Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CyberArk CPC-CDE-RECERT CyberArk CDE-CPC Recertification Exam Practice Test

Demo: 29 questions
Total 99 questions

CyberArk CDE-CPC Recertification Questions and Answers

Question 1

Which ports do the CyberArk Identity Connector require to be opened to support using Active Directory for LDAP authentication to Privileged Cloud Shared Services? (Choose two.)

Options:

A.

TCP 636 from the connector host to the domain controller

B.

TCP 443 from the connector host to the CyberArk Tenant

C.

TCP 636 from the CyberArk Tenant to the domain controller

D.

TCP 443 from the CyberArk Tenant to the connector host

E.

TCP 636 from the domain controller to the CyberArk Tenant

Question 2

When installing the first CPM within Privilege Cloud using the Connector Management Agent, what should you set the Installation Mode to in the CPM section?

Options:

A.

Active

B.

Passive

C.

Default

D.

Primary

Question 3

Which statements accurately describe the process of LDAP integration with CyberArk Privilege Cloud Standard? (Choose two.)

Options:

A.

Directory maps determine user or group creation within the Privilege Cloud Vault.

B.

A tailored Python script is required to facilitate the LDAP server interaction.

C.

Upon user login, their directory attributes are refreshed through the directory map.

D.

For establishing a connection, the domain base context is not a prerequisite.

E.

The LDAP BIND user requires domain administrative privileges for a successful connection.

Question 4

Which authentication methods does PSM for SSH support? (Choose 2.)

Options:

A.

OIDC

B.

MFA Caching

C.

SAML

D.

RADIUS

E.

Client Authentication Certificate

Question 5

You are implementing LDAPS Integration for a standard Privilege Cloud environment.

Which information must be provided to the CyberArk Privilege Cloud support team through a Service Request? (Choose 2.)

Options:

A.

LDAPS certificate chain for all domain controllers to be integrated

B.

LDAP bind username and password used to authenticate to the directory to be integrated

C Domain Base Context used to locate the users and groups in the Active Directory to be integrated

C.

Fully Qualified Domain Name and IP Address of the domain controllers to be integrated

D.

remote port set during secure tunnel configuration for each domain controller to be integrated

Question 6

How can a platform be configured to work with load-balanced PSMs?

Options:

A.

Remove all entries from configured PSM Servers except for the ID of the PSMs with load balancing.

B.

Create a new PSM definition that targets the load balancer IP address and assign to the platform.

C.

Include details of the PSMs with load balancing in the Basic_psm.ini file on each PSM server.

D.

Use the Privilege Cloud Portal to update the Session Management settings for the platform in the Master Policy.

Question 7

Which file must you edit to ensure the PSM for SSH server is not hardened automatically after installation?

Options:

A.

vault.ini

B.

user.cred

C.

psmpparms

D.

psmgw.config

Question 8

You plan to install Privilege Cloud Connectors on your AWS and Azure environments.

What is the maximum number of concurrent RDP/SSH sessions that each connector can handle for Large Implementations?

Options:

A.

1-10

B.

31-60

C.

100

D.

200

Question 9

When performing “In Domain” hardening of a PSM server, which steps are recommended? (Choose two.)

Options:

A.

Import CyberArk policy settings from the provided file into a new GPO.

B.

Apply advanced audit on the PSM server.

C.

Apply GPO to the CyberArk PSM servers.

D.

Import an INF file to the local machine.

E.

Configure AppLocker rules to block running unknown executables.

Question 10

What is a requirement when installing the PSM on multiple Privileged Cloud Connector servers?

Options:

A.

Each PSM must have the same path to the same recordings directory.

B.

All PSMs in the environment must be configured to use load balancing.

C.

Additional Privilege Cloud Connector servers cannot have CPM installed.

D.

In-domain servers cannot be used when deploying multiple PSM servers.

Question 11

After correctly configuring reconciliation parameters in the Prod-AIX-Root-Accounts Platform, this error message appears in the CPM log: CACPM410E Ending password policy Prod-AIX-Root-Accounts since the reconciliation task is active but the AllowedSafes parameter was not updated What caused this situation?

Options:

A.

The reconciliation account defined in the Platform is in a locked state and is not accessible.

B.

The CPM is currently configured to use to an unsigned engine.

C.

The AllowedSafes parameter does not include the safe containing the reconciliation account defined in the Platform.

D.

A second CPM is incorrectly configured to manage the reconciliation account's safe which is causing a deadlock situation between the two CPMs.

Question 12

What creating a new safe, what is the default number of password versions stored if using 'Save latest account versions' within version management settings?

Options:

A.

5

B.

10

C.

30

D.

90

Question 13

Which group has only View Audit and View Safe permissions?

Options:

A.

Operators

B.

Auditors

C.

Privileged Cloud Admins

D.

Backup Users

Question 14

You have been tasked with deploying a Privilege Cloud PSM for SSH connector When the initial installation has successfully completed, you create and permission several maintenance users to be used for administering the connector.

Which configuration file must be updated to define these maintenance users?

Options:

A.

sshd.config

B.

basic_psmpserver.conf

C.

sshd_config

D.

psmpparms

Question 15

Which components can be installed when running the Privilege Cloud Connector installation package? (Choose two.)

Options:

A.

Privileged Session Manager (PSM)

B.

Central Policy Manager (CPM)

C.

