Pam Def
Pam Def
material for you to test all the related CyberArk exam topics. By using the PAM-
DEF exam dumps questions and practicing your skills, you can increase your
confidence and chances of passing the PAM-DEF exam.
Instant Download
Free Update in 3 Months
Money back guarantee
PDF and Software
24/7 Customer Support
Besides, Dumpsinfo also provides unlimited access. You can get all
Dumpsinfo files at lowest price.
2.In the screenshot displayed, you just configured the usage in CyberArk and want to update its
password.
What is the least intrusive way to accomplish this?
4.You want to give a newly-created group rights to review security events under the Security pane.
You also want to be able to update the status of these events. Where must you update the group to
allow this?
A. in the PTAAuthorizationGroups parameter, found in Administration > Options > PTA
B. in the PTAAuthorizationGroups parameter, found in Administration > Options > General
C. in the SecurityEventsAuthorizationGroups parameter, found in Administration > Security > Options
D. in the SecurityEventsFeedAuthorizationGroups parameter, found in Administration > Options >
General
Answer: D
Explanation:
https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PTA/Security-
Events.htm?TocPath=End User%7CSecurity Events%7C_____2#Permissions
5.You received a notification from one of your CyberArk auditors that they are missing Vault level
audit permissions. You confirmed that all auditors are missing the Audit Users Vault permission.
Where do you update this permission for all auditors?
A. Private Ark Client > Tools > Administrative Tools > Directory Mapping > Vault Authorizations
B. Private Ark Client > Tools > Administrative Tools > Users and Groups > Auditors > Authorizations
tab
C. PVWA User Provisioning > LDAP integration > Vault Auditors Mapping > Vault Authorizations
D. PVWA> Administration > Configuration Options > LDAP integration > Vault Auditors Mapping >
Vault Authorizations
Answer: B
Explanation:
To update the Vault level audit permissions for all auditors, you would use the Private Ark Client.
Specifically, you would navigate to the Tools menu, select Administrative Tools, then Users and
Groups. Within the Users and Groups section, you would select the Auditors group and go to the
Authorizations tab. Here, you can manage and update the permissions for the Auditor group,
including the Audit Users Vault permission. This ensures that all members of the Auditors group have
the necessary permissions to perform their audit functions within the Vault1.
Reference: CyberArk’s official documentation on predefined users and groups, which includes
information on the Auditor user and the permissions associated with this role1.
Information on the administrative tools available in the Private Ark Client, which are used for
managing users and groups, including auditors2.
6.Which change could CyberArk make to the REST API that could cause existing scripts to fail?
A. adding optional parameters in the request
B. adding additional REST methods
C. removing parameters
D. returning additional values in the response
Answer: C
Explanation:
Changes to the REST API that could cause existing scripts to fail include removing parameters. When
parameters are removed from an API, scripts that rely on those parameters being present may no
longer function correctly because they expect certain data to be available. This can lead to errors or
unexpected behavior in the scripts that use the API1.
Reference: CyberArk Docs: REST APIs1
7.You have been asked to secure a set of shared accounts in CyberArk whose passwords will need
to be used by end users. The account owner wants to be able to track who was using an account at
any given moment.
Which security configuration should you recommend?
A. Configure one-time passwords for the appropriate platform in Master Policy.
B. Configure shared account mode on the appropriate safe.
C. Configure both one-time passwords and exclusive access for the appropriate platform in Master
Policy.
D. Configure object level access control on the appropriate safe.
Answer: C
Explanation:
One-time passwords and exclusive access are security features that can be configured for a platform
in the Master Policy. These features enhance the security and accountability of shared accounts by
ensuring that each password is used only once and by only one user at a time. One-time passwords
generate a new password for each check-out and check-in of an account, preventing password reuse
and exposure. Exclusive access prevents multiple users from accessing the same account
simultaneously, avoiding conflicts and confusion. By configuring both one-time passwords and
exclusive access for the appropriate platform, the account owner can track who was using an account
at any given moment and ensure that the passwords are always secure and unique.
Reference: One-Time Passwords, Exclusive Access, Master Policy
8.In the Private Ark client under the Tools menu > Administrative Tools > Users and Groups, which
option do you use to update users’ Vault group memberships?
