CyberArk cpc-sen practice test

Exam Title: Privilege Cloud

Last update: Nov 27 ,2025
Question 1

After correctly configuring reconciliation parameters in the Prod-AIX-Root-Accounts Platform, this
error message appears in the CPM log: CACPM410E Ending password policy Prod-AIX-Root-Accounts
since the reconciliation task is active but the AllowedSafes parameter was not updated What caused
this situation?

  • A. The reconciliation account defined in the Platform is in a locked state and is not accessible.
  • B. The CPM is currently configured to use to an unsigned engine.
  • C. The AllowedSafes parameter does not include the safe containing the reconciliation account defined in the Platform.
  • D. A second CPM is incorrectly configured to manage the reconciliation account's safe which is causing a deadlock situation between the two CPMs.
Answer:

C


Explanation:
The error message "CACPM410E Ending password policy Prod-AIX-Root-Accounts since the
reconciliation task is active but the AllowedSafes parameter was not updated" suggests an issue with
configuration parameters. The likely cause is:
The AllowedSafes parameter does not include the safe containing the reconciliation account defined
in the Platform (Option C). This parameter must accurately reflect all safes where the reconciliation
account operates to ensure proper management and access by the Central Policy Manager (CPM). If
the safe containing the reconciliation account is not listed, the CPM cannot perform its tasks, leading
to this error.
Reference: CyberArk’s error codes and troubleshooting guides detail how specific configuration
mismatches, like an incomplete AllowedSafes parameter, can disrupt normal operations, especially
in reconciliation processes.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

How can a platform be configured to work with load-balanced PSMs?

  • A. Remove all entries from configured PSM Servers except for the ID of the PSMs with load balancing.
  • B. Create a new PSM definition that targets the load balancer IP address and assign to the platform.
  • C. Include details of the PSMs with load balancing in the Basic_psm.ini file on each PSM server.
  • D. Use the Privilege Cloud Portal to update the Session Management settings for the platform in the Master Policy.
Answer:

B


Explanation:
To configure a platform to work with load-balanced Privileged Session Managers (PSMs), you should:
Create a new PSM definition that targets the load balancer IP address and assign it to the platform
(Option B). This approach involves configuring the platform settings to direct session traffic through a
load balancer that distributes the load across multiple PSM servers. This is effective in environments
where high availability and fault tolerance are priorities.
Reference: CyberArk’s setup guidelines for high-availability environments typically recommend
configuring platforms to utilize load balancers to ensure continuous availability and optimal
distribution of session management tasks.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

You are deploying a CyberArk Identity Connector to integrate Privilege Cloud Shared Services with an
Active Directory environment. Which requirement must be met?

  • A. The Identity Connector Server must be joined to the Active Directory.
  • B. The Server must be a member of the root domain of the Active Directory forest. C The Identity Connector must be installed on a Domain Controller.
  • D. The Identity Connector must be installed using Domain Administrator credentials.
Answer:

A


Explanation:
When deploying a CyberArk Identity Connector to integrate Privilege Cloud Shared Services with an
Active Directory environment, the server hosting the Identity Connector must meet specific
requirements to ensure proper integration and functionality. The necessary condition is:
The Identity Connector Server must be joined to the Active Directory (Option A). This requirement
ensures that the server can communicate effectively with the Active Directory services and manage
identity data securely and efficiently. Being part of the Active Directory domain facilitates
authentication and authorization processes required for the connector to function correctly.
Reference: CyberArk installation and configuration guides typically emphasize the importance of
having the Identity Connector server joined to the domain to allow seamless interaction with Active
Directory services.

vote your answer:
A
B
D
A 0 B 0 D 0
Comments
Question 4

Your customer is using Privilege Cloud Shared Services. What is the correct CyberArk Vault address
for this customer?

  • A. carkvault-<subdomain>.privilegecloud.cyberark.cloud
  • B. vault-<subdomain>.privilegecloud.cyberark.cloud
  • C. v-<subdomain>.privilegecloud.cyberark.cloud
  • D. carkvlt-<subdomain> privilegecloud.cyberark.cloud
Answer:

B


Explanation:
For customers using CyberArk Privilege Cloud Shared Services, the correct format for the CyberArk
Vault address is:
vault-<subdomain>.privilegecloud.cyberark.cloud (Option B). This format is used to access the vault
services provided by CyberArk in the cloud environment, where <subdomain> is the unique identifier
assigned to the customer’s specific instance of the Privilege Cloud.
Reference: CyberArk’s Privilege Cloud documentation provides details on how to access various
services, including the vault. The standard naming convention for accessing the vault services in the
cloud typically follows this format.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

You are implementing LDAPS Integration for a standard Privilege Cloud environment.
Which information must be provided to the CyberArk Privilege Cloud support team through a Service
Request? (Choose 2.)

