Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

You are implementing LDAPS Integration for a standard Privilege Cloud environment.

Which information must be provided to the CyberArk Privilege Cloud support team through a Service Request? (Choose 2.)

A.

LDAPS certificate chain for all domain controllers to be integrated

B.

LDAP bind username and password used to authenticate to the directory to be integrated

C Domain Base Context used to locate the users and groups in the Active Directory to be integrated

C.

Fully Qualified Domain Name and IP Address of the domain controllers to be integrated

D.

remote port set during secure tunnel configuration for each domain controller to be integrated

Your customer is using Privilege Cloud Shared Services. What is the correct CyberArk Vault address for this customer?

A.

carkvault-.privilegecloud.cyberark.cloud

B.

vault-.privilegecloud.cyberark.cloud

C.

v-.privilegecloud.cyberark.cloud

D.

carkvlt- privilegecloud.cyberark.cloud

Which statement is correct regarding the LDAP integration with CyberArk Privilege Cloud Standard?

A.

You must track the expiration date of the directory server certificate and contact CyberArk Support to renew it.

B.

LDAPS integration with Privilege Cloud requires StartTLS for secure and encrypted communication.

C.

For certificate trust to your directory server, only the Issuing CA certificate is required.

D.

The top-level domain entry of the directory must be unique in the chosen Privilege Cloud region.

Which statement is correct about using the AllowedSafes platform parameter?

A.

It allows users to access accounts in specific safes.

B.

It prevents the CPM from scanning all safes, restricting it to scan only safes that match the AllowedSafes configuration.

C.

It allows the CPM to access PSM safes to monitor platform configuration and connection component changes.

D.

It prevents the CPM from processing pending items in the Discovery safes enforcing manual intervention to complete the onboarding process.

'What is a default authentication profile to access CyberArk Identity?

A.

Default New User Login Profile

B.

Default New Device Login Profile

C.

Default New Authenticator Profile

D.

Default New Password Profile

Which users are Privilege Cloud Standard built-in users? (Choose 2.)

A.

NASCorp

B.

saascorps

C.

CyberArkAdmin

D.

remoteAccessAppUser

E.

PASReporterUser

In the directory lookup order, which directory service is always looked up first for the CyberArk Privilege Cloud solution?

A.

Active Directory

B.

LDAP

C.

Federated Directory

D.

CyberArk Cloud Directory

What must be done before configuring directory mappings in the CyberArk Privilege Cloud Standard Portal for LDAP integration?

A.

Retrieve the LDAPS certificate and deliver it to CyberArk.

B.

Create a new domain in the Privilege Cloud Portal.

C.

Make sure HTTPS (443/tcp) is reachable over the Secure Tunnel.

D.

Ensure the user connecting to the domain has administrative privileges.

What must be done to configure the syslog server IP address(es) for SIEM integration? (Choose 2.)

A.

Submit a service request to CyberArk Support.

B.

Update the syslog server IP address through the Privilege Cloud Portal.

C.

Update the DBPARM.ini file with the correct syslog server IP address.

D.

Update the vault.ini file with the correct syslog server IP address.

E.

Configure the Secure Tunnel for SIEM integration.

You are planning to configure Multi-Factor Authentication (MFA) for your CyberArk Privilege Cloud Shared Service. What are the available authentication methods?

A.

LDAR RADIUS. SAML OpenID Connect (OIDC)

B.

Windows. PKI. RADIUS. CyberArk, LDAP. SAML. OpenID Connect (OIDC)

C.

Privilege Cloud Shared Services fully utilize CyberArk Identity and its MFA options.

D.

Only RADIUS can be used to achieve MFA across all components, such as PSM for RDP and PSM for SSH.