A. Update > General tab
B. Update > Authorizations tab
C. Update > Member Of tab
D. Update > Group tab
Answer: C
Explanation:
In the PrivateArk client, to update users’ Vault group memberships, you use the Member Of tab. After
logging in as an administrative user and navigating to the Users and Groups window, you select a
user and click Update. In the Member Of tab, you can manage the user’s group memberships by
adding or removing them from groups within the Vault1.
Reference: CyberArk Docs - Manage users in PrivateArk client1
9.When running a “Privileged Accounts Inventory” Report through the Reports page in PVWA on a
specific safe, which permission/s are required on that safe to show complete account inventory
information?
A. List Accounts, View Safe Members
B. Manage Safe Owners
C. List Accounts, Access Safe without confirmation
D. Manage Safe, View Audit
Answer: A
Explanation:
The Privileged Accounts Inventory Report provides information about all the privileged accounts in the
system, based on different filters, such as safe, platform, policy, and owner. To run this report through
the Reports page in PVWA on a specific safe, the user needs to have the following permissions on
that safe:
List Accounts: This permission allows the user to view the accounts in the safe and their properties,
such as name, address, platform, and policy.
View Safe Members: This permission allows the user to view the members of the safe and their
authorizations, such as owners, users, and groups.
These permissions are required to show complete account inventory information for the specific safe.
Other permissions, such as Manage Safe Owners, Access Safe without confirmation, Manage Safe,
and View Audit, are not relevant for this report.
Reference: Reports and Audits - CyberArk, Safe Member Authorizations
10.A Vault Administrator team member can log in to CyberArk, but for some reason, is not given Vault
Admin rights.
Where can you check to verify that the Vault Admins directory mapping points to the correct AD
group?
A. PVWA > User Provisioning > LDAP Integration > Mapping Criteria
B. PVWA > User Provisioning > LDAP Integration > Map Name
C. PVWA > Administration > LDAP Integration > Mappings
D. PVWA > Administration > LDAP Integration > AD Groups
Answer: C
Explanation:
The directory mappings are the rules that define how users and groups from an external directory,
such as Active Directory (AD), are mapped to roles and authorizations in CyberArk. To verify that the
Vault Admins directory mapping points to the correct AD group, you need to check the Mappings
page in the PVWA. This page displays the list of existing directory mappings in the Vault and their
properties, such as mapping name, LDAP branch, domain groups, and mapping authorizations. You
can edit or delete a directory mapping from this page, or create a new one using the Create Directory
Mapping button.
Reference: Directory Maps, Create directory mapping, Get directory mapping list
11.DRAG DROP
Match the log file name with the CyberArk Component that generates the log.
Answer:
Explanation:
Reference: Log Files
[Defender PAM Sample Items Study Guide], Question 46, page 16
13.As long as you are a member of the Vault Admins group, you can grant any permission on any
safe that you have access to.
A. TRUE
B. FALSE
Answer: B
Explanation:
Being a member of the Vault Admins group does not automatically grant you any permission on any
safe that you have access to. The Vault Admins group is a predefined group that is created during the
installation or upgrade of the vault. This group has the Vault Admin authorization, which allows its
members to perform administrative tasks on the vault, such as managing users, groups, platforms,
policies, and safes1. However, this authorization does not include any safe member authorizations,
such as View, Retrieve, Use, or Manage Safe2. Therefore, to grant any permission on a safe, you
need to be added as a safe member with the appropriate authorizations, either directly or through
another group. The Vault Admins group can be added to safes with all safe member authorizations,
but this is not done automatically for all safes. By default, this group is only added to a number of
system safes, such as the Password Manager Safe, the PVWAConfig Safe, and the Notification
Methods Safe3. For other safes, the Vault Admins group can be added manually by the safe owner or
another user with the Manage Safe authorization4.
Reference: 1: Predefined users and groups, Predefined groups subsection
2: [CyberArk Privileged Access Security Implementation Guide], Chapter 3: Managing Safes, Section:
Safe Authorizations, Table 2-1: Safe Authorizations
3: What default groups can be automatically added to Safes when they are created?
4: [CyberArk Privileged Access Security Administration Guide], Chapter 3: Managing Safes, Section:
Adding Safe Members
15.What must you specify when configuring a discovery scan for UNIX? (Choose two.)
