CyberArk PAM-DEF Exam Practice Questions (P. 2)
- Full Access (113 questions)
- One Year of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #6
A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request.
What is the correct location to identify users or groups who can approve?
What is the correct location to identify users or groups who can approve?
- APVWA > Administration > Platform Configuration > Edit Platform > UI & Workflow > Dual Control > Approvers
- BPVWA > Policies > Access Control (Safes) > Select the safe > Safe Members > Workflow > Authorize Password RequestsMost Voted
- CPVWA > Account List > Edit > Show Advanced Settings > Dual Control > Direct Managers
- DPrivateArk > Admin Tools > Users and Groups > Auditors (Group Membership)
Correct Answer:
B
B
GPT-4o - Answer
The correct way to find out who can approve a password request under the dual-control system in CyberArk is through the Password Vault Web Access (PVWA). Specifically, you should navigate to Policies, then Access Control (Safes), select the relevant safe, go to Safe Members, and look under Workflow at the function 'Authorize Password Requests.' This location is integral for Vault Admins or anyone involved in managing access control to see exactly who has the authority to approve dual control password requests. This setup ensures that password access is securely managed and adheres to organizational policies on access control.
send
light_mode
delete
Question #7
What must you specify when configuring a discovery scan for UNIX? (Choose two.)
- AVault Administrator
- BCPM ScannerMost Voted
- Croot password for each machine
- Dlist of machines to scanMost Voted
- Esafe for discovered accounts
Correct Answer:
CD
CD
GPT-4o - Answer
Regarding your question on configuring a discovery scan for UNIX, the two key components to be specified are the root password for each machine and a list of machines to target in the scan. It’s particularly important to enter the root passwords to gain the necessary access for a thorough scan, and defining the list of machines ensures that the scan is focused and effective, covering all relevant assets. This combination is fundamental to configure scans accurately and efficiently.
send
light_mode
delete
Question #8
To change the safe where recordings are kept for a specific platform, which setting must you update in the platform configuration?
- ASessionRecorderSafeMost Voted
- BSessionSafe
- CRecordingsPath
- DRecordingLocation
Correct Answer:
C
C
GPT-4o - Answer
The correct setting to update in the platform configuration for changing the safe where recordings are kept is 'SessionRecorderSafe', not 'RecordingsPath'. This setting allows specifying the safe name where session recordings are stored. It's essential to reference this configuration when aiming to segregate or reorganize where these recordings are maintained. Always confirm settings and configuration by consulting the most recent CyberArk documentation or support channels.
send
light_mode
delete
Question #9
Which processes reduce the risk of credential theft? (Choose two.)
- Arequire dual control password access approval
- Brequire password change every X daysMost Voted
- Cenforce check-in/check-out exclusive access
- Denforce one-time password accessMost Voted
Correct Answer:
AB
AB
GPT-4o - Answer
Requiring a password change every X days (B) is a strategic approach to mitigate the risk of old credentials being used maliciously if they are compromised. Implementing dual control for password access approval (A) also plays a crucial role in reducing credential theft. This system ensures that no single individual can access sensitive information without approval from another authorized party, significantly lowering the chance of unauthorized access and use. While one-time passwords (D) do provide a layer of security, they primarily address a different type of security concern, more towards ensuring the integrity of ongoing sessions rather than preventing initial credential theft.
send
light_mode
delete
Question #10
You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How can this be configured to allow for password management using least privilege?
How can this be configured to allow for password management using least privilege?
- AConfigure each CPM to use the correct logon account.
- BConfigure each CPM to use the correct reconcile account.
- CConfigure the UNIX platform to use the correct logon account.Most Voted
- DConfigure the UNIX platform to use the correct reconcile account.
Correct Answer:
D
D
GPT-4o - Answer
Remember, when onboarding UNIX root accounts for rotation by the CPM, it's crucial to differentiate between "logon" and "reconcile" accounts within the platform setup. Although there's a focus on the logon account which is used initially by the CPM to access the system, the question clearly involves ensuring a fallback mechanism disrupting regular operation, which is provided by a reconcile account rather than the logon account. So, the correct configuration in this context would employ the reconcile account to manage password resets when the CPM can't login normally, ensuring continuity in privileged access management.
send
light_mode
delete
All Pages
