur

A.

TRUE

B.

FALS

Full Access
Question # 55

Match each permission to where it can be found.

PAM-DEF question answer

Full Access
Question # 56

The vault supports Subnet Based Access Control.

A.

TRUE

B.

FALSE

Full Access
Question # 57

Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”?

A.

Add to Pending

B.

Rotate Credentials

C.

Reconcile Credentials

D.

Disable Account

Full Access
Question # 58

Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.

A.

Discovery and Audit (DMA)

B.

Auto Detection (AD)

C.

Export Vault Data (EVD)

D.

On Demand Privileges Manager (OPM)

E.

Accounts Discovery

Full Access
Question # 59

When an account is unable to change its own password, how can you ensure that password reset with the reconcile account is performed each time instead of a change?

A.

Set the parameter RCAllowManualReconciliation to Yes.

B.

Set the parameter ChangePasswordinResetMade to Yes.

C.

Set the parameter IgnoreReconcileOnMissingAccount to No.

D.

Set the UnlockUserOnReconcile to Yes.

Full Access
Question # 60

Which of the following options is not set in the Master Policy?

A.

Password Expiration Time

B.

Enabling and Disabling of the Connection Through the PSM

C.

Password Complexity

D.

The use of “One-Time-Passwords”

Full Access
Question # 61

What are the mandatory fields when onboarding from Pending Accounts? (Choose two.)

A.

Address

B.

Safe

C.

Account Description

D.

Platform

E.

CPM

Full Access
Question # 62

What is the purpose of the PrivateArk Database service?

A.

Communicates with components

B.

Sends email alerts from the Vault

C.

Executes password changes

D.

Maintains Vault metadata

Full Access
Question # 63

The primary purpose of exclusive accounts is to ensure non-repudiation (Individual accountability).

A.

TRUE

B.

FALS

Full Access
Question # 64

VAULT authorizations may be granted to_____.

A.

Vault Users

B.

Vault Groups

C.

LDAP Users

D.

LDAP Groups

Full Access
Question # 65

Which command configures email alerts within PTA if settings need to be changed post install?

A.

/opt/tomcat/utility/emailConfiguration.sh

B.

/opt/PTA/emailConfiguration.sh

C.

/opt/PTA/utility/emailConfig.sh

D.

/opt/tomcat/utility/emailSetup.sh

Full Access
Question # 66

You are creating a new Rest API user that utilizes CyberArk Authentication.

What is a correct process to provision this user?

A.

Private Ark Client > Tools > Administrative Tools > Users and Groups > New > User

B.

Private Ark Client > Tools > Administrative Tools > Directory Mapping > Add

C.

PVWA > User Provisioning > LDAP Integration > Add Mapping

D.

PVWA > User Provisioning > Users and Groups > New > User

Full Access
Question # 67

When a DR Vault Server becomes an active vault, it will automatically revert back to DR mode once the Primary Vault comes back online.

A.

True; this is the default behavior

B.

False, the Vault administrator must manually set the DR Vault to DR mode by setting “FailoverMode=no” in the padr.ini file

C.

True, if the AllowFailback setting is set to “yes” in the padr.ini file

D.

False, the Vault administrator must manually set the DR Vault to DR mode by setting “FailoverMode=no” in the dbparm.ini file

Full Access
Question # 68

It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur

A.

TRUE

B.

FALSE

Full Access
Question # 69

You have been asked to turn off the time access restrictions for a safe.

Where is this setting found?

A.

PrivateArk

B.

RestAPI

C.

Password Vault Web Access (PVWA)

D.

Vault

Full Access
Question # 70

A new HTML5 Gateway has been deployed in your organization.

From the PVWA, arrange the steps to configure a PSM host to use the HTML5 Gateway in the correct sequence.

PAM-DEF question answer

Full Access
Question # 71

Arrange the steps to restore a Vault using PARestore for a Backup in the correct sequence.

PAM-DEF question answer

Full Access
Question # 72

Which of the following PTA detections require the deployment of a Network Sensor or installing the PTA Agent on the domain controller?

A.

Suspected credential theft

B.

Over-Pass-The-Hash

C.

Golden Ticket

D.

Unmanaged privileged access

Full Access