Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CyberArk Defender - PAM

Last Update 3 hours ago Total Questions : 239

The CyberArk Defender - PAM content is now fully updated, with all current exam questions added 3 hours ago. Deciding to include PAM-DEF practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our PAM-DEF exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these PAM-DEF sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CyberArk Defender - PAM practice test comfortably within the allotted time.

Question # 4

Which file must be edited on the Vault to configure it to send data to PTA?

A.

dbparm.ini

B.

PARAgent.ini

C.

my.ini

D.

padr.ini

Question # 5

Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential Theft”?

A.

Add to Pending

B.

Rotate Credentials

C.

Reconcile Credentials

D.

Disable Account

Question # 6

It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occur

A.

TRUE

B.

FALSE

Question # 7

Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)

A.

Store the CD in a physical safe and mount the CD every time Vault maintenance is performed

B.

Copy the entire contents of the CD to the system Safe on the Vault

C.

Copy the entire contents of the CD to a folder on the Vault Server and secure it with NTFS permissions

D.

Store the server key in a Hardware Security Module (HSM) and copy the rest the keys from the CD to a folder on the Vault Server and secure it with NTFS permissions

Question # 8

Which option in the Private Ark client is used to update users’ Vault group memberships?

A.

Update > General tab

B.

Update > Authorizations tab

C.

Update > Member Of tab

D.

Update > Group tab

Question # 9

When the CPM connects to a database, which interface is most commonly used?

A.

Kerberos

B.

ODBC

C.

VBScript

D.

Sybase

Question # 10

In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX system. What is the BEST way to allow CPM to manage root accounts.

A.

Create a privileged account on the target server. Allow this account the ability to SSH directly from the CPM machine. Configure this account as the Reconcile account of the target server’s root account.

B.

Create a non-privileged account on the target server. Allow this account the ability to SSH directly from the CPM machine. Configure this account as the Logon account of the target server’s root account.

C.

Configure the Unix system to allow SSH logins.

D.

Configure the CPM to allow SSH logins.

Go to page: