Which tools are used during a CPM renaming process?
A. APIKeyManager Utility
B. CreateCredFile Utility
C. CPMinDomain_Hardening.ps1
D. PMTerminal.exe
E. Data Execution Prevention
The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys.
How are these keys managed?
A. CyberArk stores Private keys in the Vault and updates Public keys on target systems.
B. CyberArk stores Public keys in the Vault and updates Private keys on target systems.
C. CyberArk does not store Public or Private keys and instead uses a reconcile account to create keys on demand.
D. CyberArk stores both Private and Public keys and can update target systems with either key.
Accounts Discovery allows secure connections to domain controllers.
A. TRUE
B. FALSE
Which command configures email alerts within PTA if settings need to be changed post install?
A. /opt/tomcat/utility/emailConfiguration.sh
B. /opt/PTA/emailConfiguration.sh
C. /opt/PTA/utility/emailConfig.sh
D. /opt/tomcat/utility/emailSetup.sh
How does the Vault administrator apply a new license file?
A. Upload the license.xml file to the system Safe and restart the PrivateArk Server service
B. Upload the license.xml file to the system Safe
C. Upload the license.xml file to the Vault Internal Safe and restart the PrivateArk Server service
D. Upload the license.xml file to the Vault Internal Safe
What are the basic network requirements to deploy a CPM server?
A. Port 1858 to Vault and port 443 to PVWA
B. Port 1858 only
C. All ports to the vault
D. Port UDP/1858 to vault and all required ports to the targets and port 389 to the PSM.
Via Password Vault Web Access (PVWA), a user initiates a PSM connection to the target Linux machine using RemoteApp. When the client's machine makes an RDP connection to the PSM server, which user will be utilized?
A. Credentials stored in the Vault for the target machine
B. Shadowuser
C. PSMConnect
D. PSMAdminConnect
To manage automated onboarding rules, a CyberArk user must be a member of which group?
A. Vault Admins
B. CPM User
C. Auditors
D. Administrators
When managing SSH keys, the CPM stores the Public Key
A. In the Vault
B. On the target server
C. A and B
D. Nowhere because the public key can always be generated from the private key.
In a rule using "Privileged Session Analysis and Response" in PTA, which session options are available to configure as responses to activities?
A. Suspend, Terminate, None
B. Suspend, Terminate, Lock Account
C. Pause, Terminate, None
D. Suspend, Terminate
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your PAM-CDE-RECERT exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.