Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: clap70

CPC-CDE-RECERT CyberArk CDE-CPC Recertification Questions and Answers

Questions 4

How should you configure PSM for SSH to support load balancing?

Options:

A.

by using a network load balancer

B.

in PVWA > Options > PSM for SSH Proxy > Servers

C.

in PVWA > Options > PSM for SSH Proxy > Servers > VIP

D.

by editing sshd.config on the all the PSM for SSH servers

Buy Now
Questions 5

Which method can be used to directly authenticate users to PSM for SSH? (Choose three.)

Options:

A.

CyberArk authentication

B.

LDAP authentication

C.

RADIUS authentication

D.

Windows authentication

E.

SAML authentication

F.

OpenID Connect (OIDC) authentication

Buy Now
Questions 6

Before you can delete a Safe, you must first delete all of its content (accounts and files) permanently. What else must also be achieved before the Safe can be successfully deleted?

Options:

A.

The Safe owners have been removed from the Safe membership.

B.

The version retention period has expired for all files.

C.

The associated CPM user has been removed from the Safe.

D.

The “Save account versions for a period of:” has been set to 0 within the Safe version retention settings.

Buy Now
Questions 7

What is the purpose of the HTML5 Gateway in CyberArk Remote Access Architecture when integrated with Privilege Cloud?

Options:

A.

It tunnels the session between the Remote Access Connector and the Privileged Session Manager.

B.

It authenticates connections between the Remote Access Cloud Service and the customer's Privilege Cloud environment.

C.

It provides VPN access to critical target systems.

D.

It combines Zero Trust access along with biometric authentication and seamless just-in-time provisioning for remote vendors connecting to CyberArk Privilege Cloud.

Buy Now
Questions 8

CyberArk User Neil is trying to connect to the Target Linux server 192.168.1.164 using a domain user ACME\linuxuser01 on domain acme.corp using PSM for SSH server

192.168.65.145.

What is the correct syntax?

Options:

A.

ssh neil@linuxuser01:acme.corp@192.168.1.164@192.168.65.145

B.

ssh neil@linuxuser01#acme.corp@192.168.1.164@192.168.65.145

C.

sshneil@linuxuser01@192.168.1.164@192.168.65.145

D.

ssh neil@linuxuser01@acme.corp@192.168.1.164@192.168.65.145

Buy Now
Questions 9

In addition to the Vault Admins and Auditors, what are the default map roles in the Privilege Cloud LDAP Directory mapping function for the Privilege Cloud Standard Services Model? (Choose two.)

Options:

A.

Safe Managers

B.

Safe Owners

C.

Privileged Cloud Users

D.

Users

Buy Now
Questions 10

Which actions must be performed when manually hardening a SUSE server with PSM for SSH? (Choose two.)

Options:

A.

Update settings in the sshd_config file on the server.

B.

Add the PSM for SSH gateway user to the passwd file.

C.

Validate that the psmpgwuser.cred file has correct permissions.

D.

Remove all users and groups from the passwd file.

E.

Add the PSM gateway user to the wheel group.

Buy Now
Questions 11

Arrange the steps to failover to the passive CPM in the correct sequence.

Options:

Buy Now
Questions 12

On Privilege Cloud, what can you use to update users' Permissions on Safes? (Choose 2.)

Options:

A.

Privilege Cloud Portal

B.

PrivateArk Client

C.

REST API

D.

PACLI

E.

PTA

Buy Now
Questions 13

Which authentication methods does PSM for SSH support? (Choose 2.)

Options:

A.

OIDC

B.

MFA Caching

C.

SAML

D.

RADIUS

E.

Client Authentication Certificate

Buy Now
Questions 14

The Secure Tunnel component of CyberArk Privilege Cloud connects to which services in the CyberArk Privilege Cloud? (Choose two.)

Options:

A.

https://console.privilegecloud.cyberark.cloud

B.

https://connector- .privilegecloud.cyberark.cloud

C.

https://backend-services.privilegecloud.cyberark.cloud

D.

https://telemetry.privilegecloud.cyberark.cloud

E.

https://update.privilegecloud.cyberark.cloud

Buy Now
Questions 15

Which statements accurately describe the process of LDAP integration with CyberArk Privilege Cloud Standard? (Choose two.)

Options:

A.

Directory maps determine user or group creation within the Privilege Cloud Vault.

B.

A tailored Python script is required to facilitate the LDAP server interaction.

C.

Upon user login, their directory attributes are refreshed through the directory map.

D.

For establishing a connection, the domain base context is not a prerequisite.

E.

The LDAP BIND user requires domain administrative privileges for a successful connection.

Buy Now
Questions 16

According to best practice, when considering the location of PSM Connector servers in Privilege Cloud environments, where should the PSM be placed?

