PAM-CDE-RECERT試験無料問題集「CyberArk CDE Recertification 認定」

When managing SSH keys, the CPM stores the Public Key

How does the Vault administrator apply a new license file?

You are configuring the vault to send syslog audit data to your organization's SIEM solution. What is a valid value for the SyslogServerProtocol parameter in DBPARM.ini file?

Which authentication methods does PSM for SSH support?

Match each component to its respective Log File location.
正解:

Reference:
https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.4/en/Content/PTA/PTA-Data-Locations.htm
What is the easiest way to duplicate an existing platform?

Which of the following PTA detections require the deployment of a Network Sensor or installing the PTA Agent on the domain controller?

Time of day or day of week restrictions on when password verifications can occur configured in ____________________.

Which user(s) can access all passwords in the Vault?

You are creating a new Rest API user that utilizes CyberArk Authentication.
What is a correct process to provision this user?

You have been asked to identify the up or down status of Vault services.
Which CyberArk utility can you use to accomplish this task?

Which certificate type do you need to configure the vault for LDAP over SSL?

You have been asked to secure a set of shared accounts in CyberArk whose passwords will need to be used by end users. The account owner wants to be able to track who was using an account at any given moment.
Which security configuration should you recommend?

It is possible to control the hours of the day during which a user may log into the vault.

By default, members of which built-in groups will be able to view and configure Automatic Remediation and Session Analysis and Response in the PVWA?

Vault admins must manually add the auditors group to newly created safes so auditors will have sufficient access to run reports.

What is the easiest way to duplicate an existing platform?

Which of the following Privileged Session Management solutions provide a detailed audit log of session activities?

A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request.
What is the correct location to identify users or groups who can approve?