CyberArk PAM-CDE-RECERT CyberArk CDE Recertification Online Training
CyberArk PAM-CDE-RECERT Online Training
The questions for PAM-CDE-RECERT were last updated at Feb 19,2025.
- Exam Code: PAM-CDE-RECERT
- Exam Name: CyberArk CDE Recertification
- Certification Provider: CyberArk
- Latest update: Feb 19,2025
Which permissions are needed for the Active Directory user required by the Windows Discovery process?
- A . Domain Admin
- B . LDAP Admin
- C . Read/Write
- D . Read
tsparm.ini is the main configuration file for the Vault.
- A . True
- B . False
Which Master Policy Setting must be active in order to have an account checked-out by one user for a pre-determined amount of time?
- A . Require dual control password access Approval
- B . Enforce check-in/check-out exclusive access
- C . Enforce one-time password access
- D . Enforce check-in/check-out exclusive access & Enforce one-time password access
If a customer has one data center and requires high availability, how many PVWA’s should be deployed.
- A . Two
- B . One PVWA cluster
- C . One
- D . Two PVWA Cluster
What is the purpose of the Immediate Interval setting in a CPM policy?
- A . To control how often the CPM looks for System Initiated CPM work.
- B . To control how often the CPM looks for User Initiated CPM work.
- C . To control how often the CPM rests between password changes.
- D . To Control the maximum amount of time the CPM will wait for a password change to complete.
B
Explanation:
When the Master Policy enforces check-in/check-out exclusive access, passwords are changed when the user clicks the Release button and releases the account. This is based on the ImmediateInterval parameter in the applied platform. If the user forgets to release the account, it is automatically released and changed by the CPM after a predetermined number of minutes, defined in the MinValidityPeriod parameter specified in the platform
Which report could show all accounts that are past their expiration dates?
- A . Privileged Account Compliance Status report
- B . Activity log
- C . Privileged Account Inventory report
- D . Application Inventory report
In a default CyberArk installation, which group must a user be a member of to view the “reports” page in PVWA?
- A . PVWAMonitor
- B . ReportUsers
- C . PVWAReports
- D . Operators
A
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ReportsInPVWA.htm?TocPath=End%20User%7CReports%20and%20Audits%7C_____1#:~:text=Reports%20can%20be%20genera ted%20in,this%20is%20the%20PVWAMonitor%20group
An auditor needs to login to the PSM in order to live monitor an active session.
Which user ID is used to establish the RDP connection to the PSM server?
- A . PSMConnect
- B . PSMMaster
- C . PSMGwUser
- D . PSMAdminConnect
Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
- A . Discovery and Audit (DMA)
- B . Auto Detection (AD)
- C . Export Vault Data (EVD)
- D . On Demand Privileges Manager (OPM)
- E . Accounts Discovery
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?
- A . Configure the Provider to change the password to match the Vault’s Password
- B . Associate a reconcile account and configure the platform to reconcile automatically
- C . Associate a logon account and configure the platform to reconcile automatically
- D . Run the correct auto detection process to rediscover the password