cyber Flashcards
The Active Directory user configured for windows discovery needs which permission(s) or
membership?
A. Member of Domain Admin Group
B. Member of LDAP Admin Group
C. Read and Write Permissions
D. Read Only Permissions
D
Which Vault authorization does a user need to have assigned to able to generate the Entitlement
Report from the reports page in PVWA?(choose two)
A. Manage Users
B. Audit Users
C. Read Activity
D. View Entitlements
E. List Accounts
A,B
What do you need on the Vault to support LDAP over SSL?
A. CA Certificate(s) used to sign the External Directory certificate
B. RECPRV.key
C. a private key for the external directory
D. self-signed Certificate(s) for the Vault
A
You are troubleshooting a PVWA slow response. Which log files should you analyze first? (Choose two.)
A. ITALog.log
B. web.config
C. CyberArk.WebApplication.log
D. CyberArk.WebConsole.log
C,D
What is the easiest way to duplicate an existing platform?
A. From PrivateArk, copy/paste the appropriate Policy.ini file; then rename it.
B. From the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform and then click Duplicate; name the new platform.
C. From PrivateArk, copy/paste the appropriate settings in PVConfiguration.xml; then update the policyName variable.
D. From the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform, manually update the platform settings and click “Save as” INSTEAD of save to duplicate and rename the platform.
B
RECOVERY PRIVATE KEY—–STORE IN PHYSICAL SAFE
RECOVERY PUBLIC KEY——STORE IN HARDWARE SECURITY MODULE
SERVER KEY———————-STORE IN THE VAULT SERVER DISK DRIVE
SSH KEY—————————STORE IN THE VAULT
Recovery Private Key: Store in a Physical Safe Recovery Public Key: Store on the Vault Server Disk Drive Server Key: Store in a Hardware Security Module SSH Keys: Store in the Vault.
Due to corporate storage constraints, you have been asked to disable session monitoring and recording for 500 testing accounts used for your lab environment. How do you accomplish this?
A. Master Policy>select Session Management>add Exceptions to the platform(s)>disable Session Monitoring and Recording policies
B. Administration>Platform Management>select the platform(s)>disable Session Monitoring and Recording
C. Polices>Access Control (Safes)>select the safe(s)>disable Session Monitoring and Recording policies
D. Administration>Configuration Options>Options>select Privilege Session Management>disable Session Monitoring and Recording policies
A
A user requested access to view a password secured by dual-control and is unsure who to contact to expedite the approval process. The Vault Admin has been asked to look at the account and identify who can approve their request. What is the correct location to identify users or groups who can approve?
A. PVWA > Administration > Platform Configuration > Edit Platform > UI & Workflow > Dual Control > Approvers
B. PVWA > Policies > Access Control (Safes) > Select the safe > Safe Members > Workflow > Authorize Password Requests
C. PVWA > Account List > Edit > Show Advanced Settings > Dual Control > Direct Managers
D. PrivateArk > Admin Tools > Users and Groups > Auditors (Group Membership)
B
You have been given the requirements that certain accounts cannot have their passwords
updated during business hours:
A. Change settings on the CPM configuration safe so that access is permitted after business
hours only
B. Update the password change parameters of the platfrom to match the permitted time
frame
C. Disable automatic CPM management for all accounts that are assigned to this platform
D. Add an exception to the Master Policy to allow the action for this platform during the
permitted time
B
What must you specify when configuring a discovery scan for UNIX? (Choose two.)
A. Vault Administrator
B. CPM Scanner
C. root password for each machine
D. list of machines to scan
E. safe for discovered accounts
C,D
To change the safe where recordings are kept for a specific platform, which setting must you update in the platform configuration?
A. SessionRecorderSafe
B. SessionSafe
C. RecordingsPath
D. RecordingLocation
A
Which processes reduce the risk of credential theft? (Choose two.)
A. require dual control password access approval
B. require password change every X days
C. enforce check-in/check-out exclusive access
D. enforce one-time password access
C,D o B,D
You are onboarding an account that is not supported out of the box. What should you do first to obtain a platform to import?
A. Create a service ticket in the customer portal explaining the requirements of the custom platform
B. Search common community portals like stackoverflow,reddit,github for an existing platform
C. From the platforms page,unchecked the hide non supported platforms checkbox and see if a platform meeting your needs appears
D. Visit the CyberArk marketplace And search or a platform that meets your needs
D
You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account. How can this be configured to allow for password management using least privilege?
A. Configure each CPM to use the correct logon account.
B. Configure each CPM to use the correct reconcile account.
C. Configure the UNIX platform to use the correct logon account.
D. Configure the UNIX platform to use the correct reconcile account.
C
RIGHT ORDER:
A.START THE PRIVATEARK DISASTER RECOVERY SERVICE
B.SHUTDOWN THE PRIVATEARK SERVER SERVICE ON THE DR VAULT
C.IN THE PADR.INI FILE, SET FAILOVER MODE=NO AND REMOVE THE LAST TWO LINE
B,C,A
You are configuring a Vault HA cluster.Which file should you check to confirm the correct drives have been assigned for the location of the Quorum and Safes data disks?
A. ClusterVault.ini
B. My.ini
C. Vault.ini
D. DBParm.ini
A
Which methods can you use to add a user directly to the Vault Admin Group? (Choose three.)
A. REST API
B. PrivateArk Client
C. PACLI
D. PVWA
E. Active Directory
F. Sailpoint
A,B,E
Which Automatic Remediation is configurable for a PTA detection of a “Suspected Credential
Theft”?
A. Add to Pending
B. Rotate Credentials
C. Reconcile Credentials
D. Disable Account
B
VEDI LA N20
VEDI LA N22
You want to create a new onboarding rule. Where do you accomplish this?
A. In PVWA, click Reports > Unmanaged Accounts > Rules
B. In PVWA, click Options > Platform Management > Onboarding Rules
C. In PrivateArk, click Tools > Onboarding Rules
D. In PVWA, click Accounts > Onboarding Rules
D
What does the minvalidity parameter on a platform policy determine?
A. time between a password retrieval and the account becoming eligible for a password
change
B. timeout for users signed into the PVWA as configured in the glodel settings
C. minimum amount of time that just in time access is valid
D. time in minutes before an empty safe will be automatically deleted
A
What does the Export Vault Data (EVD) utility do?
A. exports data from the Vault to TXT or CSV files, or to MSSQL databases
B. generates a backup file that can be used as a cold backup
C. exports all passwords and imports them into another instance of CyberArk
D. keeps two active vaults in sync
A
When are external vault users and groups synchronized by default?
A. They are synchronized once every 24 hours between 1 AM and 5 AM.
B. They are synchronized once every 24 hours between 7 PM and 12 AM.
C. They are synchronized every 2 hours.
D. They are not synchronized according to a specific schedule.
A