CyberArk Sentry – PAM Certification PAM-SEN Exam Dumps

0
131
PAM-SEN exam is the new code for CyberArk Sentry – PAM Certification which replace the old code CAU301 exam. Passcert new released CyberArk Sentry – PAM Certification PAM-SEN Exam Dumps to help you analyze that how much you are prepared for the exam. It will ensure your 100% authentic preparation for the CyberArk PAM-SEN exam. Passcert PAM-SEN Exam Dumps not only prepares you for the CyberArk PAM-SEN exam, but we also work on your confidence and enhance your skills so you can be more accurately ready for the CyberArk Sentry exam. After studying our CyberArk Sentry – PAM Certification PAM-SEN Exam Dumps, you can easily pass this CyberArk PAM-SEN on the very first attempt without any difficulty.
CyberArk Sentry – PAM Certification PAM-SEN Exam Dumps

Sentry – PAM certification Summary

The Sentry – PAM certification track provides participants with the tools to deploy, install and configure a basic setup of the CyberArk PAS Solution.  A CyberArk Certified Sentry – PAM is capable of performing the following tasks:  Deploying the CyberArk Privileged Access Security Solution following least privilege access principles. Defining the CyberArk Privileged Access Security Solution architecture, requirements and workflow. Securely managing and monitoring privileged account access to target hosts using Privileged Session Manager. Configuring secure integrations with external services: LDAP/S, RADIUS, SMTP, SYSLOG.

Exam Details

The exam has 65 multiple-choice questions.
You have 90 minutes to complete the exam.
The exam fee is $200 USD.
Passing score (at least 70% correct).
Pre-Requisites: Defender Certification: Defender – PAM

Audience

The Sentry – PAM Certification is designed for:
Anyone who will be required to deploy the CyberArk Privileged Security Solution
Vault Administrators / IT Personnel who would like to increase their knowledge of the CyberArk PAS solution

Exam Objectives

Deploy the Vault

Identify and describe the steps to migrate the server key to an HSM
Identify and describe the steps to complete a post-install hardening
Identify and describe the components and steps to complete a Vault installation
Describe how to prepare a Windows server for Vault installation
Describe how to register a primary vault in AWS using AMIs
Describe how to register a primary vault in Azure using the CyberArk image

Deploy the Password Vault Web Access (PVWA)

Identify and describe the steps to install the first and additional PVWAs
Evaluate and scope a customer environment todetermine the appropriate number of PVWAs and their placement within the network
Describe the process to correctly harden a PVWA server
Describe various PVWA load balancing options
Prepare a Windows server for PVWA installation

Deploy the Central Policy Manager (CPM)

Identify and describe the steps to correctly harden a CPM server
Identify and describe the steps required to prepare a Windows server for CPM installation
Identify and describe the steps to install the first and additional CPMs
Identify and describe the steps to rename a CPM
Evaluate and scope a customer environment to determine the number of CPMs required and their placement within the network
Identify and describe Fault Tolerant Architecture components
Determine the quantities and locations of components needed to provide a fault tolerant architecture to meet customer needs
Identify and describe distributed architecture components
Determine the quantities and locations of components needed to provide a distributed architecture to meet customer needs

Deploy the Privileged Session Manager (PSM)

Identify and describe the steps to install the first and additional PSMs
Identify and describe preparation considerations for PSM deployment
Evaluate and scope a customer environment to calculate the amount of storage that should be available to the PSMs for PSM recordings
Evaluate and scope a customer environment to calculate the amount of storage that should be available to the Vault and PAReplicate for PSM recordings
Evaluate and scope a customer environment to determine the appropriate number of PSMs and their placement withi the network
Identify and describe the steps to prepare a Windows server for PSM installation
Describe post-installation processes
Identify and describe the steps to complete an HTML5 Gateway installation
Identify and describe the steps to prepare a UNIX server for HTML5 Gateway installation
Describe various PSM load-balancing options
Describe how to correctly harden a PSM server

Deploy the PSM For SSH

Identify and describe the steps to install the first and additional PSMs for SSH
Describe how to configure usrmng accounts
Describe the process to correctly harden a PSM for SSH server
Describe how to prepare a UNIX server for PSM for SSH installation

Configure Integrations

Configure authentication methods
Describe the steps required to combine a Vault and a PVWA authentication method to create two-factor authentication
Describe how to configure PKI authentication
Describe how to configure RADIUS authentication
Describe how to configure SAML authentication
Identify and describe the components that work with each authentication method
Describe how to generate a custom connection component using the PGU
Perform integration tasks, including integrating with NTP, SMTP, SNMP, LDAP, and Syslog/SIEM

Performance tune the solution

Identify and describe the steps to convert a platform from PMTerminal to TPC
Identify and describe how to correctly configure Interval and concurrent settings
Identify and describe how to correctly configure the Allowed Safes parameter
Evaluate and scope a customer environment to correctly size the servers to meet customer needs

Install and deploy on a public cloud

Identify best practices agnostic to public cloud deployments
Identify and describe different cloud architectures
Describe key management considerations in a public cloud
Identify and describe various cost reduction strategies when deploying into a public cloud