Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

When performing “In Domain” hardening of a PSM server, which steps are recommended? (Choose two.)

A.

Import CyberArk policy settings from the provided file into a new GPO.

B.

Apply advanced audit on the PSM server.

C.

Apply GPO to the CyberArk PSM servers.

D.

Import an INF file to the local machine.

E.

Configure AppLocker rules to block running unknown executables.

After correctly configuring reconciliation parameters in the Prod-AIX-Root-Accounts Platform, this error message appears in the CPM log: CACPM410E Ending password policy Prod-AIX-Root-Accounts since the reconciliation task is active but the AllowedSafes parameter was not updated What caused this situation?

A.

The reconciliation account defined in the Platform is in a locked state and is not accessible.

B.

The CPM is currently configured to use to an unsigned engine.

C.

The AllowedSafes parameter does not include the safe containing the reconciliation account defined in the Platform.

D.

A second CPM is incorrectly configured to manage the reconciliation account's safe which is causing a deadlock situation between the two CPMs.

When installing PSM on a Windows 2019 Server, under which circumstances should the PSMConnect and PSMAdminConnect users be moved to the domain? (Choose two.)

A.

When RDS CAL Per User licenses are in use

B.

When the RDS session broker has a value > 1

C.

When you want to extend PSM sessions beyond one hour

D.

When you want to load balance the PSM installation

E.

When you need to enable PSM for Web Support

Which tool configures the user object that will be used during the installation of the PSM for SSH component?

A.

CreateUserPass

B.

CreateCredFile

C.

ConfigureCredFile

D.

ConfigureUserPass

What are dependencies to update or change the CPM credential? (Choose 2.)

A.

APIKeyManager.exe

B.

CreateCredFile.exe

C.

CPM/nDomain_Hardening.ps1

D.

CyberArk.TPC.exe

E.

Data Execution Prevention

You want to enforce Multi-Factor Authentication (MFA) for all Privilege Cloud Shared Services users and require them to set up an MFA factor. How should you accomplish this?

A.

Only allow SAML as the authentication method, enforce MFA on the SAML Identity Provider (IdP), and ensure users set up MFA accordingly on the IdP.

B.

Navigate to the Identity Administration Portal’s Policies section and configure the required authentication policies for CyberArk Identity.

C.

Navigate to the Identity Administration Portal’s Policies section and set the user security policy for Privilege Cloud to an authentication profile that only allows Multiple Authentication Mechanisms.

D.

Navigate to the Identity Administration Portal’s Policies section and configure the authentication policies for CyberArk Identity, adding a new authentication rule that applies with an “identity cookie” as a filter.

You are creating a PSM Load Balanced Virtual Server Configuration.

What are the default service ports / protocols used for RDS and the PSM Health Check service?

A.

RDP/389 HTTP/443

B.

RDP/3389 HTTPS/443

C UDP/53 HTTPS/389

C.

RDP/636 HTTPS/443

When calling the PSM Health Check Webservice to assess the state of a PSM node, which response code does a healthy node return?

A.

200 (OK)

B.

404 (OK)

C.

500 (OK)

D.

503 (OK)

'What is a default authentication profile to access CyberArk Identity?

A.

Default New User Login Profile

B.

Default New Device Login Profile

C.

Default New Authenticator Profile

D.

Default New Password Profile

Your customer recently merged with a smaller organization. The customer's connector has no network connectivity to the smaller organization's infrastructure. You need to map LDAP users from both your customer and the smaller organization. How is this achieved?

A.

Create the required users in one directory and configure the Identity Connector to read that directory, as there can only be one Identity Connector.

B.

Create mappings for both directories from the original Identity Connector.

C.

Deploy Identity Connectors in the newly acquired infrastructure and create user mappings.

D.

Switch all users to SAML authentication as there can only be one Identity Connector.