Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CyberArk CPC-CDE-RECERT Dumps Questions Answers

CyberArk CDE-CPC Recertification Questions and Answers

Question 1

In the directory lookup order, which directory service is always looked up first for the CyberArk Privilege Cloud solution?

Options:

A.

Active Directory

B.

LDAP

C.

Federated Directory

D.

CyberArk Cloud Directory

Buy Now
Question 2

Which tool configures the user object that will be used during the installation of the PSM for SSH component?

Options:

A.

CreateUserPass

B.

CreateCredFile

C.

ConfigureCredFile

D.

ConfigureUserPass

Question 3

Your customer is using Privilege Cloud Shared Services. What is the correct CyberArk Vault address for this customer?

Options:

A.

carkvault-.privilegecloud.cyberark.cloud

B.

vault-.privilegecloud.cyberark.cloud

C.

v-.privilegecloud.cyberark.cloud

D.

carkvlt- privilegecloud.cyberark.cloud

Question 4

CyberArk User Neil is trying to connect to the Target Linux server 192.168.1.164 using a domain user ACME\linuxuser01 on domain acme.corp using PSM for SSH server

192.168.65.145.

What is the correct syntax?

Options:

A.

ssh neil@linuxuser01:acme.corp@192.168.1.164@192.168.65.145

B.

ssh neil@linuxuser01#acme.corp@192.168.1.164@192.168.65.145

C.

sshneil@linuxuser01@192.168.1.164@192.168.65.145

D.

ssh neil@linuxuser01@acme.corp@192.168.1.164@192.168.65.145

Question 5

You are implementing LDAPS Integration for a standard Privilege Cloud environment.

Which information must be provided to the CyberArk Privilege Cloud support team through a Service Request? (Choose 2.)

Options:

A.

LDAPS certificate chain for all domain controllers to be integrated

B.

LDAP bind username and password used to authenticate to the directory to be integrated

C Domain Base Context used to locate the users and groups in the Active Directory to be integrated

C.

Fully Qualified Domain Name and IP Address of the domain controllers to be integrated

D.

remote port set during secure tunnel configuration for each domain controller to be integrated

Question 6

What is the purpose of the PSM Health Check hardening?

Options:

A.

Remove IIS settings which can be considered security vulnerabilities.

B.

Validate that the PSM is ready to be placed behind a load balancer.

C.

Confirm that the Windows Services for PSM are running on the server.

D.

Ensure that the AppLocker script does not have any syntax errors.

Question 7

You want to add an additional maintenance user on the PSM for SSH. How can you accomplish this if InstallCyberArkSSHD is set to Integrated?

Options:

A.

Create a local user and add it to the PSMP_MaintenanceUsers group.

B.

Create a local user called proxymaster and add it to /etc/pam.d/auth-password.

C.

Create a local user and add it to the group configured for the parameter AllowGroups in the /etc/ssh/sshd_config file.

D.

Create a local user called psmpmng and add it to the PSMMaintenance group in /etc/pam.d/auth-password.

Question 8

Which actions must be performed when manually hardening a SUSE server with PSM for SSH? (Choose two.)

Options:

A.

Update settings in the sshd_config file on the server.

B.

Add the PSM for SSH gateway user to the passwd file.

C.

Validate that the psmpgwuser.cred file has correct permissions.

D.

Remove all users and groups from the passwd file.

E.

Add the PSM gateway user to the wheel group.

Question 9

After the session has ended, where is the default final recording storage located?

Options:

A.

CyberArk Privilege Cloud

B.

Privilege Cloud Connector

C.

Network attached storage

D.

User workstation

Question 10

Which statements accurately describe the process of LDAP integration with CyberArk Privilege Cloud Standard? (Choose two.)

Options:

A.

Directory maps determine user or group creation within the Privilege Cloud Vault.

B.

A tailored Python script is required to facilitate the LDAP server interaction.

C.

Upon user login, their directory attributes are refreshed through the directory map.

D.

For establishing a connection, the domain base context is not a prerequisite.

E.

The LDAP BIND user requires domain administrative privileges for a successful connection.

Question 11

Which component supports the required communication to send audit logs from Privilege Cloud through the Syslog protocol to a SIEM application?

Options:

A.

CyberArk Syslog Writer

B.

Secure Tunnel

C.

Privilege Cloud Connector

D.

CyberArk Identity Connector

Question 12

You are configuring an integration to provision users based on LDAP directory services for Privilege Cloud Shared Services. Which component must first be installed and configured in the environment to support this?

Options:

A.

CyberArk Identity Connector

B.

Secure Tunnel

C.

Privilege Cloud Connector

D.

Linux Connector Server

Question 13

Which components can be installed when running the Privilege Cloud Connector installation package? (Choose two.)

Options:

A.

Privileged Session Manager (PSM)

B.

Central Policy Manager (CPM)

C.

Secure Tunnel

D.

Central Credential Provider (CCP)

E.

Privileged Session Manager for SSH (PSM for SSH)

Question 14

To use SAML authentication in Privilege Cloud Standard Services, users must first be defined in Privilege Cloud. What are correct methods for defining users? (Choose two.)

Options:

A.

Integrate Privilege Cloud with your LDAP server.

B.

Integrate Privilege Cloud with SIEM.

C.

Integrate Privilege Cloud with Email System.

D.

Create users in Privilege Cloud with details identical to those who access Privilege Cloud through SAML authentication.

E.

Create users in the CyberArk Privilege Cloud database using the CAVaultManager createuser command.

Question 15

Which authentication methods does PSM for SSH support? (Choose 2.)

Options:

A.

OIDC

B.

MFA Caching

C.

SAML

D.

RADIUS

E.

