Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
A. Discovery and Audit (DMA)
B. Auto Detection (AD)
C. Export Vault Data (EVD)
D. On Demand Privileges Manager (OPM)
E. Accounts Discovery
Which Automatic Remediation is configurable for a PTA detection of a "Suspected Credential Theft"?
A. Add to Pending
B. Rotate Credentials
C. Reconcile Credentials
D. Disable Account
Ad-Hoc Access (formerly Secure Connect) provides the following features. Choose all that apply.
A. PSM connections to target devices that are not managed by CyberArk.
B. Session Recording.
C. Real-time live session monitoring.
D. PSM connections from a terminal without the need to login to the PVWA.
In a default CyberArk installation, which group must a user be a member of to view the "reports" page in PVWA?
A. PVWAMonitor
B. ReportUsers
C. PVWAReports
D. Operators
You are creating a shared safe for the help desk.
What must be considered regarding the naming convention?
A. Ensure your naming convention is no longer than 20 characters.
B. Combine environments, owners and platforms to minimize the total number of safes created.
C. Safe owners should determine the safe name to enable them to easily remember it.
D. The use of these characters V:*<>".| is not allowed.
A company requires challenge/response multi-factor authentication for PSMP sessions. Which server must you integrate with the CyberArk vault?
A. LDAP
B. PKI
C. SAML
D. RADIUS
Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests.
A. HeadStartInterval
B. Interval
C. ImmediateInterval
D. The CPM does not change the password under this circumstance
PTA can automatically suspend sessions if suspicious activities are detected in a privileged session, but only if the session is made via the CyberArk PSM.
A. True
B. False, the PTA can suspend sessions whether the session is made via the PSM or not
Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?
A. Password change
B. Password reconciliation
C. Session suspension
D. Session termination
If the AccountUploader Utility is used to create accounts with SSH keys, which parameter do you use to set the full or relative path of the SSH private key file that will be attached to the account?
A. KeyPath
B. KeyFile
C. ObjectName
D. Address
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PAM-CDE-RECERT exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.