A. Vault Administrator
B. CPM Scanner
C. root password for each machine
D. list of machines to scan
E. safe for discovered accounts
Answer: B, D
Explanation:
When configuring a discovery scan for UNIX, you must specify the CPM Scanner and the list of
machines to scan. The CPM Scanner is the component responsible for executing the discovery
process, and it requires a list of target machines to scan for new and modified accounts and their
dependencies. This list can be provided in the form of a CSV file for UNIX machines1. The discovery
process will then scan the predefined machines to identify privileged accounts that should be
onboarded into the Vault for secure and automated management according to enterprise
compliance policies2.
Reference: CyberArk Docs - Manage discovery processes1
CyberArk Docs - Scan for accounts using Account Discovery
16.To ensure all sessions are being recorded, a CyberArk administrator goes to the master policy and
makes configuration changes.
Which configuration is correct?
A. Require privileged session monitoring and isolation = inactive; Record and save session activity =
active.
B. Require privileged session monitoring and isolation = inactive; Record and save session activity =
inactive.
C. Require privileged session monitoring and isolation = active; Record and save session activity =
active.
D. Require privileged session monitoring and isolation = active; Record and save session activity =
inactive.
Answer: C
Explanation:
This configuration ensures that privileged sessions are monitored and isolated, and all session
activities are recorded and saved for future reference 1.
17.Which service should NOT be running on the DR Vault when the primary Production Vault is up?
A. PrivateArk Database
B. PrivateArk Server
C. CyberArk Vault Disaster Recovery (DR) service
D. CyberArk Logical Container
Answer: C
Explanation:
The user that is automatically added to all Safes and cannot be removed is the Master user. The
Master user is a predefined user that is created during the Vault installation and has full permissions
on all Safes and accounts. The Master user is the only user that can perform certain tasks, such as
creating other predefined users, managing the Vault configuration, and restoring the Vault from a
backup. The Master user cannot be deleted or modified by any other user, and is always a member of
every Safe12.
Reference: Predefined users and groups - CyberArk, section “Master”
Safes and Safe members - CyberArk, section “Safe members overview”
18.Which of the following logs contains information about errors related to PTA?
A. ITAlog.log
B. diamond.log
C. pm_error.log
D. WebApplication.log
Answer: B
Explanation:
According to the web search results, the diamond.log is the main log file that records the PTA system
activities, such as receiving and processing events, generating alerts, and sending notifications1. The
diamond.log also contains information about errors related to PTA, such as connection failures,
configuration issues, parsing problems, or internal exceptions2. The diamond.log can be found in the
/opt/tomcat/logs directory on the PTA machine1. The debug level of the diamond.log can be changed
using the changeLogLevel.sh utility or manually editing the log4j.properties file1. The diamond.log can
be used for troubleshooting PTA issues and viewing statistics
21.In addition to add accounts and update account contents, which additional permission on the safe
is required to add a single account?
A. Upload Accounts Properties
B. Rename Accounts
C. Update Account Properties
D. Manage Safe
Answer: C
Explanation:
In addition to the permissions to add accounts and update account contents, the permission to
Update Account Properties is required to add a single account to a safe in CyberArk. This permission
allows the user to modify the properties of an account, which is a necessary step when adding a new
account to ensure that all relevant details and configurations are correctly
set1.
Reference: The information provided is based on general knowledge of CyberArk PAM best practices
and the permissions required for account management as outlined in CyberArk’s official
documentation
22.Which statement about the Master Policy best describes the differences between one-time
password and exclusive access functionality?
A. Exclusive access means that only a specific group of users may use the account. After an account
on a one-time password platform is used, the account is deleted from the safe automatically.
B. Exclusive access locks the account indefinitely. One-time password can be used replace invalid
account passwords.
C. Exclusive access is enabled by default in the Master Policy. One-time password should only be
enabled for emergencies.
D. Exclusive access allows only one person to check-out an account at a time. One-time password
schedules an account for a password change after the MinValidityPeriod period expires.
Answer: D
Explanation:
The Master Policy in CyberArk defines the behavior of one-time passwords and exclusive
accessExclusive access ensures that only one user can check out an account at any given time,
effectively locking the account during its use to prevent simultaneous access1. On the other
hand, one-time password functionality is designed to change the account’s password after it is used,
based on a timer set by the MinValidityPeriod parameter in the policy file. This means that once the
password is checked out and the timer expires, the Central Policy Manager (CPM) will change the
password2. These settings are often used together to maintain accountability and security for the
usage of shared privileged accounts.
