Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CyberArk CPC-CDE-RECERT - CyberArk CDE-CPC Recertification

Page: 1 / 3
Total 99 questions

You are configuring firewall rules between the Privilege Cloud components and the Privilege Cloud. Which firewall rules should be set up to allow connections?

A.

from the CyberArk Privilege Cloud to the Privilege Cloud components

B.

from the Privilege Cloud components to the CyberArk Privilege Cloud

C bi-directionally between the Privilege Cloud components and the CyberArk Privilege cloud

C.

from the Privilege Cloud components to CyberArk.com

In large-scale environments, it is important to enable the CPM to focus its search operations on specific Safes instead of scanning all Safes it sees in the Vault. How is this accomplished?

A.

Administration Options > CPM Settings

B.

AllowedSafes Parameter on each platform policy

C.

MaxConcurrentConnection parameter on each platform policy

D.

Administration > Options > CPM Scanner.

What is the default username for the PSM for SSH maintenance user?

A.

proxymng

B.

psmp_maintenance

C.

psmpmaintenanceuser

D.

proxyusr

When using Connector Management, how do you configure a DR CPM in Privilege Cloud shared services? (Choose two.)

A.

Stop the CyberArk Password Manager service and set the startup type to Manual.

B.

When prompted for the Vault IP address on the installation windows, leave it blank and proceed.

C.

When prompted to select the CPM mode, select Passive.

D.

When prompted for the Vault administrator credentials on the installation windows, leave it blank and proceed.

E.

Stop the CyberArk Password Manager service and set the startup type to Automatic.

An end user (external user account) has been removed from the Users tab in CyberArk Identity Administration and tries to log in to the CyberArk Privilege Cloud portal using the correct credentials. What will happen?

A.

The end user will receive a “User does not exist” error message.

B.

The end user will receive an “Unable to login. Contact your system administrator” error message.

C.

The end user will be able to log in and access the same set of functions as before.

D.

After successful login, the end user will be able to log in, but will encounter a blank page.

Which actions must be performed when manually hardening a SUSE server with PSM for SSH? (Choose two.)

A.

Update settings in the sshd_config file on the server.

B.

Add the PSM for SSH gateway user to the passwd file.

C.

Validate that the psmpgwuser.cred file has correct permissions.

D.

Remove all users and groups from the passwd file.

E.

Add the PSM gateway user to the wheel group.

'What is a default authentication profile to access CyberArk Identity?

A.

Default New User Login Profile

B.

Default New Device Login Profile

C.

Default New Authenticator Profile

D.

Default New Password Profile

Which file must you edit to ensure the PSM for SSH server is not hardened automatically after installation?

A.

vault.ini

B.

user.cred

C.

psmpparms

D.

psmgw.config

Refer to the exhibit.

You set up your LDAP Directory in CyberArk Identity, but encountered an error during the connection test.

Which scenarios could represent a valid misconfiguration? (Choose 2.)

A.

TCP Port 636 could be blocked by a network firewall, preventing communication between the CyberArk Identity Connector and the LDAP Server.

B.

All required CA Certificates have been installed on the CyberArk Identity Connector but the LDAP Bind credentials provided are incorrect.

C.

Verify Server Certificate' is activated but the provided hostname is not listed as a Subject Alternative Name (SAN) in the LDAP server's certificate.

D.

TCP Port 636 could be blocked by a network firewall, preventing communication between the Secure Tunnel and the LDAP Server.

Which group has only View Audit and View Safe permissions?

A.

Operators

B.

Auditors

C.

Privileged Cloud Admins

D.

Backup Users