Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

CyberArk CPC-CDE-RECERT Dumps

CyberArk CDE-CPC Recertification Questions and Answers

Question 1

Which deployment criteria influences the CyberArk-provided hardening methods that need to be applied to CPM and PSM components?

Options:

A.

“In Domain” and “Out of Domain”

B.

“On Premises” and “On Cloud”

C.

“Windows” and “Linux”

D.

“Primary Privilege Cloud Connector” and “additional Privilege Cloud Connector”

Question 2

You want to improve performance on the CPM by restricting accounts for the CYBRWINDAD platform to only the WINDEMEA and WINDEMEA_ADMIN Safes. How do you set this in CyberArk?

Options:

A.

In the CYBRWINDAD platform, under Automatic Password Management > General, configure AllowedSafes and set it to (WINDEMEA)|(WINDEMEA_ADMIN).

B.

In the settings for Configuration/CPM assigned to the WINDEMEA and WINDEMEAADMIN Safes, configure AllowedSafes and set it to (WINDEMEA)|(WINDEMEAADMIN).

C.

In the CYBRWINDAD platform, under UI & Workflows > Properties > Optional, configure AllowedSafes and set it to (WINDEMEA)|(WINDEMEA_ADMIN).

D.

Modify cpm.ini on the relevant CPM(s) and add AllowedSafesCYBRWINDAD and set it to (WINDEMEA)|(WINDEMEAADMIN).

Question 3

What is a requirement when installing the PSM on multiple Privileged Cloud Connector servers?

Options:

A.

Each PSM must have the same path to the same recordings directory.

B.

All PSMs in the environment must be configured to use load balancing.

C.

Additional Privilege Cloud Connector servers cannot have CPM installed.

D.

In-domain servers cannot be used when deploying multiple PSM servers.

Question 4

After the session has ended, where is the default final recording storage located?

Options:

A.

CyberArk Privilege Cloud

B.

Privilege Cloud Connector

C.

Network attached storage

D.

User workstation

Question 5

Which statements accurately describe the process of LDAP integration with CyberArk Privilege Cloud Standard? (Choose two.)

Options:

A.

Directory maps determine user or group creation within the Privilege Cloud Vault.

B.

A tailored Python script is required to facilitate the LDAP server interaction.

C.

Upon user login, their directory attributes are refreshed through the directory map.

D.

For establishing a connection, the domain base context is not a prerequisite.

E.

The LDAP BIND user requires domain administrative privileges for a successful connection.

Question 6

What is the recommended method to enable load balancing and failover of the CyberArk Identity Connector?

Options:

A.

Setup IIS based Application Request Routing on two or more CyberArk Identity Connector servers.

B.

Set up a network load balancer between two or more CyberArk Identity Connector servers.

C.

Set up two or more CyberArk Identity Connector servers only.

D.

Set up a Microsoft Failover Cluster on two or more CyberArk Identity Connector servers.

Question 7

Your customer is using Privilege Cloud Shared Services. What is the correct CyberArk Vault address for this customer?

Options:

A.

carkvault-.privilegecloud.cyberark.cloud

B.

vault-.privilegecloud.cyberark.cloud

C.

v-.privilegecloud.cyberark.cloud

D.

carkvlt- privilegecloud.cyberark.cloud

Question 8

You have been tasked with deploying a Privilege Cloud PSM for SSH connector When the initial installation has successfully completed, you create and permission several maintenance users to be used for administering the connector.

Which configuration file must be updated to define these maintenance users?

Options:

A.

sshd.config

B.

basic_psmpserver.conf

C.

sshd_config

D.

psmpparms

Question 9

You plan to install the Privilege Cloud Connector on Windows Server 2019 and must leverage your existing RDS Per-user licenses for PSM connections. What must you do?

Options:

A.

Add the UseRDSPerUser=Yes line to the basic_psm.ini parameters file.

B.

Install the RDS License Server Service on Windows 2016.

C.

Migrate the local PSMConnect users to Domain users.

D.

Modify the UseRDSPerUser parameter to Yes on every Windows-related platform.