Reference: CyberArk Docs: One-time passwords and exclusive accounts1
CyberArk Knowledge Article: CPM: What is the difference between “One Time” and “Exclusive”
passwords?2
24.It is possible to restrict the time of day, or day of week that a [b]reconcile[/b] process can occur
A. TRUE
B. FALSE
Answer: A
Explanation:
It is possible to restrict the time of day, or day of week that a reconcile process can occur by using the
Reconcile Safe option in the Platform Management section of the PrivateArk Client. This option allows
the administrator to define the reconcile schedule for each platform, which specifies when the
reconcile process can run and how often it should be performed. The reconcile schedule can be set to
run daily, weekly, monthly, or on specific days and times. By restricting the reconcile process, the
administrator can reduce the risk of unauthorized access to the accounts and improve the
performance of the system.
Reference: [Defender PAM Course], Module 5: Reconcile and Rotate, Lesson 1: Reconcile and
Rotate Overview,
Slide 9: Reconcile Safe
[Defender PAM Study Guide], Section 5.1: Reconcile and Rotate Overview, Page 24: Reconcile Safe
[CyberArk Documentation], Privileged Access Security Implementation Guide, Chapter 5: Configure
the Vault, Section 5.4: Configure Platforms, Subsection 5.4.2: Reconcile Safe
25.It is possible to leverage DNA to provide discovery functions that are not available with auto-
detection.
A. TRUE
B. FALSE
Answer: A
Explanation:
It is possible to leverage DNA to provide discovery functions that are not available with auto-
detection. Auto-detection is a feature that enables the CPM to automatically discover and onboard
accounts on target systems that are associated with a specific platform. Auto-detection can be
configured in the Platform Management settings for each platform that supports this functionality.
However, auto-detection has some limitations, such as requiring the CPM to have access to the
target system, not supporting all platforms, and not providing comprehensive information about the
accounts and their security risks1. DNA, on the other hand, is a standalone scanning tool that can
discover and audit privileged accounts across the network, regardless of the platform or the CPM
access. DNA can provide additional discovery functions, such as identifying machines vulnerable to
Pass-the-Hash attacks, collecting reliable and comprehensive audit information, and generating
reports and visual maps that evaluate the privileged account security status in the organization2. DNA
can also be used before or independently of the CyberArk PAM solution, as it does not require agents
to be installed on target systems2.
Reference: 1: Auto-detection
2: CyberArk DNA Overview
26.If a password is changed manually on a server, bypassing the CPM, how would you configure the
account so that the CPM could resume management automatically?
A. Configure the Provider to change the password to match the Vault’s Password
B. Associate a reconcile account and configure the platform to reconcile automatically
C. Associate a logon account and configure the platform to reconcile automatically
D. Run the correct auto detection process to rediscover the password
Answer: B
Explanation:
A reconcile account is a privileged account that has the permission to reset the password of another
account on the target system. By associating a reconcile account with the account that has been
changed manually, the CPM can use the reconcile account to restore the password of the account to
the value that is stored in the Vault, in case it is changed or out of sync. This process is called
password reconciliation and it ensures that the passwords are synchronized and available for use. To
configure the account so that the CPM can resume management automatically, the platform that the
account belongs to must have the following parameters set1:
RCAutomaticReconcileWhenUnsynched: This parameter determines whether passwords will be
reconciled automatically after the CPM detects a password on a remote machine that is not
synchronized with its corresponding password in the Vault. The acceptable values are Yes or No.
RCReconcileReasons: This parameter determines the codes that represent the CPM plugin errors
that will launch a reconciliation process. The acceptable values are plug-in return codes separated by
a comma.
RCFromHour, RCToHour: These parameters determine the time frame in hours during which the
CPM can reconcile passwords, either manually or automatically. The acceptable values are 0-23 or -1
for none.
RCExecutionDays: This parameter determines the days of the week when the CPM will reconcile
passwords. The acceptable values are days of the week, separated by commas.
Reference: 1: Password Reconciliation
27.Users who have the 'Access Safe without confirmation' safe permission on a safe where accounts
are configured for Dual control, still need to request approval to use the account.
