Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

PAM-SEN CyberArk Sentry PAM Questions and Answers

Questions 4

Which components support load balancing? (Choose two.)

Options:

A.

CPM

B.

PVWA

C.

PSM

D.

PTA

E.

EPV

Buy Now
Questions 5

You need to add a new PSM server to an existing CyberArk environment.

What is the best way to determine the sizing of this server?

Options:

A.

Review the “Recommended Server Specifications” for PSMs in the CyberArk Documents website. Most Voted

B.

Use the specifications of any existing PSM and request a server of the same size.

C.

Use the CyberArk Support Knowledgebase, search for “PSM Sizing” and locate the Knowledgebase article related to sizing.

D.

Refer to the Microsoft Windows website, determine the minimum specifications required for the Operating System you are installing, and then add 4 Gb of RAM and 20 GB of disk.

Buy Now
Questions 6

As a member of a PAM Level-2 support team, you are troubleshooting an issue related to load balancing four PVWA servers at two data centers. You received a note from your Level-1 support team stating “When testing PVWA website from a workstation, we noticed that the “Source IP of last sign-in” was shown as the VIP (Virtual IP address) assigned to the four PVWA servers instead of the workstation IP where the PVWA site was launched from.”

Which step should you take?

Options:

A.

Verify the “LoadBalancerClientAddressHeader” parameter setting in PVWA configuration file Web.config is set to “X-Forwarded-For”.

B.

Add the VIP (Virtual IP address) assigned to the four PVWA servers to the certificates issued for all four PVWA servers, if missing.

C.

Add a firewall rule to allow the testing workstation to connect to the VIP (Virtual IP address) assigned to the four PVWA servers on Port TCP 443.

D.

Edit the dbparm.ini file on the Vault server and add the IP or subnet of the workstation to the whitelist.

Buy Now
Questions 7

In large-scale environments, it is important to enable the CPM to focus its search operations on specific Safes instead of scanning all Safes it sees in the Vault.

How is this accomplished?

Options:

A.

Administration Options > CPM Settings

B.

AllowedSafe Parameter on each platform policy

C.

MaxConcurrentConnection parameter on each platform policy

D.

Administration > Options > CPM Scanner

Buy Now
Questions 8

For redundancy, you want to add a secondary RADIUS server.

What must you do to accomplish this?

Options:

A.

Add to the application settings of the PVWA web.config file.

B.

In the PVWA vault.ini file, list each RADIUS server host address in the "Addresses" attribute separated by commas.

C.

Open the DBParm.ini on the Vault server. Add the second RADIUS server configuration settings after the first one, separated by a comma. Most Voted

D.

In the PVWA web.config file, add the location element at the end of the config file. Set the path value to "Default Web Site/PasswordVault/api/auth/pkipn/logon".

Buy Now
Questions 9

The account used to install a PVWA must have ownership of which safes? (Choose two.)

Options:

A.

VaultInternal

B.

PVWAConfig

C.

System

D.

Notification Engine

E.

PVWAReports

Buy Now
Questions 10

In addition to disabling Windows services or features not needed for PVWA operations, which tasks does PVWA_Hardening.ps1 perform when run? (Choose two.)

Options:

A.

performs IIS hardening

B.

configures all group policy settings

C.

renames the local Administrator Account

D.

configures Windows Firewall

E.

imports the CyberArk INF configuration

Buy Now
Questions 11

Arrange the steps to complete CPM Hardening for Out-of-Domain Deployment in the correct sequence.

Options:

Buy Now
Questions 12

What is the PRIMARY reason for installing more than 1 active CPM?

Options:

A.

Installing CPMs in multiple sites prevents complex firewall rules to manage devices at remote sites.

B.

Multiple instances create fault tolerance.

C.

Multiple instances increase response time.

D.

Having additional CPMs increases the maximum number of devices CyberArk can manage

Buy Now
Questions 13

A customer asked you to help scope the company's PSM deployment.

What should be included in the scoping conversation?

Options:

A.

Recordings file path

B.

Recordings codec

C.

Recordings retention period

D.

Recordings file type

Buy Now
Questions 14

The PrivateArk clients allows a user to view the contents of the vault like a filesystem.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

Which components can connect to a satellite Vault in a distributed Vault architecture?

Options:

A.

CPM, EPM, PTA

B.

PVWA, PSM

C.

CPM, PVWA, PSM

D.

CPM, PSM

Buy Now
Questions 16

Which file would you modify to configure the vault to send SNMP traps to your monitoring solution?

Options:

A.

dbparm ini

B.

paragent.ini

C.

ENEConf.ini I

D.

padr ini

Buy Now
Questions 17

After installing the first PSM server and before installing additional PSM servers, you must ensure the user performing the installation is not a direct owner of which safe?

Options:

A.

PSMUnmanagedSessionAccounts Safe

B.

PSMRecordingsSessionAccounts Safe

C.

PSMUnmanagedApplicationAccounts Safe

D.

PSMSessionBackupAccounts Safe

Buy Now
Questions 18

You are configuring the Vault to send syslog audit data to your organization’s SIEM solution.

What is a valid value for the SyslogServerProtocol parameter in DBPARM.INI file?

Options:

A.

TLS

B.

SSH

C.

SMTP

D.

SNMP

Buy Now
Questions 19

Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? Choose all that apply

Options:

A.

Store the CD in a physical safe and mount the CD every time vault maintenance is performed.

B.

Copy the contents of the CD to the System Safe on the vault

C.

Copy the contents of the CD to a folder on the vault server and secure it with NTFS permissions.

D.

Store the server key in a Hardware Security Module.

E.

Store the server key in the Provider cache

Buy Now
Questions 20

Name two ways of viewing the ITAlog

Options:

A.

Log into the vault locally and navigate to the Server folder under the PrivateArk install location.

B.

Log into the PVWA and go to the Reports tab.

C.

Access the System Safe from the PrivateArk client.

D.

Go to the Thirdpary log directory on the CPM

Buy Now
Questions 21

Which statement about REST API is correct? (Choose two.)

Options:

A.

When a user successfully authenticates to the Vault, an authentication token is returned. Most Voted

B.

REST API Windows authentication method allows skipping the logon API by using the Windows default credentials with a Kerberos ticket.

C.

To allow High Availability, REST API can be configured to support Session Load Balancing by editing the PVConfiguration.xml and setting the AllowPVWASessionRedandancy=Yes.

D.

Each REST API call requires that a valid authentication token be provided. Most Voted

E.

REST calls are directly sent to the currently active Vault using Port 1858.

Buy Now
Questions 22

What are the basic network requirements to deploy a CPM server?

Options:

A.

Port 1858 to Vault and Port 443 to PVWA

B.

Port 1858 only

C.

all ports to the Vault

D.

Port UDP/1858 to Vault and all required ports to targets and Port 389 to the PSM

Buy Now
Questions 23

By default, the vault secure protocol uses which IP port and protocol.

Options:

A.

TCP/1858

B.

TCP/443

C.

UDP/1858

D.

TCP/80

Buy Now
Questions 24

What would be a good use case for the Replicate module?

Options:

A.

Recovery Time Objectives or Recovery Point Objectives are at or near zero

B.

Integration with an Enterprise Backup Solution is required.

C.

Off site replication is required.

D.

PSM is used

Buy Now
Questions 25

What is a valid combination of primary and secondary layers of authentication to a company's two-factor authentication policy?

Options:

A.

RSA SecurID Authentication (in PVWA) and LDAP Authentication

B.

CyberArk Authentication and RADIUS Authentication

C.

Oracle SSO (in PVWA) and SAML Authentication

D.

LDAP Authentication and RADIUS Authentication

Buy Now
Questions 26

Which CyberArk component changes passwords on Target Devices?

Options:

A.

Vault

B.

CPM

C.

PVWA

D.

PSM

E.

PrivateArk

F.

OPM

G.

AIM

Buy Now
Questions 27

To apply a new license file you must:

Options:

A.

Upload the license.xml file to the System Safe

B.

Upload the license.xml file to the Vaultlnternal Safe.

C.

Upload the license.xml file to the System Safe and restart the PrivateArk Server service.

