CyberArk Defender - PAM PAM-DEF Exam Questions

Page: 1 / 14
Total 239 questions
Question 1

Before failing back to the production infrastructure after a DR exercise, what must you do to maintain audit history during the DR event?



Question 2
Question 3
Question 4

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group Operations Staff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of Operations Managers never need to be able to use the show, copy or connect buttons themselves.

Which safe permission do you need to grant Operations Staff? Check all that apply.



Answer : A, B

To use the show, copy, and connect buttons on the accounts in the safe UnixRoot, the Operations Staff need to have theUse Accountspermission, which allows them to request access to the accounts and perform actions on them. However, since dual control is enabled for some of the accounts, they also need to have theRetrieve Accountspermission, which allows them to view the password of the account after it is authorized by another user. TheAuthorize Password Requestspermission is not needed, as it is only required for the users who can approve the requests, not the ones who make them. TheAccess Safe without Authorizationpermission is not needed, as it would bypass the dual control mechanism and allow the Operations Staff to access the accounts without approval.Reference:

[Defender PAM Sample Items Study Guide], page 10, question 5

[CyberArk Privileged Access Security Implementation Guide], page 30, table 2-1

[CyberArk Privileged Access Security Administration Guide], page 43, section 3.2.2.1


Question 5

Which Master Policy Setting must be active in order to have an account checked-out by one user for a pre-determined amount of time?



Answer : B

According to the CyberArk Defender PAM documentation, the Master Policy setting that must be active in order to have an account checked-out by one user for a pre-determined amount of time is Enforce check-in/check-out exclusive access. This setting enables organizations to permit users to check out a 'one-time' password and lock it so that no other users can retrieve it at the same time. After the user has used the password, the user checks the password back into the Vault. This ensures exclusive usage of the privileged account, enabling full control and tracking for the password. The duration of the check-out period can be configured in the platform settings for each account.Reference:

Account check-out and check-in - CyberArk

Master Policy - CyberArk


Question 6

When managing SSH keys, the CPM stores the Public Key



Answer : B

When managing SSH keys, the CPM stores the public key on the target server. The CPM generates a new random SSH key pair and updates the public SSH key on the target machine. The public SSH key is stored in the home directory of the privileged user on the target machine, usually in the file~/.ssh/authorized_keys. The public SSH key is not stored in the Vault, as this would be redundant and unnecessary. The public SSH key cannot be generated from the private key, as this would defeat the purpose of asymmetric encryption.Reference:

Manage SSH Keys

SSH Key Manager

Use SSH Keys


Question 7
Page:    1 / 14   
Total 239 questions