CyberArk PAM-CDE-RECERT CyberArk CDE Recertification Online Training
CyberArk PAM-CDE-RECERT Online Training
The questions for PAM-CDE-RECERT were last updated at Oct 29,2024.
- Exam Code: PAM-CDE-RECERT
- Exam Name: CyberArk CDE Recertification
- Certification Provider: CyberArk
- Latest update: Oct 29,2024
What is the purpose of a linked account?
- A . To ensure that a particular collection of accounts all have the same password.
- B . To ensure a particular set of accounts all change at the same time.
- C . To connect the CPNI to a target system.
- D . To allow more than one account to work together as part of a password management process.
Which components support fault tolerance.
- A . CPM and PVWA
- B . PVWA and PSM
- C . PSM and PTA
- D . CPM and PTA
Which statement is correct concerning accounts that are discovered, but cannot be added to the Vault by an automated onboarding rule?
- A . They are added to the Pending Accounts list and can be reviewed and manually uploaded.
- B . They cannot be onboarded to the Password Vault.
- C . They must be uploaded using third party tools.
- D . They are not part of the Discovery Process.
D
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PrivCloud/Latest/en/Content/Privilege%20Cloud/privCloud-accounts-discovery.htm
What is the purpose of the Interval setting in a CPM policy?
- A . To control how often the CPM looks for System Initiated CPM work.
- B . To control how often the CPM looks for User Initiated CPM work.
- C . To control how long the CPM rests between password changes.
- D . To control the maximum amount of time the CPM will wait for a password change to complete.
It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.
- A . TRUE
- B . FALS
Which CyberArk utility allows you to create lists of Master Policy Settings, owners and safes for output to text files or MSSQL databases?
- A . Export Vault Data
- B . Export Vault Information
- C . PrivateArk Client
- D . Privileged Threat Analytics
A
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/EVD/Exporting-Data-to-Files.htm?Highlight=evd%20italog
It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occur
- A . TRUE
- B . FALS
A
Explanation:
Password reconciliation can be restricted to specific days. This means that the CPM will only reconcile passwords on the days of the week specified in the RCExecutionDays parameter. The days of the week are represented by the first 3 letters of the name of the day. Sunday is represented by Sun, Mondayby Mon, etc.
Which user(s) can access all passwords in the Vault?
- A . Administrator
- B . Any member of Vault administrators
- C . Any member of auditors
- D . Master
You are installing HTML5 gateway on a Linux host using the RPM provided.
After installing the Tomcat webapp, what is the next step in the installation process?
- A . Deploy the HTML5 service (guacd)
- B . Secure the connection between the guacd and the webapp
- C . Secure the webapp and JWT validation endpoint
- D . Configure ASLR
For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.
- A . Create an exception to the Master Policy to exclude the group from the workflow process.
- B . Edith the master policy rule and modify the advanced’ Access safe without approval’ rule to include the group.
- C . On the safe in which the account is stored grant the group the’ Access safe without audit’ authorization.
- D . On the safe in which the account is stored grant the group the’ Access safe without confirmation’ authorization.