Secure Tunnel

D.

Central Credential Provider (CCP)

E.

Privileged Session Manager for SSH (PSM for SSH)

Question 16

What is the recommended method to enable load balancing and failover of the CyberArk Identity Connector?

Options:

A.

Setup IIS based Application Request Routing on two or more CyberArk Identity Connector servers.

B.

Set up a network load balancer between two or more CyberArk Identity Connector servers.

C.

Set up two or more CyberArk Identity Connector servers only.

D.

Set up a Microsoft Failover Cluster on two or more CyberArk Identity Connector servers.

Question 17

Which statement best describes a PSM server's network requirements?

Options:

A.

It must reach the target system using its native protocols.

B.

It requires limited outbound connectivity to Ports 1858 and 443 only.

C.

It requires direct access to the internet.

D.

It requires broad inbound firewall rules and outbound traffic should be limited to Port 1858.

Question 18

Which Safe(s) does the AllowedSafes=Win platform parameter configuration match? (Choose two.)

Options:

A.

WindowsPasswords

B.

win-ssh-keys

C.

CXD-WIN-ADMINS

D.

SQL-Win-SA

E.

WiNdOwS_Accts

Question 19

An end user (external user account) has been removed from the Users tab in CyberArk Identity Administration and tries to log in to the CyberArk Privilege Cloud portal using the correct credentials. What will happen?

Options:

A.

The end user will receive a “User does not exist” error message.

B.

The end user will receive an “Unable to login. Contact your system administrator” error message.

C.

The end user will be able to log in and access the same set of functions as before.

D.

After successful login, the end user will be able to log in, but will encounter a blank page.

Question 20

Arrange the steps to install a passive CPM using the Privilege Cloud installer in the correct sequence.

Options:

Question 21

During CPM hardening, which locally created users are granted Logon as a Service rights in the local group policy? (Choose 2.)

Options:

A.

PasswordManager

B.

PluginManagerUser

C.

ScannerUser

D.

PasswordManagerUser

E.

CPMServiceAccount

Question 22

What is a requirement for increasing the redundancy of PSMs?

Options:

A.

Use a load balancer.

B.

Set it by adding parameters to the basic_PSM.ini configuration file.

C.

CPM must be in all data centers.

D.

Install the Vault in an HA cluster.

Question 23

When calling the PSM Health Check Webservice to assess the state of a PSM node, which response code does a healthy node return?

Options:

A.

200 (OK)

B.

404 (OK)

C.

500 (OK)

D.

503 (OK)

Question 24

'What is a default authentication profile to access CyberArk Identity?

Options:

A.

Default New User Login Profile

B.

Default New Device Login Profile

C.

Default New Authenticator Profile

D.

Default New Password Profile

Question 25

You are designing a CyberArk Privilege Cloud environment for a new customer with three data center locations: one in London, one in New York, and one in Singapore. The customer wants to reduce the amount of traffic on their dedicated network links between each data center. Which design should you consider to manage their credentials?

Options:

A.

Deploy CPM connectors in each data center and configure region specific Safes.

B.

Deploy a CPM connector in London and increase the number of days between password changes.

C.

Deploy three CPM connectors in New York, and configure region specific Safes to send traffic equally to each connector CPM.

D.

Deploy CPM connectors in a single data center because the password management traffic is routed through the Privilege Cloud service.

Question 26

Which prerequisites are required for installing PSM for SSH (Unix Connector)? (Choose two.)

Options:

A.

Create the PSM for SSH parameters file on the Unix server with InstallCyberArkSSHD = Integrated.

B.

Configure the root user to not authenticate to the Unix server remotely through SSH using a password.

C.

Verify that outbound traffic from the Unix server is always routed through the same public-facing IP.

D.

Create an administrative user on the Unix server for future maintenance tasks.

E.

Reset the default root account password before installing the PSM for SSH.

Question 27

Which statement is correct regarding the LDAP integration with CyberArk Privilege Cloud Standard?

Options:

A.

You must track the expiration date of the directory server certificate and contact CyberArk Support to renew it.

B.

LDAPS integration with Privilege Cloud requires StartTLS for secure and encrypted communication.

C.

For certificate trust to your directory server, only the Issuing CA certificate is required.

D.

The top-level domain entry of the directory must be unique in the chosen Privilege Cloud region.

Question 28

Which statements are correct regarding LDAP integration in Privilege Cloud Shared Services? (Choose two.)

Options:

A.

LDAP integration can be configured in the Privilege Cloud web interface under Administration > Configuration Options > LDAP Integration.

B.

A Secure Tunnel installation is required to access the on-premises LDAP directory.

C.

The Privilege Cloud PAM leverages the directory services integration of CyberArk Identity.

D.

The CA certificate that issued the LDAP server’s Server Authentication certificate must be trusted on the machine running the CyberArk Identity Connector.

E.

The CA certificate that issued the LDAP server’s Server Authentication certificate must be provided to CyberArk Support.

Question 29

You are creating a PSM Load Balanced Virtual Server Configuration.

What are the default service ports / protocols used for RDS and the PSM Health Check service?

Options:

A.

RDP/389 HTTP/443

B.

RDP/3389 HTTPS/443

C UDP/53 HTTPS/389

C.

RDP/636 HTTPS/443

Demo: 29 questions
Total 99 questions