CyberArk CPC-SEN CyberArk Sentry – Privilege Cloud Online Training
CyberArk CPC-SEN Online Training
The questions for CPC-SEN were last updated at Nov 19,2024.
- Exam Code: CPC-SEN
- Exam Name: CyberArk Sentry - Privilege Cloud
- Certification Provider: CyberArk
- Latest update: Nov 19,2024
In the directory lookup order, which directory service is always looked up first for the CyberArk Privilege Cloud solution?
- A . Active Directory
- B . LDAP
- C . Federated Directory
- D . CyberArk Cloud Directory
Your customer recently merged with a smaller organization. The customer’s connector has no network connectivity to the smaller organization’s infrastructure. You need to map LDAP users from both your customer and the smaller organization.
How is this achieved?
- A . Create the required users in one directory and configure the Identity Connector to read that directory, as there can only be one Identity Connector.
- B . Create mappings for both directories from the original Identity Connector.
- C . Deploy Identity Connectors in the newly acquired infrastructure and create user mappings.
- D . Switch all users to SAML authentication as there can only be one Identity Connector.
After correctly configuring reconciliation parameters in the Prod-AIX-Root-Accounts Platform, this error message appears in the CPM log: CACPM410E Ending password policy Prod-AIX-Root-Accounts since the reconciliation task is active but the AllowedSafes parameter was not updated.
What caused this situation?
- A . The reconciliation account defined in the Platform is in a locked state and is not accessible.
- B . The CPM is currently configured to use to an unsigned engine.
- C . The AllowedSafes parameter does not include the safe containing the reconciliation account defined in the Platform.
- D . A second CPM is incorrectly configured to manage the reconciliation account’s safe which is causing a deadlock situation between the two CPMs.
How can a platform be configured to work with load-balanced PSMs?
- A . Remove all entries from configured PSM Servers except for the ID of the PSMs with load balancing.
- B . Create a new PSM definition that targets the load balancer IP address and assign to the platform.
- C . Include details of the PSMs with load balancing in the Basic_psm.ini file on each PSM server.
- D . Use the Privilege Cloud Portal to update the Session Management settings for the platform in the Master Policy.
You are deploying a CyberArk Identity Connector to integrate Privilege Cloud Shared Services with an Active Directory environment.
Which requirement must be met?
- A . The Identity Connector Server must be joined to the Active Directory.
- B . The Server must be a member of the root domain of the Active Directory forest.
C The Identity Connector must be installed on a Domain Controller. - C . The Identity Connector must be installed using Domain Administrator credentials.
Your customer is using Privilege Cloud Shared Services.
What is the correct CyberArk Vault address for this customer?
- A . carkvault-<subdomain>.privilegecloud.cyberark.cloud
- B . vault-<subdomain>.privilegecloud.cyberark.cloud
- C . v-<subdomain>.privilegecloud.cyberark.cloud
- D . carkvlt-<subdomain> privilegecloud.cyberark.cloud
You are implementing LDAPS Integration for a standard Privilege Cloud environment.
Which information must be provided to the CyberArk Privilege Cloud support team through a Service Request? (Choose 2.)
- A . LDAPS certificate chain for all domain controllers to be integrated
- B . LDAP bind username and password used to authenticate to the directory to be integrated
C Domain Base Context used to locate the users and groups in the Active Directory to be integrated - C . Fully Qualified Domain Name and IP Address of the domain controllers to be integrated
- D . remote port set during secure tunnel configuration for each domain controller to be integrated
Which statement best describes a PSM server’s network requirements?
- A . It must reach the target system using its native protocols.
- B . It requires limited outbound connectivity to Ports 1858 and 443 only.
- C . It requires direct access to the internet.
- D . It requires broad inbound firewall rules and outbound traffic should be limited to Port 1858.
Which users are Privilege Cloud Standard built-in users? (Choose 2.)
- A . NASCorp
- B . saascorps
- C . CyberArkAdmin
- D . remoteAccessAppUser
- E . PASReporterUser
On the CPM, you want to verify if DEP is disabled for the required executables According to best practices, which executables should be listed? (Choose 2.)
- A . Telnet.exe
- B . Plink.exe
- C . putty.exe
- D . mstsc.exe