CyberArk Defender - PAM PAM-DEF Exam Practice Test

Page: 1 / 14
Total 239 questions
Question 1

When managing SSH keys, the CPM stores the Public Key



Answer : B

When managing SSH keys, the CPM stores the public key on the target server. The CPM generates a new random SSH key pair and updates the public SSH key on the target machine. The public SSH key is stored in the home directory of the privileged user on the target machine, usually in the file~/.ssh/authorized_keys. The public SSH key is not stored in the Vault, as this would be redundant and unnecessary. The public SSH key cannot be generated from the private key, as this would defeat the purpose of asymmetric encryption.Reference:

Manage SSH Keys

SSH Key Manager

Use SSH Keys


Question 2

tsparm.ini is the main configuration file for the Vault.



Answer : B

tsparm.ini isnotthe main configuration file for the Vault. It is one of the several configuration files that control the initial settings and method of operation of the Server. The main configuration file for the Vault is DBParm.ini, which contains the general parameters of the database, such as the Vault name, the Vault IP address, the Vault port, the encryption algorithm, the log retention, and the debug mode.Reference:

Defender PAM Sample Items Study Guide, page 9, question 92

CyberArk Privileged Access Security Implementation Guide, page 75, section ''DBParm.ini''

CyberArk Vault Server Parameter Files, page 1, section ''TSParm.ini''


Question 3
Question 4
Question 5

Which statement is true about setting the reconcile account at the platform level?



Question 6
Question 7

What is the purpose of the Interval setting in a CPM policy?



Answer : A

The Interval setting in a CPM policy is used to control how often the CPM looks for System Initiated CPM work, such as password changes, verifications, and reconciliations. The Interval setting defines the frequency, in minutes, that the CPM will check the accounts that are associated with the policy and perform the required actions. For example, if the Interval is set to 60, the CPM will check the accounts every hour and change, verify, or reconcile the passwords according to the policy settings. The Interval setting does not affect User Initiated CPM work, such as manual password changes or retrievals, which are performed immediately upon request. The Interval setting also does not control how long the CPM rests between password changes or the maximum amount of time the CPM will wait for a password change to complete. These parameters are configured in the CPM.ini file, which is stored in the root folder of the <CPM username> Safe.Reference:

[Defender PAM eLearning Course], Module 5: Password Management, Lesson 5.1: CPM Policies, Slide 9: CPM Policy Settings

[Defender PAM Sample Items Study Guide], Question 4: CPM Policy Settings

[CyberArk Documentation Portal], CyberArk Privileged Access Security Implementation Guide, Chapter 5: Managing Passwords, Section: CPM Policy Settings, Subsection: Interval


Page:    1 / 14   
Total 239 questions