Complete list of current Q & A>> Download CyberArk Defender PAM-DEF -Quiz 1 / 15 Category: CyberArk Defender PAM-DEF 1. When creating an onboarding rule, it will be executed upon A. All accounts in the pending accounts list B. Any future accounts discovered by a discovery process C. Both All accounts in the pending accounts list and Any future accounts discovered by a discovery process 2 / 15 Category: CyberArk Defender PAM-DEF 2. When managing SSH keys, the CPM stored the Private Key A. In the Vault B. On the target server C. A & B D. Nowhere because the private key can always be generated from the public key. 3 / 15 Category: CyberArk Defender PAM-DEF 3. Ad-Hoc Access (formerly Secure Connect) provides the following features. Choose all that apply. A. PSM connections to target devices that are not managed by CyberArk. B. Session Recording. C. Real-time live session monitoring. D. PSM connections from a terminal without the need to login to the PVWA. 4 / 15 Category: CyberArk Defender PAM-DEF 4. The Accounts Feed contains: A. Accounts that were discovered by CyberArk in the last 30 days B. Accounts that were discovered by CyberArk that have not yet been onboarded C. All accounts added to the vault in the last 30 days D. All users added to CyberArk in the last 30 days 5 / 15 Category: CyberArk Defender PAM-DEF 5. By default, members of which built-in groups will be able to view and configure Automatic Remediation and Session Analysis and Response in the PVWA? A. Vault Admins B. Security Admins C. Security Operators D. Auditors 6 / 15 Category: CyberArk Defender PAM-DEF 6. What is the purpose of a linked account? A. To ensure that a particular collection of accounts all have the same password. B. To ensure a particular set of accounts all change at the same time. C. To connect the CPNI to a target system. D. To allow more than one account to work together as part of a password management process. 7 / 15 Category: CyberArk Defender PAM-DEF 7. Secure Connect provides the following. Choose all that apply. A. PSM connections to target devices that are not managed by CyberArk. B. Session Recording C. Real-time live session monitoring. D. PSM connections from a terminal without the need to login to the PVWA 8 / 15 Category: CyberArk Defender PAM-DEF 8. Platform settings are applied to . A. The entire vault. B. Network Areas C. Safes D. Individual Accounts 9 / 15 Category: CyberArk Defender PAM-DEF 9. Which report provides a list of account stored in the vault. A. Privileged Accounts Inventory B. Privileged Accounts Compliance Status C. Entitlement Report D. Active Log 10 / 15 Category: CyberArk Defender PAM-DEF 10. For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval. A. Create an exception to the Master Policy to exclude the group from the workflow process. B. Edith the master policy rule and modify the advanced Access safe without approval rule to include the group. C. On the safe in which the account is stored grant the group the Access safe without audit authorization. D. On the safe in which the account is stored grant the group the Access safe without confirmationauthorization. 11 / 15 Category: CyberArk Defender PAM-DEF 11. What is the purpose of the Immediate Interval setting in a CPM policy? A. To control how often the CPM looks for System Initiated CPM work. B. To control how often the CPM looks for User Initiated CPM work. C. To control how often the CPM rests between password changes. D. To Control the maximum amount of time the CPM will wait for a password change to complete. 12 / 15 Category: CyberArk Defender PAM-DEF 12. VAULT authorizations may be granted to A. Vault Users B. Vault Groups C. LDAP Users D. LDAP Groups 13 / 15 Category: CyberArk Defender PAM-DEF 13. If a user is a member of more than one group that has authorizations on a safe, by default that user is granted . A. the vault will not allow this situation to occur. B. only those permissions that exist on the group added to the safe first. C. only those permissions that exist in all groups to which the user belongs. D. the cumulative permissions of all groups to which that user belongs. 14 / 15 Category: CyberArk Defender PAM-DEF 14. Which Automatic Remediation is configurable for a PTA detection of a Suspected Credential Theft ? A. Add to Pending B. Rotate Credentials C. Reconcile Credentials D. Disable Account 15 / 15 Category: CyberArk Defender PAM-DEF 15. You want to generate a license capacity report. Which tool accomplishes this? A. Password Vault Web Access B. PrivateArk Client C. DiagnoseDB Report D. RestAPI Your score is 0% Restart quiz Send feedback