Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

How can a platform be configured to work with load-balanced PSMs?

A.

Remove all entries from configured PSM Servers except for the ID of the PSMs with load balancing.

B.

Create a new PSM definition that targets the load balancer IP address and assign to the platform.

C.

Include details of the PSMs with load balancing in the Basic_psm.ini file on each PSM server.

D.

Use the Privilege Cloud Portal to update the Session Management settings for the platform in the Master Policy.

Full Access
Question # 5

Which option correctly describes the authentication differences between CyberArk Privilege Cloud and CyberArk PAM Self-Hosted?

A.

CyberArk Privilege Cloud only provides a username and password authentication without third-party IdP integration; CyberArk PAM Self-Hosted uses traditional on-premises methods such as Windows and LDAP. but lacks modern protocols such as SAML or OIDC.

B.

CyberArk Privilege Cloud uses cloud-based methods, integrating with CyberArk Identity for MFA. and supports SAML and OIDC; CyberArk PAM Self-Hosted depends on on-premises methods such as RADIUS and LDAP, but can adopt SAML or OIDC with additional setups.

C.

CyberArk Privilege Cloud requires on-premises components for all authentication and does not support other cloud-based authentication protocols; CyberArk PAM Self-Hosted offers a wide array of methods, including support for SAML. OIDC. and other modern protocols, without needing on-premises components.

D.

Both use the same authentication methods.

Full Access
Question # 6

Refer to the exhibit.

You set up your LDAP Directory in CyberArk Identity, but encountered an error during the connection test.

Which scenarios could represent a valid misconfiguration? (Choose 2.)

A.

TCP Port 636 could be blocked by a network firewall, preventing communication between the CyberArk Identity Connector and the LDAP Server.

B.

All required CA Certificates have been installed on the CyberArk Identity Connector but the LDAP Bind credentials provided are incorrect.

C.

Verify Server Certificate' is activated but the provided hostname is not listed as a Subject Alternative Name (SAN) in the LDAP server's certificate.

D.

TCP Port 636 could be blocked by a network firewall, preventing communication between the Secure Tunnel and the LDAP Server.

Full Access
Question # 7

Arrange the steps to install passive CPM using Connector Management in the correct sequence

Full Access
Question # 8

What is a requirement when installing the PSM on multiple Privileged Cloud Connector servers?

A.

Each PSM must have the same path to the same recordings directory.

B.

All PSMs in the environment must be configured to use load balancing.

C.

Additional Privilege Cloud Connector servers cannot have CPM installed.

D.

In-domain servers cannot be used when deploying multiple PSM servers.

Full Access
Question # 9

Which tool configures the user object that will be used during the installation of the PSM for SSH component?

A.

CreateUserPass

B.

CreateCredFile

C.

ConfigureCredFile

D.

ConfigureUserPass

Full Access
Question # 10

What must be done before configuring directory mappings in the CyberArk Privilege Cloud Standard Portal for LDAP integration?

A.

Retrieve the LDAPS certificate and deliver it to CyberArk.

B.

Create a new domain in the Privilege Cloud Portal.

C.

Make sure HTTPS (443/tcp) is reachable over the Secure Tunnel.

D.

Ensure the user connecting to the domain has administrative privileges.

Full Access
Question # 11

In the directory lookup order, which directory service is always looked up first for the CyberArk Privilege Cloud solution?

A.

Active Directory

B.

LDAP

C.

Federated Directory

D.

CyberArk Cloud Directory

Full Access
Question # 12

Arrange the steps to failover to the passive CPM in the correct sequence.

Full Access
Question # 13

'What is a default authentication profile to access CyberArk Identity?

A.

Default New User Login Profile

B.

Default New Device Login Profile

C.

Default New Authenticator Profile

D.

Default New Password Profile

Full Access
Question # 14

In large-scale environments, it is important to enable the CPM to focus its search operations on specific Safes instead of scanning all Safes it sees in the Vault. How is this accomplished?

A.

Administration Options > CPM Settings

B.

AllowedSafes Parameter on each platform policy

C.

MaxConcurrentConnection parameter on each platform policy

D.

Administration > Options > CPM Scanner.

Full Access
Question # 15

What is the recommended method to enable load balancing and failover of the CyberArk Identity Connector?

A.

Setup IIS based Application Request Routing on two or more CyberArk Identity Connector servers.

B.

Set up a network load balancer between two or more CyberArk Identity Connector servers.

C.

Set up two or more CyberArk Identity Connector servers only.

D.

Set up a Microsoft Failover Cluster on two or more CyberArk Identity Connector servers.

Full Access