CyberArk PAM-SEN Practice Exams
Last updated on Apr 12,2025 - Exam Code: PAM-SEN
- Exam Name: CyberArk Sentry – PAM
- Certification Provider: CyberArk
- Latest update: Apr 12,2025
What would be a good use case for the Disaster Recovery module?
- A . Recovery Time Objectives or Recovery Point Objectives are at or near zero.
- B . Integration with an Enterprise Backup Solution is required.
- C . Off site replication is required.
- D . PSM is used.
As a member of a PAM Level-2 support team, you are troubleshooting an issue related to load balancing four PVWA servers at two data centers. You received a note from your Level-1 support team stating “When testing PVWA website from a workstation, we noticed that the “Source IP of last sign-in” was shown as the VIP (Virtual IP address) assigned to the four PVWA servers instead of the workstation IP where the PVWA site was launched from.”
Which step should you take?
- A . Verify the “LoadBalancerClientAddressHeader” parameter setting in PVWA configuration file Web.config is set to “X-Forwarded-For”.
- B . Add the VIP (Virtual IP address) assigned to the four PVWA servers to the certificates issued for all four PVWA servers, if missing.
- C . Add a firewall rule to allow the testing workstation to connect to the VIP (Virtual IP address) assigned to the four PVWA servers on Port TCP 443.
- D . Edit the dbparm.ini file on the Vault server and add the IP or subnet of the workstation to the whitelist.
A first PSM server has been installed.
What should you confirm before installing any additional PSM servers?
- A . The PSM ID of the first installed PSM server was changed and the additional PSM server can use the same PSM ID.
- B . The user performing the installation is a direct owner in the PSMUnmanagedSessionAccounts Safe, PSM safe and member of PVWAMonitor group.
- C . The user performing the installation is not a direct owner in the PSMUnmanagedSessionAccounts Safe. Most Voted
- D . The path of the Recordings Folder must be different on all PSM installations.
What is a valid combination of primary and secondary layers of authentication to a company’s two-factor authentication policy?
- A . RSA SecurID Authentication (in PVWA) and LDAP Authentication
- B . CyberArk Authentication and RADIUS Authentication
- C . Oracle SSO (in PVWA) and SAML Authentication
- D . LDAP Authentication and RADIUS Authentication
After a PSM session is complete, the PSM server uploads the recording to the Vault for long-term storage.
- A . TRUE
- B . FALSE
During the PSM installation process, Safes and a User are created.
In addition to Add Safes, Add/Update Users, Reset Users’ Passwords, and Activate Users, which authorization(s) does the Vault user installing the PSM need to enable them to be successfully created?
- A . Manage Vault File Categories Most Voted
- B . Manage Server File Categories
- C . Manage Directory Mapping, Manage Server File Categories
- D . Manage Directory Mapping, Manage Vault File Categories
Which file would you modify to configure your Vault Server to forward Activity Logs to a SIEM or SYSLOG server?
- A . dbparm.ini
- B . PARagent.ini
- C . ENEConf.ini
- D . padr.ini
Your customer wants to store the Safes Data on Vault Drive D instead of Drive C.
Which file should you edit?
- A . TSparm.ini Most Voted
- B . Vault.ini
- C . DBparm.ini
- D . user.ini
A customer wants to store PSM recordings for 100 days and estimates they will have 10 Windows sessions per day for 100 minutes each.
What is the minimum storage required for the Vault and PAReplicate for the PSM recordings?
- A . 25 GB Most Voted
- B . 250 GB
- C . 500 GB
- D . 5GB
In order to avoid conflicts with the hardening process, third party applications like Antivirus and Backup Agents should be installed on the Vault server before installing the Vault.
- A . TRUE
- B . FALSE