CyberArk Defender + Sentry v1.0

Page:    1 / 16   
Exam contains 230 questions

The DR module allows an integration with Enterprise Backup software.

  • A. TRUE
  • B. FALSE


Answer : B

What is the purpose of the PrivateArk Server service?

  • A. Executes password changes.
  • B. Makes Vault data accessible to components.
  • C. Maintains vault metadata.
  • D. Sends email alert from the Vault.


Answer : C

Auto-Detection can be configured to leverage LDAP/S.

  • A. TRUE
  • B. FALSE


Answer : B

It is impossible to override Mater Policy settings for a Platform

  • A. TRUE
  • B. FALSE


Answer : B

The following applications are pre-configured to work with PSM, but first need to be installed on the PSM server.

  • A. SQL Plus
  • B. Putty
  • C. RDP
  • D. WinSCP
  • E. Toad
  • F. VMWare vSphere Client
  • G. Microsoft SQL Management Studio


Answer : A

What is the PRIMARY reason for installing more than 1 active Central Policy Manager (CPM)?

  • A. Installing CPMs in multiple sites prevents complex firewall rules to manage devices at remote sites.
  • B. Multiple instances create fault tolerance.
  • C. Multiple instances increase response time.
  • D. Having additional CPMs increases the maximum number of devices CyberArk can manage.


Answer : D

When planning to load balance at least 2 PSM Servers in an ג€in-domainג€ deployment, is it required to move the PSMConnect and PSMAdminConnect users to the domain level?

  • A. Yes, but only the PSMConnect user must be moved to the domain.
  • B. No, this is the customersג€™ decision and will work with local or domain based users.
  • C. Yes, both PSMConnect and PSMAdminConnect users should be moved to the domain.
  • D. No, both accounts must be left as local accounts.


Answer : D

Name two ways of viewing the ITAlog:

  • A. Log into the vault locally and navigate to the Server folder under the PrivateArk install location.
  • B. Log into the PVWA and go to the Reports tab.
  • C. Access the System Safe from the PrivateArk client.
  • D. Go to the Thirdpary log directory on the CPM


Answer : AC

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group
UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group
OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of OperationsManagers. The members of OperationsManagers never need to be able to use the show, copy or connect buttons themselves.
Which safe permissions do you need to grant to UnixAdmins?

  • A. Use Accounts
  • B. Retrieve Accounts
  • C. List Accounts
  • D. Authorize Password Requests
  • E. Access Safe without Authorization


Answer : A

A Simple Mail Transfer Protocol (SMTP) integration allows you to forward audit records to a monitoring solution.

  • A. TRUE
  • B. FALSE


Answer : B

The System safe allows access to the Vault configuration files.

  • A. TRUE
  • B. FALSE


Answer : A

Which of the Following can be configured in the Master Policy? (Choose all that apply.)

  • A. Dual Control
  • B. One Time Passwords
  • C. Exclusive Passwords
  • D. Password Reconciliation
  • E. Ticketing Integration
  • F. Required Properties
  • G. Custom Connection Components
  • H. Password Aging Rules


Answer : ABGH

Multiple PSM Servers can be load balanced.

  • A. TRUE
  • B. FALSE


Answer : A

Which file would you modify to configure your Vault Server to forward Activity Logs to a Security Information and Event Management (SIEM) or SYSLOG server?

  • A. dbparm.ini
  • B. PARagent.ini
  • C. ENEConf.ini
  • D. padr.ini


Answer : A

In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow Central Policy Manager (CPM) to manage root accounts?

  • A. Create a privileged account on the target server. Allow this account the ability to SSH directly from the CPM machine. Configure this account as the Reconcile account of the target serverג€™s root account.
  • B. Create a non-privileged account on the target server. Allow this account the ability to SSH directly from the CPM machine. Configure this account as the Logon account of the target serverג€™s root account.
  • C. Configure the Unix system to allow SSH logins.
  • D. Configure the CPM to allow SSH logins.


Answer : B

Page:    1 / 16   
Exam contains 230 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy