Free SECRET-SEN Exam Braindumps (page: 3)

Page 2 of 16

Refer to the exhibit.

In which example will auto-failover occur?









Answer(s): B



An application is having authentication issues when trying to securely retrieve credential's from the Vault using the CCP webservices RESTAPI. CyberArk Support advised that further debugging should be enabled on the CCP server to output a trace file to review detailed logs to help isolate the problem.
What best describes how to enable debug for CCP?

  1. Edit web.config. change the "AIMWebServiceTrace" value, restart Windows Web Server (IIS)
  2. In the PVWA, go to the Applications tab, select the Application in question, go to Options > Logging and choose Debug.
  3. From the command line, run appprvmgr.exe update_config logging=debug.
  4. Edit the basic_appprovider.conf, change the "AIMWebServiceTrace" value, and restart the provider.

Answer(s): A



When working with Credential Providers in a Privileged Cloud setting, what is a special consideration?

  1. If there are installation issues, troubleshooting may need to involve the Privileged Cloud support team.
  2. Credential Providers are not supported in a Privileged Cloud setting.
  3. The AWS Cloud account number must be defined in the file main appprovider.conf.
    <platform>.<version> found in the AppProviderConf Safe.
  4. Debug logging for Credential Providers deployed in a Privileged Cloud setting can inadvertently exhaust available disk space.

Answer(s): A



While retrieving a secret through REST, the secret retrieval fails to find a matching secret. You know the secret onboarding process was completed, the secret is in the expected safe with the expected object name, and the CCP is able to provide secrets to other applications.

What is the most likely cause for this issue?

  1. The application ID or Application Provider does not have the correct permissions on the safe.
  2. The client certificate fingerprint is not trusted.
  3. The service account running the application does not have the correct permissions on the safe.
  4. The OS user does not have the correct permissions on the safe

Answer(s): A






Post your Comments and Discuss CyberArk SECRET-SEN exam with other Community members:

SECRET-SEN Discussions & Posts