Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CPC-CDE-RECERT CyberArk CDE-CPC Recertification Questions and Answers

Questions 4

What is determined by the MaxConcurrentConnections setting within a platform?

Options:

A.

Maximum number of concurrent connections that can be opened between the CPM and the remote machines for the platform

B.

Maximum number of concurrent connections that can be between the PSM and the remote machines for the platform

C.

Maximum number of concurrent connections allowed for a specific account on the platform through the PSM

D.

Maximum number of concurrent connections to the Vault allowed for sending audit activities relating to the platform

Buy Now
Questions 5

When installing the PSM and CPM components on the same Privilege Cloud Connector, what should you consider when hardening?

Options:

A.

PSM settings override the CPM settings when referring to the same parameter.

B.

CPM settings override the PSM settings when referring to the same parameter

C.

They can only be installed on the same Privilege Cloud Connector when installed 'in Domain'.

D.

They can only be installed on the same Privilege Cloud Connector when installed 'out of Domain'.

Buy Now
Questions 6

You want to improve performance on the CPM by restricting accounts for the CYBRWINDAD platform to only the WINDEMEA and WINDEMEA_ADMIN Safes. How do you set this in CyberArk?

Options:

A.

In the CYBRWINDAD platform, under Automatic Password Management > General, configure AllowedSafes and set it to (WINDEMEA)|(WINDEMEA_ADMIN).

B.

In the settings for Configuration/CPM assigned to the WINDEMEA and WINDEMEAADMIN Safes, configure AllowedSafes and set it to (WINDEMEA)|(WINDEMEAADMIN).

C.

In the CYBRWINDAD platform, under UI & Workflows > Properties > Optional, configure AllowedSafes and set it to (WINDEMEA)|(WINDEMEA_ADMIN).

D.

Modify cpm.ini on the relevant CPM(s) and add AllowedSafesCYBRWINDAD and set it to (WINDEMEA)|(WINDEMEAADMIN).

Buy Now
Questions 7

Which browser is supported for PSM Web Connectors developed using the CyberArk Plugin Generator Utility (PGU)?

Options:

A.

Internet Explorer

B.

Google Chrome

C.

Opera

D.

Firefox

Buy Now
Questions 8

Which statements accurately describe the process of LDAP integration with CyberArk Privilege Cloud Standard? (Choose two.)

Options:

A.

Directory maps determine user or group creation within the Privilege Cloud Vault.

B.

A tailored Python script is required to facilitate the LDAP server interaction.

C.

Upon user login, their directory attributes are refreshed through the directory map.

D.

For establishing a connection, the domain base context is not a prerequisite.

E.

The LDAP BIND user requires domain administrative privileges for a successful connection.

Buy Now
Questions 9

Which authentication methods does PSM for SSH support? (Choose 2.)

Options:

A.

OIDC

B.

MFA Caching

C.

SAML

D.

RADIUS

E.

Client Authentication Certificate

Buy Now
Questions 10

How should you configure PSM for SSH to support load balancing?

Options:

A.

by using a network load balancer

B.

in PVWA > Options > PSM for SSH Proxy > Servers

C.

in PVWA > Options > PSM for SSH Proxy > Servers > VIP

D.

by editing sshd.config on the all the PSM for SSH servers

Buy Now
Questions 11

Before you can delete a Safe, you must first delete all of its content (accounts and files) permanently. What else must also be achieved before the Safe can be successfully deleted?

Options:

A.

The Safe owners have been removed from the Safe membership.

B.

The version retention period has expired for all files.

C.

The associated CPM user has been removed from the Safe.

D.

The “Save account versions for a period of:” has been set to 0 within the Safe version retention settings.

Buy Now
Questions 12

'What is a default authentication profile to access CyberArk Identity?

Options:

A.

Default New User Login Profile

B.

Default New Device Login Profile

C.

Default New Authenticator Profile

D.

Default New Password Profile

Buy Now
Questions 13

Which option correctly describes the authentication differences between CyberArk Privilege Cloud and CyberArk PAM Self-Hosted?

Options:

A.

CyberArk Privilege Cloud only provides a username and password authentication without third-party IdP integration; CyberArk PAM Self-Hosted uses traditional on-premises methods such as Windows and LDAP. but lacks modern protocols such as SAML or OIDC.

B.

CyberArk Privilege Cloud uses cloud-based methods, integrating with CyberArk Identity for MFA. and supports SAML and OIDC; CyberArk PAM Self-Hosted depends on on-premises methods such as RADIUS and LDAP, but can adopt SAML or OIDC with additional setups.

C.

CyberArk Privilege Cloud requires on-premises components for all authentication and does not support other cloud-based authentication protocols; CyberArk PAM Self-Hosted offers a wide array of methods, including support for SAML. OIDC. and other modern protocols, without needing on-premises components.

D.

Both use the same authentication methods.

Buy Now
Questions 14

(Typing correction / missing stem noted)

Your last item only lists answer choices (no question text). Based on Privilege Cloud documentation, these choices most commonly appear with the question:

“Which tools can be used to upgrade Privilege Cloud Connector components (CPM/PSM)?” (Choose two.)

Options:

A.

Connector Configurator

B.

Connector Management Installer

C.

Privilege Cloud Installer

D.

Privilege Cloud Auto Installer

E.

Component Installer

Buy Now
Questions 15

The System Health page shows the status of all components related to Privilege Cloud. Which components can administrators monitor on this page? (Choose two.)

Options:

A.

Vault

B.

PTA

C.

PVWA

D.

CPM

E.

PSM

Buy Now
Questions 16

To disable the PSM default Support for Browser Sessions, which option should be set to 'No* before running Hardening?

Options:

A.

SupportWebApplications

B.

SupportBrowsers

C.

SupportWebBrowsers

D.

SupportHTML5Content

Buy Now
Questions 17

Which component supports the required communication to send audit logs from Privilege Cloud through the Syslog protocol to a SIEM application?

Options:

A.

CyberArk Syslog Writer

B.

Secure Tunnel

C.

Privilege Cloud Connector

D.

CyberArk Identity Connector

Buy Now
Questions 18

When using Connector Management, how do you configure a DR CPM in Privilege Cloud shared services? (Choose two.)

Options:

A.

Stop the CyberArk Password Manager service and set the startup type to Manual.

B.

When prompted for the Vault IP address on the installation windows, leave it blank and proceed.

C.

When prompted to select the CPM mode, select Passive.

D.

When prompted for the Vault administrator credentials on the installation windows, leave it blank and proceed.

E.

Stop the CyberArk Password Manager service and set the startup type to Automatic.

Buy Now
Questions 19

After the session has ended, where is the default final recording storage located?

Options:

A.

CyberArk Privilege Cloud

B.

Privilege Cloud Connector

C.

Network attached storage

D.

User workstation

Buy Now
Questions 20

Which statement best describes a PSM server's network requirements?

Options:

A.

It must reach the target system using its native protocols.

B.

It requires limited outbound connectivity to Ports 1858 and 443 only.

C.

It requires direct access to the internet.

D.

It requires broad inbound firewall rules and outbound traffic should be limited to Port 1858.

Buy Now
Questions 21

You are deploying a CyberArk Identity Connector to integrate Privilege Cloud Shared Services with an Active Directory environment. Which requirement must be met?

Options:

A.

The Identity Connector Server must be joined to the Active Directory.

B.

The Server must be a member of the root domain of the Active Directory forest.

C The Identity Connector must be installed on a Domain Controller.

C.

The Identity Connector must be installed using Domain Administrator credentials.

Buy Now
Questions 22

On the CPM, you want to verify if DEP is disabled for the required executables According to best practices, which executables should be listed? (Choose 2.)

Options:

A.

Telnet.exe

B.

Plink.exe

C.

putty.exe

D.

mstsc.exe

Buy Now
Questions 23

To use SAML authentication in Privilege Cloud Standard Services, users must first be defined in Privilege Cloud. What are correct methods for defining users? (Choose two.)

Options:

A.

Integrate Privilege Cloud with your LDAP server.

B.

Integrate Privilege Cloud with SIEM.

C.

Integrate Privilege Cloud with Email System.

D.

Create users in Privilege Cloud with details identical to those who access Privilege Cloud through SAML authentication.

E.

Create users in the CyberArk Privilege Cloud database using the CAVaultManager createuser command.

Buy Now
Questions 24

Which tool configures the user object that will be used during the installation of the PSM for SSH component?

Options:

A.

CreateUserPass

B.

CreateCredFile

C.

ConfigureCredFile

D.

ConfigureUserPass

Buy Now
Questions 25

You want to change the default PSM recordings folder path on the Privilege Cloud Connector Arrange the steps to accomplish this in the correct sequence.

CPC-CDE-RECERT Question 25

Options:

Buy Now
Questions 26

Your customer is using Privilege Cloud Shared Services. What is the correct CyberArk Vault address for this customer?

Options:

A.

carkvault-.privilegecloud.cyberark.cloud

B.

vault-.privilegecloud.cyberark.cloud

C.

v-.privilegecloud.cyberark.cloud

D.

carkvlt- privilegecloud.cyberark.cloud

Buy Now
Questions 27

Which ports do the CyberArk Identity Connector require to be opened to support using Active Directory for LDAP authentication to Privileged Cloud Shared Services? (Choose two.)

Options:

A.

TCP 636 from the connector host to the domain controller

B.

TCP 443 from the connector host to the CyberArk Tenant

C.

TCP 636 from the CyberArk Tenant to the domain controller

D.

TCP 443 from the CyberArk Tenant to the connector host

E.

TCP 636 from the domain controller to the CyberArk Tenant

Buy Now
Questions 28

In which platform configuration section under Automatic Password Management is the AllowedSafes platform parameter found?

Options:

A.

Privileged Account Management

B.

Additional Policy Settings

C.

General

D.

CPM plugin

Buy Now
Questions 29

You are designing a CyberArk Privilege Cloud environment for a new customer with three data center locations: one in London, one in New York, and one in Singapore. The customer wants to reduce the amount of traffic on their dedicated network links between each data center. Which design should you consider to manage their credentials?

Options:

A.

Deploy CPM connectors in each data center and configure region specific Safes.

B.

Deploy a CPM connector in London and increase the number of days between password changes.

C.

Deploy three CPM connectors in New York, and configure region specific Safes to send traffic equally to each connector CPM.

D.

Deploy CPM connectors in a single data center because the password management traffic is routed through the Privilege Cloud service.

Buy Now
Exam Code: CPC-CDE-RECERT
Exam Name: CyberArk CDE-CPC Recertification
Last Update: Mar 1, 2026
Questions: 99

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CPC-CDE-RECERT testing engine

PDF (Q&A)

$43.57  $124.49
buy now CPC-CDE-RECERT pdf