Options:

A.

near the CPM servers

B.

near the target devices

C.

near the Vault (closer to the external internet connection)

D.

near the Users

Buy Now
Questions 17

How many assertions are supported by Privilege Cloud in a SAML integration?

Options:

A.

1

B.

2

C.

3

D.

Unlimited

Buy Now
Questions 18

What must be specified when authenticating to Privilege Cloud during the Secure Tunnel install?

Options:

A.

Vault IP Address

B.

Subdomain or Customer ID

C.

Privilege Cloud URL

D.

CaseID

Buy Now
Questions 19

You are configuring an integration to provision users based on LDAP directory services for Privilege Cloud Shared Services. Which component must first be installed and configured in the environment to support this?

Options:

A.

CyberArk Identity Connector

B.

Secure Tunnel

C.

Privilege Cloud Connector

D.

Linux Connector Server

Buy Now
Questions 20

You need to map an enterprise’s Active Directory to Privilege Cloud Shared Services to enable users to log in to CyberArk through their LDAP credentials. What do you need to accomplish this? (Choose two.)

Options:

A.

Read-only domain user to facilitate the LDAP mapping

B.

Installation and configuration of the Identity Connector

C.

Port 636 open to the Privilege Cloud back-end

D.

Trusted certificate for LDAP server installed on Identity Connector

E.

Configuration of a Federated Domain on the Identity Platform

Buy Now
Questions 21

Which deployment criteria influences the CyberArk-provided hardening methods that need to be applied to CPM and PSM components?

Options:

A.

“In Domain” and “Out of Domain”

B.

“On Premises” and “On Cloud”

C.

“Windows” and “Linux”

D.

“Primary Privilege Cloud Connector” and “additional Privilege Cloud Connector”

Buy Now
Questions 22

Which ports do the CyberArk Identity Connector require to be opened to support using Active Directory for LDAP authentication to Privileged Cloud Shared Services? (Choose two.)

Options:

A.

TCP 636 from the connector host to the domain controller

B.

TCP 443 from the connector host to the CyberArk Tenant

C.

TCP 636 from the CyberArk Tenant to the domain controller

D.

TCP 443 from the CyberArk Tenant to the connector host

E.

TCP 636 from the domain controller to the CyberArk Tenant

Buy Now
Questions 23

Before the hardening process, your customer identified a PSM Universal Connector executable that will be required to run on the PSM. Which file should you update to allow this to run?

Options:

A.

PSMConfigureAppLocker.xml

B.

PSMHardening.xml

C.

PSMAppConfig.xml

D.

PSMConfigureHardening xml

Buy Now
Questions 24

The System Health page shows the status of all components related to Privilege Cloud. Which components can administrators monitor on this page? (Choose two.)

Options:

A.

Vault

B.

PTA

C.

PVWA

D.

CPM

E.

PSM

Buy Now
Questions 25

Which users are Privilege Cloud Standard built-in users? (Choose 2.)

Options:

A.

NASCorp

B.

saascorps

C.

CyberArkAdmin

D.

remoteAccessAppUser

E.

PASReporterUser

Buy Now
Questions 26

Which statement best describes a PSM server's network requirements?

Options:

A.

It must reach the target system using its native protocols.

B.

It requires limited outbound connectivity to Ports 1858 and 443 only.

C.

It requires direct access to the internet.

D.

It requires broad inbound firewall rules and outbound traffic should be limited to Port 1858.

Buy Now
Questions 27

Your customer is using Privilege Cloud Shared Services. What is the correct CyberArk Vault address for this customer?

Options:

A.

carkvault-.privilegecloud.cyberark.cloud

B.

vault-.privilegecloud.cyberark.cloud

C.

v-.privilegecloud.cyberark.cloud

D.

carkvlt- privilegecloud.cyberark.cloud

Buy Now
Questions 28

'What is a default authentication profile to access CyberArk Identity?

Options:

A.

Default New User Login Profile

B.

Default New Device Login Profile

C.

Default New Authenticator Profile

D.

Default New Password Profile

Buy Now
Questions 29

When performing “In Domain” hardening of a PSM server, which steps are recommended? (Choose two.)

Options:

A.

Import CyberArk policy settings from the provided file into a new GPO.

B.

Apply advanced audit on the PSM server.

C.

Apply GPO to the CyberArk PSM servers.

D.

Import an INF file to the local machine.

E.

Configure AppLocker rules to block running unknown executables.

Buy Now
Exam Code: CPC-CDE-RECERT
Exam Name: CyberArk CDE-CPC Recertification
Last Update: Feb 28, 2026
Questions: 99
CPC-CDE-RECERT pdf

CPC-CDE-RECERT PDF

$25.5  $84.99
CPC-CDE-RECERT Engine

CPC-CDE-RECERT Testing Engine

$30  $99.99
CPC-CDE-RECERT PDF + Engine

CPC-CDE-RECERT PDF + Testing Engine

$40.5  $134.99