Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is recommended when applying GPO (Group Policy Object) hardening for in-domain PSM servers?

A.

Apply the GPO provided by CyberArk onto the servers after other GPOs.

B.

Apply the GPO hardening to all hosts that end-users will connect to through the PSM.

C.

After installation, remove the PSM servers from the domain to maximize security.

D.

Place the servers which have PSM installed into a dedicated organizational unit (OU).

Which statement is correct about using the AllowedSafes platform parameter?

A.

It allows users to access accounts in specific safes.

B.

It prevents the CPM from scanning all safes, restricting it to scan only safes that match the AllowedSafes configuration.

C.

It allows the CPM to access PSM safes to monitor platform configuration and connection component changes.

D.

It prevents the CPM from processing pending items in the Discovery safes enforcing manual intervention to complete the onboarding process.

What are the basic network requirements to deploy a CPM server?

A.

Port 1858 to the Privilege Cloud Vault service backend and Port 443 to the Privilege Cloud Portal

B.

Port 1858 only

C.

any ports to the Privilege Cloud Vault service backend

D.

Port UDP/1858 to the Privilege Cloud Vault service backend and all required ports to the targets and Port 3389 to the PSM

Which statement is correct regarding the LDAP integration with CyberArk Privilege Cloud Standard?

A.

You must track the expiration date of the directory server certificate and contact CyberArk Support to renew it.

B.

LDAPS integration with Privilege Cloud requires StartTLS for secure and encrypted communication.

C.

For certificate trust to your directory server, only the Issuing CA certificate is required.

D.

The top-level domain entry of the directory must be unique in the chosen Privilege Cloud region.

Before you can delete a Safe, you must first delete all of its content (accounts and files) permanently. What else must also be achieved before the Safe can be successfully deleted?

A.

The Safe owners have been removed from the Safe membership.

B.

The version retention period has expired for all files.

C.

The associated CPM user has been removed from the Safe.

D.

The “Save account versions for a period of:” has been set to 0 within the Safe version retention settings.

In which platform configuration section under Automatic Password Management is the AllowedSafes platform parameter found?

A.

Privileged Account Management

B.

Additional Policy Settings

C.

General

D.

CPM plugin

Following the installation of the PSM for SSH server, which additional tasks should be performed? (Choose 2.)

A.

Delete the user.cred file used during installation.

B.

Delete the vault.ini you used during installation.

C.

Delete the psmpparms file you used during installation.

D.

Package all installation log files for upload to CyberArk.

What is determined by the MaxConcurrentConnections setting within a platform?

A.

Maximum number of concurrent connections that can be opened between the CPM and the remote machines for the platform

B.

Maximum number of concurrent connections that can be between the PSM and the remote machines for the platform

C.

Maximum number of concurrent connections allowed for a specific account on the platform through the PSM

D.

Maximum number of concurrent connections to the Vault allowed for sending audit activities relating to the platform

Your customer is using Privilege Cloud Shared Services. What is the correct CyberArk Vault address for this customer?

A.

carkvault-.privilegecloud.cyberark.cloud

B.

vault-.privilegecloud.cyberark.cloud

C.

v-.privilegecloud.cyberark.cloud

D.

carkvlt- privilegecloud.cyberark.cloud

You are configuring firewall rules between the Privilege Cloud components and the Privilege Cloud. Which firewall rules should be set up to allow connections?

A.

from the CyberArk Privilege Cloud to the Privilege Cloud components

B.

from the Privilege Cloud components to the CyberArk Privilege Cloud

C bi-directionally between the Privilege Cloud components and the CyberArk Privilege cloud

C.

from the Privilege Cloud components to CyberArk.com