Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CyberArk PAM-DEF Exam - Topic 1 Question 2 Discussion

Actual exam question for CyberArk's PAM-DEF exam
Question #: 2
Topic #: 1
[All PAM-DEF Questions]

Which Automatic Remediation is configurable for a PTA detection of a ''Suspected Credential Theft''?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Hermila
4 months ago
Wait, can we really configure that? Sounds too easy!
upvoted 0 times
...
Cassi
5 months ago
Totally agree with B, it's the best option here!
upvoted 0 times
...
Nidia
5 months ago
A is just adding to the queue, doesn't help much.
upvoted 0 times
...
Denny
5 months ago
Not so sure about that, I thought it was D, Disable Account.
upvoted 0 times
...
Nancey
5 months ago
I think it's definitely B, Rotate Credentials.
upvoted 0 times
...
Ma
5 months ago
I'm a bit confused; I thought "Reconcile Credentials" was related to fixing issues, not necessarily for theft detection.
upvoted 0 times
...
Alyce
5 months ago
I practiced a question similar to this, and I think "Rotate Credentials" was the right answer there too.
upvoted 0 times
...
Norah
5 months ago
I feel like "Disable Account" was mentioned in a practice scenario, but I can't recall if it was specifically for suspected credential theft.
upvoted 0 times
...
Yvonne
6 months ago
I think I remember something about rotating credentials being a common response to credential theft, but I'm not entirely sure.
upvoted 0 times
...
Annamaria
6 months ago
Okay, let's see. I know a service account access key is needed to authenticate with Google Cloud Storage, so that's definitely one of the components.
upvoted 0 times
...
Titus
6 months ago
I remember studying different types of attacks, but I'm not sure which one specifically targets digital signatures.
upvoted 0 times
...
Lavelle
6 months ago
Okay, let me think this through. Since the question mentions an LDAP directory group, I'm guessing the correct approach is to map that LDAP group to a Google Group, and then assign the appropriate role to that Google Group in the project's IAM policy. So I'd say C is the best answer.
upvoted 0 times
...

Save Cancel