Client Authentication Certificate

Question 16

Which statements are correct regarding enabling end users from multiple domains in the same forest to authenticate to CyberArk Privilege Cloud? (Choose two.)

Options:

A.

CyberArk does not permit end users from multiple domains to authenticate to CyberArk Privilege Cloud; it only allows users from multiple directory services, such as AD, Azure AD, CyberArk Cloud Directory, etc.

B.

This can be accomplished when the users' Active Directory accounts are in domains with domain controllers that have a two-way, transitive trust relationship with the domain controller to which the connector is connected.

C.

Configuring authentication for users in multiple domains in the same forest is not recommended due to potential performance issues.

D.

To enable authentication for users in multiple domains in the same forest, you should install separate CyberArk Identity Connectors for each independent domain.

E.

CyberArk recommends consolidating users from multiple domains in the same forest into the CyberArk Cloud Directory for this specific use case.

Question 17

How should you configure PSM for SSH to support load balancing?

Options:

A.

by using a network load balancer

B.

in PVWA > Options > PSM for SSH Proxy > Servers

C.

in PVWA > Options > PSM for SSH Proxy > Servers > VIP

D.

by editing sshd.config on the all the PSM for SSH servers

Question 18

The System Health page shows the status of all components related to Privilege Cloud. Which components can administrators monitor on this page? (Choose two.)

Options:

A.

Vault

B.

PTA

C.

PVWA

D.

CPM

E.

PSM

Question 19

What must be specified when authenticating to Privilege Cloud during the Secure Tunnel install?

Options:

A.

Vault IP Address

B.

Subdomain or Customer ID

C.

Privilege Cloud URL

D.

CaseID

Question 20

Which browser is supported for PSM Web Connectors developed using the CyberArk Plugin Generator Utility (PGU)?

Options:

A.

Internet Explorer

B.

Google Chrome

C.

Opera

D.

Firefox

Question 21

In large-scale environments, it is important to enable the CPM to focus its search operations on specific Safes instead of scanning all Safes it sees in the Vault. How is this accomplished?

Options:

A.

Administration Options > CPM Settings

B.

AllowedSafes Parameter on each platform policy

C.

MaxConcurrentConnection parameter on each platform policy

D.

Administration > Options > CPM Scanner.

Question 22

When calling the PSM Health Check Webservice to assess the state of a PSM node, which response code does a healthy node return?

Options:

A.

200 (OK)

B.

404 (OK)

C.

500 (OK)

D.

503 (OK)

Question 23

What creating a new safe, what is the default number of password versions stored if using 'Save latest account versions' within version management settings?

Options:

A.

5

B.

10

C.

30

D.

90

Question 24

On Privilege Cloud, what can you use to update users' Permissions on Safes? (Choose 2.)

Options:

A.

Privilege Cloud Portal

B.

PrivateArk Client

C.

REST API

D.

PACLI

E.

PTA

Question 25

What is recommended when applying GPO (Group Policy Object) hardening for in-domain PSM servers?

Options:

A.

Apply the GPO provided by CyberArk onto the servers after other GPOs.

B.

Apply the GPO hardening to all hosts that end-users will connect to through the PSM.

C.

After installation, remove the PSM servers from the domain to maximize security.

D.

Place the servers which have PSM installed into a dedicated organizational unit (OU).

Question 26

You want to enforce Multi-Factor Authentication (MFA) for all Privilege Cloud Shared Services users and require them to set up an MFA factor. How should you accomplish this?

Options:

A.

Only allow SAML as the authentication method, enforce MFA on the SAML Identity Provider (IdP), and ensure users set up MFA accordingly on the IdP.

B.

Navigate to the Identity Administration Portal’s Policies section and configure the required authentication policies for CyberArk Identity.

C.

Navigate to the Identity Administration Portal’s Policies section and set the user security policy for Privilege Cloud to an authentication profile that only allows Multiple Authentication Mechanisms.

D.

Navigate to the Identity Administration Portal’s Policies section and configure the authentication policies for CyberArk Identity, adding a new authentication rule that applies with an “identity cookie” as a filter.

Question 27

Which Safe(s) does the AllowedSafes=Win platform parameter configuration match? (Choose two.)

Options:

A.

WindowsPasswords

B.

win-ssh-keys

C.

CXD-WIN-ADMINS

D.

SQL-Win-SA

E.

WiNdOwS_Accts

Question 28

You want to improve performance on the CPM by restricting accounts for the CYBRWINDAD platform to only the WINDEMEA and WINDEMEA_ADMIN Safes. How do you set this in CyberArk?

Options:

A.

In the CYBRWINDAD platform, under Automatic Password Management > General, configure AllowedSafes and set it to (WINDEMEA)|(WINDEMEA_ADMIN).

B.

In the settings for Configuration/CPM assigned to the WINDEMEA and WINDEMEAADMIN Safes, configure AllowedSafes and set it to (WINDEMEA)|(WINDEMEAADMIN).

C.

In the CYBRWINDAD platform, under UI & Workflows > Properties > Optional, configure AllowedSafes and set it to (WINDEMEA)|(WINDEMEA_ADMIN).

D.

Modify cpm.ini on the relevant CPM(s) and add AllowedSafesCYBRWINDAD and set it to (WINDEMEA)|(WINDEMEAADMIN).

Question 29

Which statement is correct regarding the LDAP integration with CyberArk Privilege Cloud Standard?

Options:

A.

You must track the expiration date of the directory server certificate and contact CyberArk Support to renew it.

B.

LDAPS integration with Privilege Cloud requires StartTLS for secure and encrypted communication.

C.

For certificate trust to your directory server, only the Issuing CA certificate is required.

D.

The top-level domain entry of the directory must be unique in the chosen Privilege Cloud region.