Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the CyberArk Sentry PAM-SEN Questions and answers with ValidTests

Exam PAM-SEN All Questions
Exam PAM-SEN Premium Access

View all detail and faqs for the PAM-SEN exam

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which statement about REST API is correct? (Choose two.)

Options:

A.

When a user successfully authenticates to the Vault, an authentication token is returned. Most Voted

B.

REST API Windows authentication method allows skipping the logon API by using the Windows default credentials with a Kerberos ticket.

C.

To allow High Availability, REST API can be configured to support Session Load Balancing by editing the PVConfiguration.xml and setting the AllowPVWASessionRedandancy=Yes.

D.

Each REST API call requires that a valid authentication token be provided. Most Voted

E.

REST calls are directly sent to the currently active Vault using Port 1858.

Expert Solution
Questions # 2:

Before the hardening process, your customer identified a PSM Universal Connector executable that will be required to run on the PSM.

Which file should you update to allow this to run?

Options:

A.

PSMConfigureAppLocker.xml

B.

PSMHardening.xml

C.

PSMAppConfig.xml

D.

PSMConfigureHardening.xml

Expert Solution
Questions # 3:

If a transparent user matches two different directory mappings, how does the system determine which user template to use?

Options:

A.

The system will use the template for the mapping listed first.

B.

The system will use the template for the mapping listed last.

C.

The system will grant all of the vault authorizations from the two templates.

D.

The system will grant only the vault authorizations that are listed in both templates

Expert Solution
Questions # 4:

In large-scale environments, it is important to enable the CPM to focus its search operations on specific Safes instead of scanning all Safes it sees in the Vault.

How is this accomplished?

Options:

A.

Administration Options > CPM Settings

B.

AllowedSafe Parameter on each platform policy

C.

MaxConcurrentConnection parameter on each platform policy

D.

Administration > Options > CPM Scanner

Expert Solution
Questions # 5:

Arrange the steps to complete CPM Hardening for Out-of-Domain Deployment in the correct sequence.

Question # 5

Options:

Expert Solution
Questions # 6:

When performing “In Domain” hardening of a PSM server, which steps must be performed? (Choose two.)

Options:

A.

Import CyberArk policy settings from the provided file into a new GPO. Most Voted

B.

Apply advanced audit on the PSM server.

C.

Link GPO to a dedicated OU containing CyberArk PSM servers. Most Voted

D.

Import an INF file to the local machine.

E.

Configure AppLocker rules to block running unknown executables.

Expert Solution
Questions # 7:

What is a prerequisite step before installing the Vault on Windows 2019?

Options:

A.

Configure the Kerberos authentication method on the default IIS Application pool

B.

Check that the server IP address is correctly configured and that it is static

C.

In the Network Connection properties, configure Preferred DNS Servers

D.

Install Microsoft Windows patch KB4014998

Expert Solution
Questions # 8:

What is the name of the account used to establish the initial RDP session from the end user client machine to the PSM server?

Options:

A.

PSMConnect

B.

PSMAdminConnect

C.

PSM

D.

The credentials the end user retrieved from the vault

Expert Solution
Questions # 9:

Which authentication methods does PSM for SSH support?

Options:

A.

CyberArk password LDAP, RADIUS, SAML

B.

LDAP, Windows Authentication, SSH keys

C.

RADIUS, Oracle SSO, CyberArk Password

D.

CyberArk Password, LDAP, RADIUS

Expert Solution
Questions # 10:

The Remote Desktop Services role must be property licensed by Microsoft.

Options:

A.

TRUE

B.

FALSE

Expert Solution
Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions