Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien
logo-home
PAM/ DEFENDER certificate study Guide Correct 100% €12,92
Ajouter au panier

Examen

PAM/ DEFENDER certificate study Guide Correct 100%

 0 fois vendu
  • Cours
  • Établissement

1. Which permissions are needed for the Active Directory user required by the Windows Discovery process? a. Domain Admin b. Ldap Admin c. Read/Write d. Read - ANSWERSAnswer: A 2. Match each component to its respective Log File location. - ANSWERSPTA /opt/tomcat/logs PSM for SSH (PSMP)...

[Montrer plus]

Aperçu 3 sur 25  pages

  • 31 mai 2023
  • 25
  • 2022/2023
  • Examen
  • Questions et réponses
avatar-seller
PAM/ DEFENDER certificate study Guide
Correct 100%

1. Which permissions are needed for the Active Directory user required by the Windows
Discovery process?

a. Domain Admin
b. Ldap Admin
c. Read/Write
d. Read - ANSWERSAnswer: A

2. Match each component to its respective Log File location. - ANSWERSPTA
/opt/tomcat/logs

PSM for SSH (PSMP) /var/opt/CARKpsmp/logs

Disaster RecoveryC:\Program Files (x86)\PrivateArk\Server\PADR

You Received this Error: "Error in changepass to user domain\user on domain server (\
domain)winRC=50 Access is denied"

Which root cause should you investigate?


a. The account does not have sufficient permissions to change its own password

b. The domain controller is unreachable

c. The password has been changed recently and minimum password age is preventing
the change.

d. The CPM service is disabled and will need to be restarted. - ANSWERSAnswer: A

4. As vault Admin you have been asked to configure LDAP authentication for your
organization's CyberArk users. Which permissions do you need to complete this task?

a. Audit Users and Add Network Areas
b. Audit Users and Manage Directory Mapping
c. Audit Users and Add/Update Users
d. Audit Users and Activate Users - ANSWERSAnswer: B

5. Which PTA sensors are required to detect suspected credential theft.

,a. Logs, Vault Logs
b. Logs, Network Sensor, Vault Logs
c. Logs, PSM Logs, CPM Logs
d. Logs, Network Sensor, EPM - ANSWERSAnswer: A

6. You are installing HTML5 gateway on a Linux host using the RPM provided. After
installing the Tomcat webapp, what is the next step in the installation process?

a. Deploy the HTML5 service (guacd)
b. Secure the connection between the guacd and the webapp
c. Secure the webapp and JWT validation endpoint
d. Configure ASLR - ANSWERSAnswer: B

7. To enable automatic response "Add to Pending" within PTA when unmanaged
credentials are found, what are the minimum permissions required by PTAUser for the
PasswordManager_Pending safe?

a. List Accounts, View Safe Members, Add Accounts (includes update properties),
Update Account Content, Update Account Properties.

b. List Accounts, Add Accounts (includes update properties), Delete Accounts, Manage
Safe

c. Add Accounts (includes update properties), Update Account Content, Update
Account properties, View Audit.

d. View Accounts, Update Account Content, Update Account Properties, Access Safe
without Confirmation, Mange Safe, View Audit. - ANSWERSAnswer: A

8. A customer's environment three data centers, consisting of 5,000 servers in
Germany, 10,000 servers in Canada, 1,500 servers in Singapore. You want to manage
target servers and avoid complex firewall rules. How many CPM's should you deploy?

a. 1
b. 3, total, 1 per data center
c. 15
d. 6, total, 2 per data center - ANSWERSAnswer: B

9. What is a prerequisite step before CyberArk can be configured to support RADIUS
authentication?

a. Log on to the PrivateArk Client, display the user properties of the user to configure,
run the Authentication method drop-down list, and select RADIUS authentication.

b. In the RADIUS server, define the CyberArk Vault as RADIUS client/agent.

, c. In the Vault Installation folder, run CAVaultManger as Administrator with the
SecureSecretFiles command.

d. Navigate to /Server/Conf and open DBParms.ini and set the RadiusServersInfo
parameter. - ANSWERSAnswer: B

10. Which components can connect to a satellite Vault in distributed Vault architecture?

a. CPM, EPM, PTA
b. PVWA, PSM
c. CPM,PVWA, PSM
d. CPM, PSM - ANSWERSAnswer: B

11. You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You
discover that the CPM is unable to log in directly with the root account and will need to
use a secondary account. How should this be configured to allow for password
management using least privilege?

a. Configure each CPM to use the correct logon account

b. Configure each CPM to use the correct reconcile account

c. Configure the UNIX Platform to use the correct logon account

d. Configure the UNIX Platform to use the correct reconcile account -
ANSWERSAnswer: C

12. Match the built-in Vault user with the correct definition.

a. This user appears on the highest level of the user hierarchy and has all the possible
permissions. As such, it can create and manage other Users on any level on the Users'
hierarchy.

b. This user appears at the to of the User hierarchy, enabling it to view all the Users in
the Safe. The user can produce reports of Safe activities and User activities, which
enables it to keep track of activity in the Safe and User requirements.

c. This user is an internal user that cannot be logged onto and carries out internal tasks,
such as automatically clearing expired user and Safe History.

d. This user has all available Safe member authorizations except Authorize password
requests. This user has complete system control, manages a full recovery when
necessary and cannot be removed from any Safe. - ANSWERSA: Administrator
B: Auditor
C: Batch
D: Master

Les avantages d'acheter des résumés chez Stuvia:

Qualité garantie par les avis des clients

Qualité garantie par les avis des clients

Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.

L’achat facile et rapide

L’achat facile et rapide

Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.

Focus sur l’essentiel

Focus sur l’essentiel

Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.

Foire aux questions

Qu'est-ce que j'obtiens en achetant ce document ?

Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.

Garantie de remboursement : comment ça marche ?

Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.

Auprès de qui est-ce que j'achète ce résumé ?

Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur shantelleG. Stuvia facilite les paiements au vendeur.

Est-ce que j'aurai un abonnement?

Non, vous n'achetez ce résumé que pour €12,92. Vous n'êtes lié à rien après votre achat.

Peut-on faire confiance à Stuvia ?

4.6 étoiles sur Google & Trustpilot (+1000 avis)

73827 résumés ont été vendus ces 30 derniers jours

Fondée en 2010, la référence pour acheter des résumés depuis déjà 15 ans

Commencez à vendre!
€12,92
  • (0)
Ajouter au panier
Ajouté