Cyber Monday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CyberArk Exam CPC-SEN Topic 1 Question 6 Discussion

Actual exam question for CyberArk's CPC-SEN exam
Question #: 6
Topic #: 1
[All CPC-SEN Questions]

Your customer recently merged with a smaller organization. The customer's connector has no network connectivity to the smaller organization's infrastructure. You need to map LDAP users from both your customer and the smaller organization. How is this achieved?

Show Suggested Answer Hide Answer
Suggested Answer: C

To map LDAP users from both your customer and the smaller organization they have merged with, especially when there is no network connectivity between the two infrastructures, the best approach is to:

Deploy Identity Connectors in the newly acquired infrastructure and create user mappings (Option C). This involves setting up additional Identity Connectors within the smaller organization's network. These connectors will facilitate the integration of user directories from both organizations into the customer's Privilege Cloud environment.


Contribute your Thoughts:

Reena
6 months ago
Option C all the way! Deploy those Identity Connectors and get those user mappings set up. Easy peasy lemon squeezy.
upvoted 0 times
...
Daniel
6 months ago
A is definitely not the answer. How is creating users in one directory and configuring the connector to read that going to work when the infrastructures are separate?
upvoted 0 times
Lelia
5 months ago
A) Create the required users in one directory and configure the Identity Connector to read that directory, as there can only be one Identity Connector.
upvoted 0 times
...
Jamie
5 months ago
C) Deploy Identity Connectors in the newly acquired infrastructure and create user mappings.
upvoted 0 times
...
An
5 months ago
B) Create mappings for both directories from the original Identity Connector.
upvoted 0 times
...
...
Felicitas
6 months ago
B looks good. Mapping both directories from the original connector seems like a reasonable solution.
upvoted 0 times
...
Blondell
6 months ago
D? What? Switching to SAML just because there can only be one Identity Connector? That's crazy talk.
upvoted 0 times
Ceola
5 months ago
D? What? Switching to SAML just because there can only be one Identity Connector? That's crazy talk.
upvoted 0 times
...
Alysa
5 months ago
B) Create mappings for both directories from the original Identity Connector.
upvoted 0 times
...
Alecia
5 months ago
A) Create the required users in one directory and configure the Identity Connector to read that directory, as there can only be one Identity Connector.
upvoted 0 times
...
...
Curtis
7 months ago
I think option C is the way to go. Having separate Identity Connectors in the newly acquired infrastructure makes the most sense to me.
upvoted 0 times
Joye
6 months ago
Yeah, deploying Identity Connectors in the newly acquired infrastructure would ensure smooth user mappings.
upvoted 0 times
...
Dominic
6 months ago
C) Deploy Identity Connectors in the newly acquired infrastructure and create user mappings.
upvoted 0 times
...
Carmen
6 months ago
I agree, option C seems like the most logical choice in this scenario.
upvoted 0 times
...
Wai
6 months ago
A) Create the required users in one directory and configure the Identity Connector to read that directory, as there can only be one Identity Connector.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77