A. TRUE
B. FALSE
Answer: B
Explanation:
Users who have the ‘Access Safe without confirmation’ safe permission on a safe where accounts
are configured for Dual control, do not need to request approval to use the account. The ‘Access
Safe without confirmation’ safe permission is a special permission that allows a user to bypass the
Dual control mechanism and access the accounts in the safe without requiring confirmation from
other authorized users. This permission can be useful for emergency situations or trusted users who
need immediate access to the accounts. However, this permission also increases the risk of
unauthorized or malicious access, so it should be granted with caution and monitored closely1.
Reference: 1: Access without confirmation
28.Which built-in report from the reports page in PVWA displays the number of days until a password
is due to expire?
A. Privileged Accounts Inventory
B. Privileged Accounts Compliance Status
C. Activity Log
D. Privileged Accounts CPM Status
Answer: A
Explanation:
The Privileged Accounts Inventory report in PVWA includes a column that displays the Age of the
password, which indicates the number of days since the password was created1. This information
can be used to determine how many days are left until a password is due to expire, based on the
password policy’s expiration settings.
Reference: CyberArk’s official documentation on PVWA reports provides a list of available reports
and their descriptions, including the Privileged Accounts Inventory report which contains details about
password age and other relevant information1.
29.Where can you check that the LDAP binding is using TCP/636?
A. in Active Directory under "Users OU" => "User Properties" => "External Bindings" => "Port"
B. in PVWA, under "LDAP Integration" => "LDAP" => "Directories" => "" => "Hosts" => "Host"
C. in PrivateArk Client, under "Tools" => "Administrative Tools" => "Directory Mapping" => ""
D. From the PVWA, connect to the domain controller using Test-NetConnection on Port 636.
Answer: D
Explanation:
To check that the LDAP binding is using TCP/636, you can use the Test-NetConnection cmdlet from
the PVWA to connect to the domain controller on Port 636. This method allows you to verify that the
LDAP service is listening on the secure port and that the connection can be established using
SSL/TLS,
which is typically associated with port 6361.
Reference: CyberArk Docs - LDAP Integration2
CyberArk Knowledge Article - How to test outgoing LDAP external directory connectivity to the vault
30.In the Private Ark client, how do you add an LDAP group to a CyberArk group?
A. Select Update on the CyberArk group, and then click Add > LDAP Group
B. Select Update on the LDAP Group, and then click Add > LDAP Group
C. Select Member Of on the CyberArk group, and then click Add > LDAP Group
D. Select Member Of on the LDAP group, and then click Add > LDAP Group
Answer: C
Explanation:
To add an LDAP group to a CyberArk group, you need to use the Private Ark client and follow these
steps1:
In the Users and Groups tree, select the CyberArk group that you want to add the LDAP group to.
In the Properties pane, click Member Of.
Click Add > LDAP Group.
In the LDAP Group dialog box, enter the name of the LDAP group and click OK.
Reference: Add an LDAP group to a Vault group
31.It is possible to restrict the time of day, or day of week that a [b]verify[/b] process can occur
A. TRUE
B. FALSE
Answer: A
Explanation:
It is possible to restrict the time of day, or day of week that a verify process can occur by using the
Verify Time Window parameter in the Platform Management page. This parameter allows the
administrator to define a time window for each platform, during which the verify process can be
performed. The verify process will not run outside of this time window, unless it is manually initiated
by the administrator. This feature can help reduce the load on the target systems and the network
during peak hours.
Reference: [Defender PAM Course], Module 4: Managing Accounts, Lesson 2: Account Verification,
Slide 8: Verify Time Window
[Defender PAM Documentation], Version 12.3, Administration Guide, Chapter 4: Managing
Platforms, Section: Verify Time Window
33.When a group is granted the 'Authorize Account Requests' permission on a safe Dual Control
requests must be approved by
A. Any one person from that group
B. Every person from that group
C. The number of persons specified by the Master Policy
D. That access cannot be granted to groups
Answer: C
Explanation:
When a group is granted the ‘Authorize Account Requests’ permission on a safe, dual control
requests must be approved by the number of persons specified by the Master Policy. This means that
the request will be sent to all the members of the group, but only a certain number of them need to
confirm it for the request to be authorized. The Master Policy defines the number of required
approvers for each level of confirmation, as well as the number of levels. For example, if the Master
Policy requires two approvers at the first level and one approver at the second level, then the request
will be sent to the group and two members of the group must confirm it before it is sent to the second
level of confirmation, where one more approver is needed.
Reference: Request access
Safe Members
CyberArk Defender - PAM Exam Practice Test