Users are unable to launch Web Type Connection components from the PSM server. Your manager asked you to open the case with CyberArk Support.
Which logs will help the CyberArk Support Team debug the issue? (Choose three.)
Correct Answer:ACD
When users are unable to launch Web Type Connection components from the PSM server, the CyberArk Support Team will require specific logs to debug the issue. The logs that are typically helpful in such cases include:
✑ PSMConsole.log: This log file contains informational messages and errors related to the PSM function, which can help identify issues with the PSM server’s operation1.
✑ PSMTrace.log: This log file includes errors and trace messages, which can provide detailed insights into the issues occurring during the PSM server’s processes1.
✑
These logs can provide the necessary information to understand the problem and assist the support team in resolving the issue effectively.
References:
✑ CyberArk’s official documentation on PSM for Web Troubleshooting, which outlines the types of logs available and their purposes in the troubleshooting process1.
✑ Additional resources on managing and interpreting PSM logs, which provide guidance on using logs for diagnosing and resolving issues with the PSM server2
When on-boarding account using Accounts Feed, Which of the following is true?
Correct Answer:B
When on-boarding accounts using Accounts Feed, you can either select an existing safe or create a new one to store the accounts. You can also specify the platform, policy, and owner for each account. However, you cannot create a new platform using Accounts Feed, and not all platforms support automatic reconciliation. References:
✑ Accounts Feed - CyberArk
✑ CyberArk University
✑ [Defender-PAM Sample Items Study Guide]
A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request.
What is the correct location to identify users or groups who can approve?
Correct Answer:B
In CyberArk’s Privileged Access Management (PAM), the correct location to identify users or groups who can approve a dual-control request is within the Password Vault Web Access (PVWA). Specifically, you would navigate to the ‘Policies’ section, then to ‘Access Control (Safes)’, and within a safe, you would go to ‘Safe Members’. Here, under the ‘Workflow’ tab, there is an option to ‘Authorize Password Requests’. This is where the Vault Admin can identify which users or groups are authorized to approve requests for viewing passwords secured by dual-control.
References: The information is based on the best practices and guidelines provided in the CyberArk Defender PAM course and learning resources, which include the official CyberArk documentation and study guides.
How do you create a cold storage backup?
Correct Answer:A
To create a cold storage backup, you would install thePAReplicate utility
on the DR Vault as per the installation guide. This utility is part of the CyberArk Vault’s backup solution and is used to export the encrypted contents of your Safes securely to a computer outside the Vault environment. After installation, you would configure the logon ini file with the necessary credentials and define the scheduled tasks for both full and incremental backups. This ensures that the Safes are regularly backed up and that the data is available for recovery if needed1.
References:
✑ CyberArk’s official documentation on using the CyberArk Backup Process, which includes details on the PAReplicate utility and how to configure it for cold storage backups1.
✑ Additional information on installing the Vault Backup Utility and configuring backup options, which provides context for the correct answer
You created a new platform by duplicating the out-of-box Linux through the SSH platform.
Without any change, which Text Recorder Type(s) will the new platform support? (Choose two.)
Correct Answer:AB
When a new platform is created by duplicating the out-of-the-box Linux through the SSH platform, it will support the SSH Text Recorder and theUniversal Keystrokes Text Recorder by default. The SSH Text Recorder is designed to record all the keystrokes that are typed during privileged sessions on SSH connections1. The Universal Keystrokes Text Recorder can record all the keystrokes that are typed during privileged sessions on all supported connections1. These text recorders are automatically enabled at the Master Policy level and can be customized at the platform level1. References:
✑ CyberArk Docs: Recordings and Audits
DRAG DROP
Arrange the steps to restore a Vault using PARestore for a Backup in the correct sequence.
Solution:
BackupFilesDeletion=No
PARestore vault.ini operator /FullVaultRestore CAVaultManager RecoverBackupFiles CAVaultManager RestoreDB BackupFilesDeletion=Yes,24,1,5,7d
https://docs.cyberark.com/Product- Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Restoring-Safes-or-the-Vault.htm
Does this meet the goal?
Correct Answer:A