Free PAM-DEF Exam Braindumps (page: 3)

Page 3 of 27

Which processes reduce the risk of credential theft? (Choose two.)

  1. require dual control password access approval
  2. require password change every X days
  3. enforce check-in/check-out exclusive access
  4. enforce one-time password access

Answer(s): C,D



You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.
How can this be con gured to allow for password management using least privilege?

  1. Con gure each CPM to use the correct logon account.
  2. Con gure each CPM to use the correct reconcile account.
  3. Con gure the UNIX platform to use the correct logon account.
  4. Con gure the UNIX platform to use the correct reconcile account.

Answer(s): C



DRAG DROP (Drag and Drop is not supported).
ADR Vault became active due to a failure of the primary Vault. Service on the primary Vault has now been restored. Arrange the steps to return the DR vault to its normal standby mode in the correct sequence.

  1. See Explanation section for answer.

Answer(s): A

Explanation:

1. Shut down the PrivateArk Server Service on the DR Vault.
2. In the PADR.ini le, set Failover Mode = No and remove the last two lines.
3. Start the PrivateArk Disaster Recovery Service.



Which methods can you use to add a user directly to the Vault Admin Group? (Choose three.)

  1. REST API
  2. PrivateArk Client
  3. PACLI
  4. PVWA
  5. Active Directory
  6. Sailpoint

Answer(s): A,B,E



Page 3 of 27



Post your Comments and Discuss CyberArk PAM-DEF exam with other Community members:

de commented on August 28, 2023
please continue
GERMANY
upvote

John commented on December 23, 2023
Will review all questions first
UNITED STATES
upvote