Complete list of current Q & A>> Download CyberArk Sentry – PAM-SEN – Quiz 1 / 15 Category: CyberArk Sentry – PAM-SEN 1. You are configuring SNMP remote monitoring for your organization’s Vault servers. In the PARAgent.ini, which parameter specifies the destination of the Vault SNMP traps? A. SNMPHostIP B. SNMPTrapPort C. SNMPCommunity D. SNMPVersion 2 / 15 Category: CyberArk Sentry – PAM-SEN 2. There is a requirement for a password to change between 01:00 and 03:00 on Saturdays and Sundays; however, this does not work consistently. Which platform setting may be the cause? A. The Interval setting for the platform is incorrect and must be less than 120. B. The ImmediateInterval setting for the platform is incorrect and must be greater than or equal to 1. C. The DaysToRun setting for the platform is incorrect and must be set to Sat,Sun. D. The HeadStartInterval setting for the platform is incorrect and must be set to 0. 3 / 15 Category: CyberArk Sentry – PAM-SEN 3. During the PSM installation process, Safes and a User are created. In addition to Add Safes, Add/Update Users, Reset Users’ Passwords, and Activate Users, which authorization(s) does the Vault user installing the PSM need to enable them to be successfully created? A. Manage Vault File Categories B. Manage Server File Categories C. Manage Directory Mapping, Manage Server File Categories D. Manage Directory Mapping, Manage Vault File Categories 4 / 15 Category: CyberArk Sentry – PAM-SEN 4. You are successfully managing passwords in the alpha cyberark com domain; however, when you attempt to manage a password in the beta cyberark com domain, you receive the ‘network path not found’ error. What should you check first? A. That the username and password are correct B. That the CPM can successfully resolve addresses in the beta cyberark com domain C. That the end user has the correct permissions on the safe. D. That an appropriate trust relationship exists between alpha.cyberark com and beta cyberark.com 5 / 15 Category: CyberArk Sentry – PAM-SEN 5. By default, the vault secure protocol uses which IP port and protocol. A. TCP8 B. TCP C. UDP8 D. TCP 6 / 15 Category: CyberArk Sentry – PAM-SEN 6. What would be a good use case for a High Availability vault? A. Recovery Time Objectives or Recovery Point Objectives are at or near zero. B. Integration with an Enterprise Backup Solution is required. C. Off site replication is required D. PSM is used. 7 / 15 Category: CyberArk Sentry – PAM-SEN 7. If a transparent user matches two different directory mappings, how does the system determine which user template to use? A. The system will use the template for the mapping listed first. B. The system will use the template for the mapping listed last. C. The system will grant all of the vault authorizations from the two templates. D. The system will grant only the vault authorizations that are listed in both templates 8 / 15 Category: CyberArk Sentry – PAM-SEN 8. What is the purpose of the password Reconcile process? A. To test that CyberArk is storing accurate credentials for accounts. B. To change the password of an account according to organizationally defined password rules C. To allow CyberArk to manage unknown or lost credentials. D. To generate a new complex password. 9 / 15 Category: CyberArk Sentry – PAM-SEN 9. What would be a good use case for the Replicate module? A. Recovery Time Objectives or Recovery Point Objectives are at or near zero B. Integration with an Enterprise Backup Solution is required. C. Off site replication is required. D. PSM is used 10 / 15 Category: CyberArk Sentry – PAM-SEN 10. The account used to install a PVWA must have ownership of which safes? (Choose two.) A. VaultInternal B. PVWAConfig C. System D. Notification Engine E. PVWAReports 11 / 15 Category: CyberArk Sentry – PAM-SEN 11. What is required before the first CPM can be installed? A. The environment must have at least one Vault and one PVWA installed. B. The Vault environment must have at least one account stored in a safe. C. Custom platforms must be downloaded from the CyberArk Marketplace. D. The PSM component must be installed and proper functionality validated. 12 / 15 Category: CyberArk Sentry – PAM-SEN 12. As Vault Admin, you have been asked to enable your organization’s CyberArk users to authenticate using LDAP. In addition to Audit Users, which permission do you need to complete this task? A. Add Network Areas B. Manage Directory Mapping C. Add/Update Users D. Activate Users 13 / 15 Category: CyberArk Sentry – PAM-SEN 13. What is the recommended method to determine if a PVWA is unavailable and should be disabled in a load balancing pool? A. Monitor Port 443 on the PVWA server B. Monitor Port 1858 on the PVWA server C. Ping the PVWA server D. Monitor Port 3389 on the PVWA server 14 / 15 Category: CyberArk Sentry – PAM-SEN 14. What is determined by the “MaxConcurrentConnections” setting within a platform? A. maximum number of concurrent connections that can be opened between the CPM and the remote machines for the platform B. maximum number of concurrent connections that can be between the PSM and the remote machines for the platform C. maximum number of concurrent connections allowed for a specific account on the platform through the PSM D. maximum number of concurrent connections to the Vault allowed for sending audit activities relating to the platform 15 / 15 Category: CyberArk Sentry – PAM-SEN 15. What must you do to synchronize a new Vault server with an organization’s NTP server? A. Configure an AllowNonStandardFWAddresses rule for the organization's NTP server in DBParm.ini on the Vault server. B. Use the Windows Firewall console to configure a rule on the Vault server which allows communication with the organization's NTP server. C. Ensure the organization's NTP server is installed in the same location as the Vault server requiring synchronization. D. Update the AutoSyncExternalObjects configuration in DBParm.ini on the Vault server to schedule regular synchronization. Your score is 0% Restart quiz Send feedback