chapter 6 Flashcards

1
Q

what are the 2 types of linked accounts
1
2

A

logon account

reconcile account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

root account best practices

the root user is often prevented from logging in remotely as part of
best practices (/etc/ssh/sshd_config
> PermitRootLogin no

The solution is to log in as a user with the authorization to
switch to root in order to perform the password change

A

blank

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Root Password
Change Failure

If the SSH policy on the target machine forbids root log on, the (blank) will not be able to verify or change the root password

A

cpm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what to do when the root logon account fails

the solution is to onboard a non-privileged account that we can use to connect and then switch to root in order to perform the password change. this account is the (blank)

A

logon account - in order to use this account you need to link it to the root account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Now that we have specified a logon account, when we re-run
a password change, we will see that the (blank) user has changed the
password.
Note that the logon account is also used when connecting to
the target system through the
(blank)

A

password manage

psm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(blank) is used for
situations where we don’t know a password or if the use of individual passwords would be
too onerous

A

reconciliation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The verification process will discover passwords that are not synchronized with their corresponding password in the (blank) and we can configure the
(blank) to reset the password in the (blank) and on the Target

A

vault

cpm

vault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(blank) reconciliation is
enabled by default.
(blank) reconciliation
must be enabled

A

manual

automatic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A (blank) account is typically a Domain account with sufficient rights to perform a password change

A

reconcile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Failed Verify and Reconcile Process

cpm scans vault for account

vault sends current credentials to cpm

cpm sends login credentials to target

target report failure to cpm

cpm flags account in the vault

cpm scans vault for accounts

vault sends current credentials to cpm

cpm generates password and connects to target with reconcile account and then runs a password reset

target reports success or failure to cpm

cpm logins to target with new credentials

target reports success or failure

cpm stores new credentials in the vault

A

blank

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(blank) account

used when a user is prevented from logging on, and the passwords is known

used on a regular basis - i.e. it is common to block root access via SSH

a super user such a root should not be used as a (blank) account

A

logon

logon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(blank) accounts

used for lost or unknown passwords

should be used infrequently

needs to have elevated privileges (member of local administrators)

this account is usually a service account reserved for this purpose

A

reconcile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(blank) password authentication

Client launches the
connection.
* Server presents its public key.
* Client and server negotiate a
symmetric session key. All further communication is encrypted with the symmetric session key.
* User enters the account
password and the Server
authenticates it

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(blank)

To authenticate with SSH keys, the user must first generate a public/private key-pair locally on her
machine and then install the public key in her user directory on the target server (or servers)
through a password authenticated session.

Once that is done, the user can authenticate using the SSH keys.
* She launches a connection to the remote server.
* The server then encrypts a random prime number with the user’s public key and transmits that back to the user, who must then decrypt the number with her
corresponding private key.
* She then generates a hash of the prime number and returns it to the server.
* The server compares it with its own hash of the prime. If they match, then this proves that the user must have the private half of the key-pair
* The server therefore allows the connection to be established.

A

SSH – Asymmetric Key Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the SSH Key Advantages?

A
  • SSH keys allow a substantially longer secret between client and server than a password.
  • The secret is never transmitted over the network.
  • One private key can be used to access multiple systems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what are the SSH Key Disadvantages?

A
  • One private key can be used to access multiple systems. If it is compromised, all the systems
    that trust it are vulnerable
  • SSH keys are more difficult to change than passwords
17
Q

(blank)

  • Creates unique key-pairs for each target system.
  • Private keys are stored in the Vault, not on user workstations.
  • The CPM changes key-pairs often and automatically disseminates public keys to target systems.
  • End users retrieve the private key from the Vault to authenticate to the target system
A

SSH Key Manager

18
Q

how are keys added to the vault

  1. select system type
  2. assign to platform - ssh keys can share a safe with passswords, but hey need their own platforms
    2a. because entering the ssh keys into cyberark exposes them, the old keys can no longer be considered secure and should be rotated immediately
    2b. you can select the file containing the private key or copy and paste it
19
Q

You can rotate the SSH keys using the (blank) button, just
like with passwords

20
Q

Users who have the (blank) permission can retrieve a copy of the private key

A

retreive accounts

21
Q

Users who have the (blank) permission can click on the Connect
button to launch the session directly from
the PVWA

A

use accounts

22
Q

If you have applications that authenticate using
SSH keys, you can use (blank) to push
private keys to those servers

A

CyberArk PAM