Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

PAM-SEN CyberArk Sentry PAM Questions and Answers

Questions 4

When performing “In Domain” hardening of a PSM server, which steps must be performed? (Choose two.)

Options:

A.

Import CyberArk policy settings from the provided file into a new GPO. Most Voted

B.

Apply advanced audit on the PSM server.

C.

Link GPO to a dedicated OU containing CyberArk PSM servers. Most Voted

D.

Import an INF file to the local machine.

E.

Configure AppLocker rules to block running unknown executables.

Buy Now
Questions 5

Which statement is correct about CPM behavior in a distributed Vault environment?

Options:

A.

CPMs should only access the primary Vault. When it is unavailable, CPM cannot access any Vault until another Vault is promoted as the new primary Vault.

B.

CPMs should access only the satellite Vaults.

C.

CPMs should only access the primary Vault. When it is unavailable, CPM cannot access any Vault until the original primary Vault is operational again.

D.

CPM should access all Vaults - primary and the satellite.

Buy Now
Questions 6

Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.

Options:

A.

Server Key

B.

Recovery Public Key

C.

Recovery Private Key

D.

Safe Key

Buy Now
Questions 7

Which authentication methods does PSM for SSH support?

Options:

A.

CyberArk password LDAP, RADIUS, SAML

B.

LDAP, Windows Authentication, SSH keys

C.

RADIUS, Oracle SSO, CyberArk Password

D.

CyberArk Password, LDAP, RADIUS

Buy Now
Questions 8

During the PSM installation process, Safes and a User are created.

In addition to Add Safes, Add/Update Users, Reset Users’ Passwords, and Activate Users, which authorization(s) does the Vault user installing the PSM need to enable them to be successfully created?

Options:

A.

Manage Vault File Categories Most Voted

B.

Manage Server File Categories

C.

Manage Directory Mapping, Manage Server File Categories

D.

Manage Directory Mapping, Manage Vault File Categories

Buy Now
Questions 9

The Remote Desktop Services role must be property licensed by Microsoft.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 10

A customer has five main data centers with one PVWA in each center under different URLs.

How can you make this setup fault tolerant?

Options:

A.

This setup is already fault tolerant.

B.

Install more PVWAs in each data center.

C.

Continuously monitor PVWA status and send users the link to another PVWA if issues are encountered.

D.

Load balance all PVWAs under same URL.

Buy Now
Questions 11

Which step is required to register a Vault manually in Amazon Web Services using CAVaultManager?

Options:

A.

Specify Amazon as the cloud vendor using the /CloudVendor Flag

B.

After running the postinstall utility, restart the " PrivateArk Server " service

C.

Specify the Cloud region using the /CloudRegion flag

D.

Specify whether the Vault is distributed or stand alone

Buy Now
Questions 12

Which command should be executed to harden a Vault after registering it to Azure?

Options:

A.

HardenAzureFW.ps1 Most Voted

B.

ExecuteStage ./Hardening/HardeningConf.xml

C.

HardenVaultFW.ps1

D.

ExecuteStage ./PostInstallation/PostInstallation.xml

Buy Now
Questions 13

What is required before the first CPM can be installed?

Options:

A.

The environment must have at least one Vault and one PVWA installed.

B.

The Vault environment must have at least one account stored in a safe.

C.

Custom platforms must be downloaded from the CyberArk Marketplace.

D.

The PSM component must be installed and proper functionality validated.

Buy Now
Questions 14

What authentication methods can be implemented to enforce Two-Factor Authentication (2FA) for users authenticating to CyberArk using both the PVWA (through the browser) and the PrivateArk Client?

Options:

A.

LDAP and RADIUS Most Voted

B.

CyberArk and RADIUS

C.

SAML and Cyber Ark

D.

SAML and RADIUS

Buy Now
Questions 15

The PrivateArk clients allows a user to view the contents of the vault like a filesystem.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

A customer is moving from an on-premises to a public cloud deployment.

What is the best and most cost-effective option to secure the server key?

Options:

A.

Install the Vault in the cloud the same way you would in an on-premises environment. Place the server key in a password protected folder on the operating system.

B.

Install the Vault in the cloud the same way you would in an on-premises environment. Purchase a Hardware Security Module to secure the server key.

C.

Install the Vault using the native cloud images and secure the server key using native cloud Key Management Systems.

D.

Install the Vault using the native cloud images and secure the server key with a Hardware Security Module.

Buy Now
Questions 17

You have been asked to limit a platform called “Windows_Servers” to safes called “WindowsDC1” and “WindowsDC2”. The platform must not be assigned to any other safe.

What is the correct way to accomplish this?

Options:

A.

Edit the “Windows_Servers” platform, expand “Automatic Password Management”, then select General and modify “AllowedSafes” to be (WindowsDC1)|(WindowsDC2).

B.

Edit the “Windows_Servers” platform, expand “Automatic Password Management”, then select Options and modify “AllowedSafes” to be (Win*).

C.

Edit the “WindowsDC1” and “WindowsDC2” safes through Safe Management, Add “Windows_Servers” to the “AllowedPlatforms”.

D.

Log in to PrivateArk using an Administrative user, Select File, Server File Categories, Locate the category “WindowsServersAllowedSafes” and specify “WindowsDC1,WindowsDC2”.

Buy Now
Questions 18

A vault admin received an email notification that a password verification process has failed Which service sent the message?

Options:

A.

The PrivateArk Server Service on the Vault.

B.

The CyberArk Password Manager service on the Components Server.

C.

The CyberArk Event Notification Engine Service on the Vault

D.

The CyberArk Privileged Session Manager service on the Vault.

Buy Now
Questions 19

Which of the following are prerequisites for installing PVWA Check all that Apply.

Options:

A.

Web Services Role

B.

NET 4.5.1 Framework Feature

C.

Remote Desktop Services Role

D.

Windows BitLocker

Buy Now
Questions 20

The RemoteApp feature of PSM allows seamless Application windows (i e the Desktop of the PSM server will not be visible)

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

CyberArk User Neil is trying to connect to the Target Linux server 192.168.1.164 using a domain account ACME/linuxuser01 on domain acme.corp using PSM for SSH server 192.168.65.145.

What is the correct syntax?

Options:

A.

ssh neil@linuxuser01:acme.corp@192.168.1.164@192.168.65.145

B.

ssh neil@linuxuser01#acme.corp@192.168.1.164@192.168.65.145 Most Voted

C.

ssh neil@linuxuser01@192.168.1.164@192.168.65.145

D.

ssh neil@linuxuser01@acme.corp@192.168.1.164@192.168.65.145

Buy Now
Questions 22

For redundancy, you want to add a secondary RADIUS server.

What must you do to accomplish this?

Options:

A.

Add to the application settings of the PVWA web.config file.

B.

In the PVWA vault.ini file, list each RADIUS server host address in the " Addresses " attribute separated by commas.

C.

Open the DBParm.ini on the Vault server. Add the second RADIUS server configuration settings after the first one, separated by a comma. Most Voted

D.

In the PVWA web.config file, add the location element at the end of the config file. Set the path value to " Default Web Site/PasswordVault/api/auth/pkipn/logon " .

Buy Now
Questions 23

Which browser is supported for PSM Web Connectors developed using the CyberArk Plugin Generator Utility (PGU)?

Options:

A.

Internet Explorer

B.

Google Chrome

C.

Opera

D.

Firefox

Buy Now
Questions 24

Before the hardening process, your customer identified a PSM Universal Connector executable that will be required to run on the PSM.

Which file should you update to allow this to run?

Options:

A.

PSMConfigureAppLocker.xml

B.

PSMHardening.xml

C.

PSMAppConfig.xml

D.

PSMConfigureHardening.xml

Buy Now
Questions 25

What is the best practice for storing the Master CD?

Options:

A.

Copy the files to the Vault server and discard the CD.

B.

Copy the contents of the CD to a Hardware Security Module and discard the CD.

C.

Store the CD in a secure location, such as a physical safe.

D.

Store the CD in a secure location, such as a physical safe, and copy the contents of the CD to a folder (secured with NTFS permissions} on the vault.

Buy Now
Questions 26

Which component should be installed on the Vault if Distributed Vaults are used with PSM?

Options:

A.

RabbitMQ

B.

Disaster Recovery

C.

Remote Control Client

D.

Distributed Vault Server

Buy Now
Questions 27

The security of the Vault Server is entirely dependent on the security of the network.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

The primary purpose of the CPM is Password Management.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 29

If a customer has one data center and requires fault tolerance, how many PVWAs should be deployed?

Options:

A.

two or more

B.

one PVWA cluster

C.

one

D.

two PVWA clusters

Buy Now
Questions 30

Which components can connect to a satellite Vault in a distributed Vault architecture?

Options:

A.

CPM, EPM, PTA

B.

PVWA, PSM

C.

CPM, PVWA, PSM

D.

CPM, PSM

Buy Now
Questions 31

What are the basic network requirements to deploy a CPM server?

Options:

A.

Port 1858 to Vault and Port 443 to PVWA

B.

Port 1858 only

C.

all ports to the Vault

D.

Port UDP/1858 to Vault and all required ports to targets and Port 389 to the PSM

Buy Now
Questions 32

You need to add a new PSM server to an existing CyberArk environment.

What is the best way to determine the sizing of this server?

Options:

A.

Review the “Recommended Server Specifications” for PSMs in the CyberArk Documents website. Most Voted

B.

Use the specifications of any existing PSM and request a server of the same size.

C.

Use the CyberArk Support Knowledgebase, search for “PSM Sizing” and locate the Knowledgebase article related to sizing.

D.

Refer to the Microsoft Windows website, determine the minimum specifications required for the Operating System you are installing, and then add 4 Gb of RAM and 20 GB of disk.

Buy Now
Questions 33

What is the purpose of the PSM health check hardening?

Options:

A.

Remove IIS settings which can be considered security vulnerabilities.

B.

Validate that the PSM is ready to be placed behind a load balancer.

C.

Confirm that the Windows Services for PSM are running on the server.

D.

Ensure that the AppLocker script does not have any syntax errors.

Buy Now
Questions 34

What is a step to enable NTP synchronization on a stand-alone Vault?

Options:

A.

Run Powershell and add the NTP module.

B.

Restart the organization ' s NTP servers.

C.

Edit dbparm.ini and add a Firewall rule for the NTP address.

D.

Restart the Vault Event Notification Engine service.

Buy Now
Questions 35

In a SIEM integration it is possible to use the fully-qualified domain name (FQDN) when specifying the SIEM server address(es)

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

The vault server uses a modified version of the Microsoft Windows firewall.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 37

The account used to install a PVWA must have ownership of which safes? (Choose two.)

Options:

A.

VaultInternal

B.

PVWAConfig

C.

System

D.

Notification Engine

E.

PVWAReports

Buy Now
Questions 38

As a member of a PAM Level-2 support team, you are troubleshooting an issue related to load balancing four PVWA servers at two data centers. You received a note from your Level-1 support team stating “When testing PVWA website from a workstation, we noticed that the “Source IP of last sign-in” was shown as the VIP (Virtual IP address) assigned to the four PVWA servers instead of the workstation IP where the PVWA site was launched from.”

Which step should you take?

Options:

A.

Verify the “LoadBalancerClientAddressHeader” parameter setting in PVWA configuration file Web.config is set to “X-Forwarded-For”.

B.

Add the VIP (Virtual IP address) assigned to the four PVWA servers to the certificates issued for all four PVWA servers, if missing.

C.

Add a firewall rule to allow the testing workstation to connect to the VIP (Virtual IP address) assigned to the four PVWA servers on Port TCP 443.

D.

Edit the dbparm.ini file on the Vault server and add the IP or subnet of the workstation to the whitelist.

Buy Now
Questions 39

You want to improve performance on the CPM by restricting accounts for the CYBRWINDAD platform to only the WINDEMEA and WINDEMEA_Admin safes.

How do you set this in CyberArk?

Options:

A.

In the CYBRWINDAD platform, under Automatic Password Management/General, configure AllowedSafes and set to (WINDEMEA)|(WINDEMEA_ADMIN). Most Voted

B.

In the settings for Configuration/CPM assigned to the WINDEMEA and WINDEMEAADMIN safes, configure AllowedSafes and set to (WINDEMEA)|(WINDEMEAADMIN).

C.

In the CYBRWINDAD platform, under UI & Workflows/Properties/Optional, configure AllowedSafes and set to (WINDEMEA)|(WINDEMEA_ADMIN).

D.

Modify cpm.ini on the relevant CPM/s and add the setting AllowedSafesCYBRWINDAD and set to (WINDEMEA)|(WINDEMEAADMIN).

Buy Now
Questions 40

What are the operating system prerequisites for installing CPM? Select all that apply.

Options:

A.

NET 3.51 Framework Feature

B.

Web Services Role

C.

Remote Desktop Services Role

D.

Windows 2008 R2 or higher.

Buy Now
Exam Code: PAM-SEN
Exam Name: CyberArk Sentry PAM
Last Update: May 18, 2026
Questions: 136

PDF + Testing Engine

$64.99  $185.69

Testing Engine

$49.99  $142.83
buy now PAM-SEN testing engine

PDF (Q&A)

$54.99  $157.11
buy now PAM-SEN pdf