chapter 4 Flashcards

1
Q

vault model

A. vault - encryption, firewall, audit, and authentication
1. safes - authorizations
a. passwords - policy

A

similar to bank operations:
A. authenticate to bank teller
1. use your key to access your safe deposit box
a. you then have access to everything

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

access control determines who can access information and from where

cyberark manages access control by storing privileged identities in (blank) only giving access to authorized users

A

safe

a user’s access to a safe usually applies to all the objects (passwords) inside that safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(blank) is a container in the vault for data, primarily privileged accounts

it is the basis for managing access control to privileged accounts

can be created manually or programmatically (e.g. via the REST API)

A

safe

the vault and cyberark have safes for storing their data and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

safes are stored in the vault and can be viewed by (blank), (blank), and (blank)

A

vault file system

pvwa

privateark client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(blank) - to develop a system for how to store passwords in safes through an authorization mode that meets the needs to the organization

A

safe model

there is no generic safe model that fits all cyberark implementations

defining a safe model is an individual, implementation specific process best defined during the planning stages

customer typically work with the implementation team to create the safe model during the implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what questions need answering when defining the safe model

A

who needs access to data stored in the vault - internal or external users

what is the security level of data stored in the vault - secret, information, productions, development, etc

who must not see a specific type of data - is there any type of data that needs to be available to some user but not to others

should addition access limitations apply to specific objects - multiple central policy managers, system load, regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

safe naming constraints

safe names are limited to (blank) characters

double byte characters are not supported, Chinese, Korean, etc

A

28

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what would you call a safe containing admin accounts on a Windows based Boston data center

Or a financial department test servers in a new york data center running linux

A

P-BOS-SRV-WIN-LAD-HR

T-NYC-SRV-LIN-FIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

for performance reasons, the number of objects stored in a safe should be limited to (blank)

this includes versions of passwords

the recommended number of accounts or files stored in a safe is between (blank) to (blank)

A

20,000

3000
5000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

objects should be stored in safes following the principle of (blank)

A

least privilege - if a user does not need access to a password, they should not have access to the safe containing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

example: create separate safes for
1.
2.
3.

A

windows desktop accounts

windows local administrators

windows domain accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the (blank) makes safe structure largely invisible to end users, so don’t oversimplify

A

PVWA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The ACME corporation wants to onboard the following
accounts to CyberArk:
⎼ 50 Windows server local admin accounts
⎼ 10 Oracle sysadmin accounts
* 10 Windows servers host Oracle databases
(40 Windows servers do not host Oracle databases).
* The Windows team needs to have access to all
Windows Servers local admin accounts
* The Oracle team needs to have access to all local admin
accounts on Windows Servers hosting Oracle Database
and Oracle Database login accounts (sysadmin)
How many Safes would you create?
Which Safes will be accessed by which team?

A

3 safes:

50 windows server accounts:

WIN-SRV - safe
40 accounts for the windows team

WIN-SRV-ORA -safe
10 windows server accounts for the windows team

DB-ORA -safe
10 sysadmin accounts for the oracle team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

permissions for safes are organized into 5 groups
1
2
3
4
5

A

access - these permissions enable members to access accounts in the safe

account management - these permissions enable members to perform account management tasks

safe management and monitoring - these permissions enable members to perform safe management tasks

workflow - these permissions enable members to control account workflows in the safe

advanced - the permissions enable members to perform folder related activities in the safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

permission - access

users who have (blank) permission can see the accounts in the safe

A

list accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

permission - access

users who have (blank) and (blank) permissions can use the accounts in the safe to log on to a remote machine through a PSM connection

A

use accounts

list accounts

17
Q

permission - access

users who have (blank) permission can view the account password and copy it

A

retrieve accounts

18
Q

Permissions:
Account Management

account management permissions enable users to perform such tasks as
1
2
3
4
5
6

A

add accounts

edit accounts

initiate account management operations through the cpm

rename accounts

delete accounts

unlock accounts

19
Q

Permissions:
Safe Management

users who have the manage safe permission can modify some of the safe properties

users who have the (blank) permission can add or remove users and groups both vault users and external LDAP to safes and specify their safe authorizations

A

manage safe members

20
Q

Not all users have the right to add Safes only (blank) and (blank) have this permission

A

vault admins and safe managers

21
Q

3 steps to safe creation using the wizard

1
2
3

A

define properties

select members

set permissions

22
Q

Using the (blank)
parameter, you can limit the scope of a particular platform to only those Safes that match the regular expression pattern
* For example, Accounts
associated with the LIN SSH 30 Platform can only be stored in Safes that start with the string - “Lin-”
* This will help improve the performance of the CPM and simplify administrative tasks

A

AllowedSafes

23
Q
  • There are some differences in
    the terminology used in the Private Ark Client and the PVWA
  • Private Ark Client
    ⎼ Owners List
    ⎼ Files
  • PVWA
    ⎼ Members List
    ⎼ Accounts