  • A. LDAPS certificate chain for all domain controllers to be integrated
  • B. LDAP bind username and password used to authenticate to the directory to be integrated C Domain Base Context used to locate the users and groups in the Active Directory to be integrated
  • D. Fully Qualified Domain Name and IP Address of the domain controllers to be integrated
  • E. remote port set during secure tunnel configuration for each domain controller to be integrated
Answer:

A, D


Explanation:
When implementing LDAPS Integration for a standard Privilege Cloud environment, certain
information is crucial and must be provided to the CyberArk Privilege Cloud support team through a
Service Request. The necessary details include:
LDAPS certificate chain for all domain controllers to be integrated (Option A): This information is
critical to establishing a trusted secure connection between the Privilege Cloud and the domain
controllers using LDAP over SSL (LDAPS).
Fully Qualified Domain Name and IP Address of the domain controllers to be integrated (Option D):
This information is essential for accurately identifying and configuring the network connections to
each domain controller that will be integrated with the Privilege Cloud.
Reference: The process of setting up LDAPS integration typically requires detailed network and
security information about the domain controllers to ensure secure and reliable connectivity.
CyberArk support documentation and service request forms usually specify the need for these
details.

vote your answer:
A
B
D
E
A 0 B 0 D 0 E 0
Comments
Question 6

Which statement best describes a PSM server's network requirements?

  • A. It must reach the target system using its native protocols.
  • B. It requires limited outbound connectivity to Ports 1858 and 443 only.
  • C. It requires direct access to the internet.
  • D. It requires broad inbound firewall rules and outbound traffic should be limited to Port 1858.
Answer:

A


Explanation:
For a Privilege Session Manager (PSM) server, the network requirements primarily focus on its ability
to interact with target systems securely and efficiently. The most accurate statement regarding these
requirements is:
It must reach the target system using its native protocols (Option A). This is essential for the PSM to
manage sessions effectively, as it needs to communicate using the protocols that the target systems
are configured to accept, such as SSH for Linux servers or RDP for Windows servers.
Reference: CyberArk’s PSM documentation typically outlines the need for PSM servers to have
network paths configured to communicate directly with target systems using the relevant protocols
to ensure secure and controlled session management.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Which users are Privilege Cloud Standard built-in users? (Choose 2.)

  • A. NASCorp
  • B. saascorps
  • C. CyberArkAdmin
  • D. remoteAccessAppUser
  • E. PASReporterUser
Answer:

C, E


Explanation:
In CyberArk Privilege Cloud Standard, certain users are predefined as built-in for administrative and
operational purposes. The built-in users include:
CyberArkAdmin (Option C): This user is typically set up as a default administrator with full access to
manage and configure the Privilege Cloud environment.
PASReporterUser (Option E): This user is often configured as a reporting user, designed to generate
and access various reports without having broader administrative privileges.
Reference: CyberArk’s Privilege Cloud setup and administration guides usually list these users as part
of the default configuration to facilitate initial setup and ongoing management of the platform.

vote your answer:
A
B
C
D
E
A 0 B 0 C 0 D 0 E 0
Comments
Question 8

On the CPM, you want to verify if DEP is disabled for the required executables According to best
practices, which executables should be listed? (Choose 2.)

  • A. Telnet.exe
  • B. Plink.exe
  • C. putty.exe
  • D. mstsc.exe
Answer:

B, C


Explanation:
On the Central Policy Manager (CPM), it is crucial to verify that Data Execution Prevention (DEP) is
disabled for specific executables required for proper operation according to best practices. The
relevant executables include:
Plink.exe (Option B): This executable is commonly used for SSH communications and may require
DEP to be disabled to function correctly under certain configurations.
putty.exe (Option C): Similar to Plink.exe, Putty is another essential tool for SSH communications and
might also require DEP to be disabled to prevent any execution issues.
Reference: CyberArk’s best practices for system configuration often highlight the need to adjust DEP
settings for certain executables to ensure they run without interruption, particularly when these
tools are crucial for secure communications and operations management.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

What is the default username for the PSM for SSH maintenance user?

  • A. proxymng
  • B. psmp_maintenance
  • C. psmpmaintenanceuser
  • D. proxyusr
Answer:

B


Explanation:
The default username for the Privileged Session Manager (PSM) for SSH maintenance user in
CyberArk Privilege Cloud is psmp_maintenance. This account is used for maintenance purposes and
is integral for administrative tasks and configurations related to SSH sessions managed by the PSM.
The username is predefined and standardized across deployments to maintain consistency and
ensure security best practices are adhered to. The username is mentioned in the CyberArk official
documentation regarding PSM configuration for SSH.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

What is a supported certificate format for retrieving the LDAPS certificate when not using the
Cyberark provided LDAPS certificate tool?

  • A. .der
  • B. .p7b
  • C. p7c
  • D. p12
Answer:

A


Explanation:
For retrieving the LDAPS certificate when not using the CyberArk provided LDAPS certificate tool, the
supported certificate format is .der. The DER (Distinguished Encoding Rules) format is a binary form
of a certificate rather than the ASCII PEM format. This format is widely supported across various
systems for securing LDAP connections by providing a mechanism for LDAP servers to authenticate
themselves to users. This information can be verified by checking LDAP configuration guides and
CyberArk's secure implementation documentation which outline supported certificate formats for
LDAP integrations.

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 4
Viewing questions 1-10 out of 50
Go To
page 2