Question 10

An end user (external user account) has been removed from the Users tab in CyberArk Identity Administration and tries to log in to the CyberArk Privilege Cloud portal using the correct credentials. What will happen?

Options:

A.

The end user will receive a “User does not exist” error message.

B.

The end user will receive an “Unable to login. Contact your system administrator” error message.

C.

The end user will be able to log in and access the same set of functions as before.

D.

After successful login, the end user will be able to log in, but will encounter a blank page.

Question 11

Which method can be used to directly authenticate users to PSM for SSH? (Choose three.)

Options:

A.

CyberArk authentication

B.

LDAP authentication

C.

RADIUS authentication

D.

Windows authentication

E.

SAML authentication

F.

OpenID Connect (OIDC) authentication

Question 12

Your customer recently merged with a smaller organization. The customer's connector has no network connectivity to the smaller organization's infrastructure. You need to map LDAP users from both your customer and the smaller organization. How is this achieved?

Options:

A.

Create the required users in one directory and configure the Identity Connector to read that directory, as there can only be one Identity Connector.

B.

Create mappings for both directories from the original Identity Connector.

C.

Deploy Identity Connectors in the newly acquired infrastructure and create user mappings.

D.

Switch all users to SAML authentication as there can only be one Identity Connector.

Question 13

A CyberArk Privileged Cloud Shared Services customer asks you how to find recent failed login events for all users. Where can you do this without generating reports?

Options:

A.

Privileged Cloud Portal

B.

Identity Administration Portal

C both Identity Administration and Identity User Portals

C.

Identity User Portal

Question 14

Which tool configures the user object that will be used during the installation of the PSM for SSH component?

Options:

A.

CreateUserPass

B.

CreateCredFile

C.

ConfigureCredFile

D.

ConfigureUserPass

Question 15

Before installing the Privilege Cloud Connector using Connector Management, which network rules should be in place?

Options:

A.

VaultConnectivity: Privilege Cloud backend Port 1858

TunnelConnectivity: Secure Tunnel Port 443

CustomerPortalConnectivity: Port 443

B.

VaultConnectivity: Privilege Cloud backend Port 1858

TunnelConnectivity: Secure Tunnel Port 5589

C.

TunnelConnectivity: Secure Tunnel Port 443

CustomerPortalConnectivity: Port 5589

D.

VaultConnectivity: Privilege Cloud backend Port 1858

TunnelConnectivity: Secure Tunnel Port 22

CustomerPortalConnectivity: Port 3389

Question 16

What is determined by the MaxConcurrentConnections setting within a platform?

Options:

A.

Maximum number of concurrent connections that can be opened between the CPM and the remote machines for the platform

B.

Maximum number of concurrent connections that can be between the PSM and the remote machines for the platform

C.

Maximum number of concurrent connections allowed for a specific account on the platform through the PSM

D.

Maximum number of concurrent connections to the Vault allowed for sending audit activities relating to the platform

Question 17

Which group has only View Audit and View Safe permissions?

Options:

A.

Operators

B.

Auditors

C.

Privileged Cloud Admins

D.

Backup Users

Question 18

Arrange the steps to complete CPM Hardening for out-of-Domain deployment in the correct sequence.

as

Options:

Question 19

You need to map an enterprise’s Active Directory to Privilege Cloud Shared Services to enable users to log in to CyberArk through their LDAP credentials. What do you need to accomplish this? (Choose two.)

Options:

A.

Read-only domain user to facilitate the LDAP mapping

B.

Installation and configuration of the Identity Connector

C.

Port 636 open to the Privilege Cloud back-end

D.

Trusted certificate for LDAP server installed on Identity Connector

E.

Configuration of a Federated Domain on the Identity Platform

Question 20

Which actions must be performed when manually hardening a SUSE server with PSM for SSH? (Choose two.)

Options:

A.

Update settings in the sshd_config file on the server.

B.

Add the PSM for SSH gateway user to the passwd file.

C.

Validate that the psmpgwuser.cred file has correct permissions.

D.

Remove all users and groups from the passwd file.

E.

Add the PSM gateway user to the wheel group.

Question 21

Which statements are correct regarding LDAP integration in Privilege Cloud Shared Services? (Choose two.)

Options:

A.

LDAP integration can be configured in the Privilege Cloud web interface under Administration > Configuration Options > LDAP Integration.

B.

A Secure Tunnel installation is required to access the on-premises LDAP directory.

C.

The Privilege Cloud PAM leverages the directory services integration of CyberArk Identity.

D.

The CA certificate that issued the LDAP server’s Server Authentication certificate must be trusted on the machine running the CyberArk Identity Connector.

E.

The CA certificate that issued the LDAP server’s Server Authentication certificate must be provided to CyberArk Support.

Question 22

To disable the PSM default Support for Browser Sessions, which option should be set to 'No* before running Hardening?

Options:

A.

SupportWebApplications

B.

SupportBrowsers

C.

SupportWebBrowsers

D.

SupportHTML5Content

Question 23

You want to enforce Multi-Factor Authentication (MFA) for all Privilege Cloud Shared Services users and require them to set up an MFA factor. How should you accomplish this?

Options:

A.

Only allow SAML as the authentication method, enforce MFA on the SAML Identity Provider (IdP), and ensure users set up MFA accordingly on the IdP.

B.

Navigate to the Identity Administration Portal’s Policies section and configure the required authentication policies for CyberArk Identity.

C.

Navigate to the Identity Administration Portal’s Policies section and set the user security policy for Privilege Cloud to an authentication profile that only allows Multiple Authentication Mechanisms.

D.

Navigate to the Identity Administration Portal’s Policies section and configure the authentication policies for CyberArk Identity, adding a new authentication rule that applies with an “identity cookie” as a filter.

Question 24

You are designing a CyberArk Privilege Cloud environment for a new customer with three data center locations: one in London, one in New York, and one in Singapore. The customer wants to reduce the amount of traffic on their dedicated network links between each data center. Which design should you consider to manage their credentials?

Options:

A.

Deploy CPM connectors in each data center and configure region specific Safes.

B.

Deploy a CPM connector in London and increase the number of days between password changes.

C.

Deploy three CPM connectors in New York, and configure region specific Safes to send traffic equally to each connector CPM.

D.

Deploy CPM connectors in a single data center because the password management traffic is routed through the Privilege Cloud service.

Question 25

Which prerequisites are required for installing PSM for SSH (Unix Connector)? (Choose two.)

Options:

A.

Create the PSM for SSH parameters file on the Unix server with InstallCyberArkSSHD = Integrated.

B.

Configure the root user to not authenticate to the Unix server remotely through SSH using a password.

C.

Verify that outbound traffic from the Unix server is always routed through the same public-facing IP.

D.

Create an administrative user on the Unix server for future maintenance tasks.

E.

Reset the default root account password before installing the PSM for SSH.

Question 26

When installing the PSM and CPM components on the same Privilege Cloud Connector, what should you consider when hardening?

Options:

A.

PSM settings override the CPM settings when referring to the same parameter.

B.

CPM settings override the PSM settings when referring to the same parameter

C.

They can only be installed on the same Privilege Cloud Connector when installed 'in Domain'.

D.

They can only be installed on the same Privilege Cloud Connector when installed 'out of Domain'.

Question 27

You are deploying a CyberArk Identity Connector to integrate Privilege Cloud Shared Services with an Active Directory environment. Which requirement must be met?

Options:

A.

The Identity Connector Server must be joined to the Active Directory.

B.

The Server must be a member of the root domain of the Active Directory forest.

C The Identity Connector must be installed on a Domain Controller.

C.

The Identity Connector must be installed using Domain Administrator credentials.

Question 28

The Secure Tunnel component of CyberArk Privilege Cloud connects to which services in the CyberArk Privilege Cloud? (Choose two.)

Question 29

Which external-facing IP addresses need to be provided to CyberArk when configuring Privilege Cloud so that they can be allowlisted?

Options:

A.

Cloud Connectors and Secrets Manager (if installed)

B.

All users that will be accessing Privilege Cloud

C.

On-premises backup servers

D.

All users who are Administrators in Privilege Cloud

Page: 1 / 10
Total 99 questions