D.

Upload the license.xml file to the Vaultlnternal Safe and restart the PrivateArk Server service.

Buy Now
Questions 28

If a customer has one data center and requires fault tolerance, how many PVWAs should be deployed?

Options:

A.

two or more

B.

one PVWA cluster

C.

one

D.

two PVWA clusters

Buy Now
Questions 29

When a DR vault server becomes an active vault, it will automatically fail back to the original state once the primary vault comes back online.

Options:

A.

True, this is the default behavior

B.

False, this is not possible

C.

True, if the 'AllowFailback' setting is set to yes in the PADR.ini file.

D.

True if the 'AllowFailback' setting is set to yes in the dbparm mi file

Buy Now
Questions 30

How should you configure PSM for SSH to support load balancing?

Options:

A.

by using a network load balancer Most Voted

B.

in PVWA > Options > PSM for SSH Proxy > Servers

C.

in PVWA > Options > PSM for SSH Proxy > Servers > VIP

D.

by editing sshd.config on the all the PSM for SSH servers

Buy Now
Questions 31

Which is the correct order of installation for PAS components?

Options:

A.

Vault, CPM. PVWA, PSM

B.

CPM, Vault. PSM, PVWA

C.

Vault, CPM. PSM, PVWA

D.

PVWA, Vault, CPM, PSM

Buy Now
Questions 32

Which utility should be used to register the Vault in Amazon Web Services?

Options:

A.

CAVaultManager Most Voted

B.

StorageManager

C.

CloudVaultManager

D.

CACert

Buy Now
Questions 33

The vault server uses a modified version of the Microsoft Windows firewall.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

Which component must be installed before the first CPM installation?

Options:

A.

PTA

B.

PSM

C.

PVWA

D.

EPM

Buy Now
Questions 35

The RemoteApp feature of PSM allows seamless Application windows (i e the Desktop of the PSM server will not be visible)

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

You are configuring SNMP remote monitoring for your organization’s Vault servers.

In the PARAgent.ini, which parameter specifies the destination of the Vault SNMP traps?

Options:

A.

SNMPHostIP Most Voted

B.

SNMPTrapPort

C.

SNMPCommunity

D.

SNMPVersion

Buy Now
Questions 37

What is the purpose of the CPM_Preinstallation.ps1 script included with the CPM installation package?

Options:

A.

It prompts for input parameters that will be used to pre-populate form fields in the installation wizard.

B.

It automatically installs the CPM, requiring no additional user input.

C.

It allows you to install the CPM using a command line approach rather than using the installation wizard.

D.

It verifies the NET version installed on the server and sets the IIS SSL TLS server configuration.

Buy Now
Questions 38

In which file must the attribute ‘SignAuthnRequest=”true”’ be added to the PartnerIdentityProvider element to support signed SAML requests?

Options:

A.

saml.config

B.

samlconfig.ini

C.

PVWAConfig.xml

D.

PVConfiguration.xml

Buy Now
Questions 39

CyberArk User Neil is trying to connect to the Target Linux server 192.168.1.164 using a domain account ACME/linuxuser01 on domain acme.corp using PSM for SSH server 192.168.65.145.

What is the correct syntax?

Options:

A.

ssh neil@linuxuser01:acme.corp@192.168.1.164@192.168.65.145

B.

ssh neil@linuxuser01#acme.corp@192.168.1.164@192.168.65.145 Most Voted

C.

ssh neil@linuxuser01@192.168.1.164@192.168.65.145

D.

ssh neil@linuxuser01@acme.corp@192.168.1.164@192.168.65.145

Buy Now
Questions 40

Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.

Options:

A.

Server Key

B.

Recovery Public Key

C.

Recovery Private Key

D.

Safe Key

Buy Now
Exam Code: PAM-SEN
Exam Name: CyberArk Sentry PAM
Last Update: May 6, 2024
Questions: 136
PAM-SEN pdf

PAM-SEN PDF

$28  $80
PAM-SEN Engine

PAM-SEN Testing Engine

$33.25  $95
PAM-SEN PDF + Engine

PAM-SEN PDF + Testing Engine

$45.5  $130