Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CyberArk CPC-CDE-RECERT - CyberArk CDE-CPC Recertification

Page: 2 / 3
Total 99 questions

Arrange the steps to complete CPM Hardening for out-of-Domain deployment in the correct sequence.

Which statements are correct regarding enabling end users from multiple domains in the same forest to authenticate to CyberArk Privilege Cloud? (Choose two.)

A.

CyberArk does not permit end users from multiple domains to authenticate to CyberArk Privilege Cloud; it only allows users from multiple directory services, such as AD, Azure AD, CyberArk Cloud Directory, etc.

B.

This can be accomplished when the users' Active Directory accounts are in domains with domain controllers that have a two-way, transitive trust relationship with the domain controller to which the connector is connected.

C.

Configuring authentication for users in multiple domains in the same forest is not recommended due to potential performance issues.

D.

To enable authentication for users in multiple domains in the same forest, you should install separate CyberArk Identity Connectors for each independent domain.

E.

CyberArk recommends consolidating users from multiple domains in the same forest into the CyberArk Cloud Directory for this specific use case.

Before you can delete a Safe, you must first delete all of its content (accounts and files) permanently. What else must also be achieved before the Safe can be successfully deleted?

A.

The Safe owners have been removed from the Safe membership.

B.

The version retention period has expired for all files.

C.

The associated CPM user has been removed from the Safe.

D.

The “Save account versions for a period of:” has been set to 0 within the Safe version retention settings.

You are implementing LDAPS Integration for a standard Privilege Cloud environment.

Which information must be provided to the CyberArk Privilege Cloud support team through a Service Request? (Choose 2.)

A.

LDAPS certificate chain for all domain controllers to be integrated

B.

LDAP bind username and password used to authenticate to the directory to be integrated

C Domain Base Context used to locate the users and groups in the Active Directory to be integrated

C.

Fully Qualified Domain Name and IP Address of the domain controllers to be integrated

D.

remote port set during secure tunnel configuration for each domain controller to be integrated

Which statement is correct about using the AllowedSafes platform parameter?

A.

It allows users to access accounts in specific safes.

B.

It prevents the CPM from scanning all safes, restricting it to scan only safes that match the AllowedSafes configuration.

C.

It allows the CPM to access PSM safes to monitor platform configuration and connection component changes.

D.

It prevents the CPM from processing pending items in the Discovery safes enforcing manual intervention to complete the onboarding process.

According to best practice, when considering the location of PSM Connector servers in Privilege Cloud environments, where should the PSM be placed?

A.

near the CPM servers

B.

near the target devices

C.

near the Vault (closer to the external internet connection)

D.

near the Users

When installing the PSM and CPM components on the same Privilege Cloud Connector, what should you consider when hardening?

A.

PSM settings override the CPM settings when referring to the same parameter.

B.

CPM settings override the PSM settings when referring to the same parameter

C.

They can only be installed on the same Privilege Cloud Connector when installed 'in Domain'.

D.

They can only be installed on the same Privilege Cloud Connector when installed 'out of Domain'.

Which statements accurately describe the process of LDAP integration with CyberArk Privilege Cloud Standard? (Choose two.)

A.

Directory maps determine user or group creation within the Privilege Cloud Vault.

B.

A tailored Python script is required to facilitate the LDAP server interaction.

C.

Upon user login, their directory attributes are refreshed through the directory map.

D.

For establishing a connection, the domain base context is not a prerequisite.

E.

The LDAP BIND user requires domain administrative privileges for a successful connection.

A support team has asked you to provide the previous password for an account that had its password recently changed by the CPM. In which tab within the account's overview page can you retrieve this information?

A.

Overview

B.

Activities

C.

Details

D.

Versions

You are deploying a CyberArk Identity Connector to integrate Privilege Cloud Shared Services with an Active Directory environment. Which requirement must be met?

A.

The Identity Connector Server must be joined to the Active Directory.

B.

The Server must be a member of the root domain of the Active Directory forest.

C The Identity Connector must be installed on a Domain Controller.

C.

The Identity Connector must be installed using Domain Administrator credentials.