Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

CyberArk Defender - PAM

Last Update 5 hours ago Total Questions : 239

The CyberArk Defender - PAM content is now fully updated, with all current exam questions added 5 hours ago. Deciding to include PAM-DEF practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our PAM-DEF exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these PAM-DEF sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CyberArk Defender - PAM practice test comfortably within the allotted time.

Question # 4

Within the Vault each password is encrypted by:

A.

the server key

B.

the recovery public key

C.

the recovery private key

D.

its own unique key

Question # 5

What is the purpose of the Interval setting in a CPM policy?

A.

To control how often the CPM looks for System Initiated CPM work.

B.

To control how often the CPM looks for User Initiated CPM work.

C.

To control how long the CPM rests between password changes.

D.

To control the maximum amount of time the CPM will wait for a password change to complete.

Question # 6

CyberArk recommends implementing object level access control on all Safes.

A.

True

B.

False

Question # 7

What must you specify when configuring a discovery scan for UNIX? (Choose two.)

A.

Vault Administrator

B.

CPM Scanner

C.

root password for each machine

D.

list of machines to scan

E.

safe for discovered accounts

Question # 8

A password compliance audit found:

1) One-time password access of 20 domain accounts that are members of Domain Admins group in Active Directory are not being enforced.

2) All the sessions of connecting to domain controllers are not being recorded by CyberArk PSM.

What should you do to address these findings?

A.

Edit the Master Policy and add two policy exceptions: enable "Enforce one-time password access", enable "Record and save session activity".

B.

Edit safe properties and add two policy exceptions: enable "Enforce one-time password access", enable "Record and save session activity".

C.

Edit CPM Settings and add two policy exceptions: enable "Enforce one-time password access", enable "Record and save session activity".

D.

Contact the Windows Administrators and request them to add two policy exceptions at Active Directory Level: enable "Enforce one-time password access", enable "Record and save session activity".

Question # 9

Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)

A.

Store the CD in a physical safe and mount the CD every time Vault maintenance is performed

B.

Copy the entire contents of the CD to the system Safe on the Vault

C.

Copy the entire contents of the CD to a folder on the Vault Server and secure it with NTFS permissions

D.

Store the server key in a Hardware Security Module (HSM) and copy the rest the keys from the CD to a folder on the Vault Server and secure it with NTFS permissions

Question # 10

A Vault Administrator team member can log in to CyberArk, but for some reason, is not given Vault Admin rights.

Where can you check to verify that the Vault Admins directory mapping points to the correct AD group?

A.

PVWA > User Provisioning > LDAP Integration > Mapping Criteria

B.

PVWA > User Provisioning > LDAP Integration > Map Name

C.

PVWA > Administration > LDAP Integration > Mappings

D.

PVWA > Administration > LDAP Integration > AD Groups

Go to page: