Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

CPC-SEN CyberArk Sentry - Privilege Cloud Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CyberArk CPC-SEN CyberArk Sentry - Privilege Cloud certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 50 questions

Following the installation of the PSM for SSH server, which additional tasks should be performed? (Choose 2.)

A.

Delete the user.cred file used during installation.

B.

Delete the vault.ini you used during installation.

C.

Delete the psmpparms file you used during installation.

D.

Package all installation log files for upload to CyberArk.

Which option correctly describes the authentication differences between CyberArk Privilege Cloud and CyberArk PAM Self-Hosted?

A.

CyberArk Privilege Cloud only provides a username and password authentication without third-party IdP integration; CyberArk PAM Self-Hosted uses traditional on-premises methods such as Windows and LDAP. but lacks modern protocols such as SAML or OIDC.

B.

CyberArk Privilege Cloud uses cloud-based methods, integrating with CyberArk Identity for MFA. and supports SAML and OIDC; CyberArk PAM Self-Hosted depends on on-premises methods such as RADIUS and LDAP, but can adopt SAML or OIDC with additional setups.

C.

CyberArk Privilege Cloud requires on-premises components for all authentication and does not support other cloud-based authentication protocols; CyberArk PAM Self-Hosted offers a wide array of methods, including support for SAML. OIDC. and other modern protocols, without needing on-premises components.

D.

Both use the same authentication methods.

What is the default username for the PSM for SSH maintenance user?

A.

proxymng

B.

psmp_maintenance

C.

psmpmaintenanceuser

D.

proxyusr

Arrange the steps to install passive CPM using Connector Management in the correct sequence

On Privilege Cloud, what can you use to update users' Permissions on Safes? (Choose 2.)

A.

Privilege Cloud Portal

B.

PrivateArk Client

C.

REST API

D.

PACLI

E.

PTA

After correctly configuring reconciliation parameters in the Prod-AIX-Root-Accounts Platform, this error message appears in the CPM log: CACPM410E Ending password policy Prod-AIX-Root-Accounts since the reconciliation task is active but the AllowedSafes parameter was not updated What caused this situation?

A.

The reconciliation account defined in the Platform is in a locked state and is not accessible.

B.

The CPM is currently configured to use to an unsigned engine.

C.

The AllowedSafes parameter does not include the safe containing the reconciliation account defined in the Platform.

D.

A second CPM is incorrectly configured to manage the reconciliation account's safe which is causing a deadlock situation between the two CPMs.

On the CPM, you want to verify if DEP is disabled for the required executables According to best practices, which executables should be listed? (Choose 2.)

A.

Telnet.exe

B.

Plink.exe

C.

putty.exe

D.

mstsc.exe

How can a platform be configured to work with load-balanced PSMs?

A.

Remove all entries from configured PSM Servers except for the ID of the PSMs with load balancing.

B.

Create a new PSM definition that targets the load balancer IP address and assign to the platform.

C.

Include details of the PSMs with load balancing in the Basic_psm.ini file on each PSM server.

D.

Use the Privilege Cloud Portal to update the Session Management settings for the platform in the Master Policy.

Which statement is correct about using the AllowedSafes platform parameter?

A.

It allows users to access accounts in specific safes.

B.

It prevents the CPM from scanning all safes, restricting it to scan only safes that match the AllowedSafes configuration.

C.

It allows the CPM to access PSM safes to monitor platform configuration and connection component changes.

D.

It prevents the CPM from processing pending items in the Discovery safes enforcing manual intervention to complete the onboarding process.

What is the recommended method to enable load balancing and failover of the CyberArk Identity Connector?

A.

Setup IIS based Application Request Routing on two or more CyberArk Identity Connector servers.

B.

Set up a network load balancer between two or more CyberArk Identity Connector servers.

C.

Set up two or more CyberArk Identity Connector servers only.

D.

Set up a Microsoft Failover Cluster on two or more CyberArk Identity Connector servers.

A CyberArk Privileged Cloud Shared Services customer asks you how to find recent failed login events for all users. Where can you do this without generating reports?

A.

Privileged Cloud Portal

B.

Identity Administration Portal

C both Identity Administration and Identity User Portals

C.

Identity User Portal

You are planning to configure Multi-Factor Authentication (MFA) for your CyberArk Privilege Cloud Shared Service. What are the available authentication methods?

A.

LDAR RADIUS. SAML OpenID Connect (OIDC)

B.

Windows. PKI. RADIUS. CyberArk, LDAP. SAML. OpenID Connect (OIDC)

C.

Privilege Cloud Shared Services fully utilize CyberArk Identity and its MFA options.

D.

Only RADIUS can be used to achieve MFA across all components, such as PSM for RDP and PSM for SSH.

What are the basic network requirements to deploy a CPM server?

A.

Port 1858 to the Privilege Cloud Vault service backend and Port 443 to the Privilege Cloud Portal

B.

Port 1858 only

C.

any ports to the Privilege Cloud Vault service backend

D.

Port UDP/1858 to the Privilege Cloud Vault service backend and all required ports to the targets and Port 3389 to the PSM

Which tool configures the user object that will be used during the installation of the PSM for SSH component?

A.

CreateUserPass

B.

CreateCredFile

C.

ConfigureCredFile

D.

ConfigureUserPass

In the directory lookup order, which directory service is always looked up first for the CyberArk Privilege Cloud solution?

A.

Active Directory

B.

LDAP

C.

Federated Directory

D.

CyberArk Cloud Directory

Page: 1 / 1
Total 50 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved