cyberark security Flashcards

1
Q

What would be a good use case for the Replicate module?

A. Recovery Time Objectives or Recovery Point Objectives are at or near zero.
B. Integration with an Enterprise Backup Solution is required.
C. Off site replication is required.
D. PSM is used.

A

C. Off site replication is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the PRIMARY reason for installing more than 1 active CPM?

A. Installing CPMs in multiple sites prevents complex firewall rules to manage devices at remote sites.
B. Multiple instances create fault tolerance.
C. Multiple instances increase response time.
D. Having additional CPMs increases the maximum number of devices CyberArk can manage.

A

D. Having additional CPMs increases the maximum number of devices CyberArk can manage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the password Reconcile process?

A. To test that CyberArk is storing accurate credentials for accounts.
B. To change the password of an account according to organizationally defined password rules.
C. To allow CyberArk to manage unknown or lost credentials.
D. To generate a new complex password.

A

B. To change the password of an account according to organizationally defined password rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which file would you modify to configure the vault to send SNMP traps to your monitoring solution?

A. dbparm.ini
B. paragent.ini
C. ENEConf.ini
D. padr.ini

A

B. paragent.ini

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When a DR vault server becomes an active vault, it will automatically fail back to the original state once the primary vault comes back online.

A. True, this is the default behavior.
B. False, this is not possible.
C. True, if the AllowFailback setting is set to yes in the PADR.ini file.
D. True, if the AllowFailbackג setting is set to yes in the dbparm.ini file.

A

C. True, if the AllowFailback setting is set to yes in the PADR.ini file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In order to avoid conflicts with the hardening process, third party applications like Antivirus and Backup Agents should be installed on the Vault server before installing the Vault.

A. TRUE
B. FALSE

A

B. FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If a transparent user matches two different directory mappings, how does the system determine which user template to use?

A. The system will use the template for the mapping listed first.
B. The system will use the template for the mapping listed last.
C. The system will grant all of the vault authorizations from the two templates.
D. The system will grant only the vault authorizations that are listed in both templates.

A

A. The system will use the template for the mapping listed first.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The primary purpose of the CPM is Password Management.

A. TRUE
B. FALSE

A

A. TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The vault server uses a modified version of the Microsoft Windows firewall.

A. TRUE
B. FALSE

A

B. FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In a SIEM integration it is possible to use the fully-qualified domain name (FQDN) when specifying the SIEM server address(es).

A. TRUE
B. FALSE

A

A. TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What would be a good use case for a High Availability vault?

A. Recovery Time Objectives or Recovery Point Objectives are at or near zero.
B. Integration with an Enterprise Backup Solution is required.
C. Off site replication is required.
D. PSM is used.

A

A. Recovery Time Objectives or Recovery Point Objectives are at or near zero.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the operating system prerequisites for installing CPM?

A. .NET 3.51 Framework Feature
B. Web Services Role
C. Remote Desktop Services Role
D. Windows 2008 R2 or higher.

A

A. .NET 3.51 Framework Feature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A vault admin received an email notification that a password verification process has failed. Which service sent the message?

A. The PrivateArk Server Service on the Vault.
B. The CyberArk Password Manager service on the Components Server.
C. The CyberArk Event Notification Engine Service on the Vault.
D. The CyberArk Privileged Session Manager service on the Vault.

A

C. The CyberArk Event Notification Engine Service on the Vault.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A stand alone Vault server requires DNS services to operate properly.

A. TRUE
B. FALSE

A

B. FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The connect button requires PSM to work.

A. TRUE
B. FALSE

A

B. FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

After a PSM session is complete, the PSM server uploads the recording to the Vault for long-term storage.

A. TRUE
B. FALSE

17
Q

By default, the vault secure protocol uses which IP port and protocol.

A. TCP/1858
B. TCP/443
C. UDP/1858
D. TCP/80

A

A. TCP/1858

18
Q

What is the best practice for storing the Master CD?

A. Copy the files to the Vault server and discard the CD.
B. Copy the contents of the CD to a Hardware Security Module and discard the CD.
C. Store the CD in a secure location, such as a physical safe.
D. Store the CD in a secure location, such as a physical safe, and copy the contents of the CD to a folder (secured with NTFS permission) on the vault.

A

D. Store the CD in a secure location, such as a physical safe, and copy the contents of the CD to a folder (secured with NTFS permission) on the vault.

19
Q

What utility is used to create or update a credential file?

A. CreateCredFile.exe
B. CAVaultManager.exe
C. Central Policy Manager
D. Password Vault Web Access

A

A. CreateCredFile.exe

20
Q

You are successfully managing passwords in the alpha.cyberark.com domain; however, when you attempt to manage a password in the beta.cyberark.com domain, you receive the network path not found error. What should you check first?

A. That the username and password are correct.
B. That the CPM can successfully resolve addresses in the beta.cyberark.com domain.
C. That the end user has the correct permissions on the safe.
D. That an appropriate trust relationship exists between alpha.cyberark.com and beta.ceberark.com

A

B. That the CPM can successfully resolve addresses in the beta.cyberark.com domain.

21
Q

What is the name of the account used to establish the initial RDP session from the end user client machine to the PSM server?

A. PSMConnect
B. PSMAdminConnect
C. PSM
D. The credentials the end user retrieved from the vault.

A

A. PSMConnect

22
Q

To apply a new license file you must:

A. Upload the license.xml file to the System Safe.
B. Upload the license.xml file to the VaultInternal Safe.
C. Upload the license.xml file to the System Safe and restart the PrivateArk Server service.
D. Upload the license.xml file to the VaultInternal Safe and restart the PrivateArk Server service.

A

A. Upload the license.xml file to the System Safe.

23
Q

At what point is a transparent user provisioned in the vault?

A. When a directory mapping matching that user id is created.
B. When a vault admin runs LDAP configuration wizard.
C. The first time the user logs in.
D. During the vault’s nightly LDAP refresh.

A

A. When a directory mapping matching that user id is created.

24
Q

Which of the following are supported authentication methods for CyberArk? Check all that apply.

A. CyberArk Password (SRP)
B. LDAP
C. SAML
D. PKI
E. RADIUS
F. OracleSSO
G. Biometric

A

B. LDAP
D. PKI
E. RADIUS

25
The security of the Vault Server is entirely dependent on the security of the network. A. TRUE B. FALSE
B. FALSE
26
What would be a good use case for the Disaster Recovery module? A. Recovery Time Objectives or Recovery Point Objectives are at or near zero. B. Integration with an Enterprise Backup Solution is required. C. Off site replication is required. D. PSM is used.
C. Off site replication is required.
27
The RemoteApp feature of PSM allows seamless Application windows (i.e the Desktop of the PSM server will not be visible.) A. TRUE B. FALSE
A. TRUE
28
Does CyberArk need service accounts on each server to change passwords? A. Yes, it requires a domain administrator account to change any password on any server. B. Yes, it requires a local administrator account on any Windows server and a root level account on any Unix server. C. No, passwords are changed by the Password Provider Agent. D. No, the CPM uses the account information stored in the vault to login and change the account's password using its own credentials.
B. Yes, it requires a local administrator account on any Windows server and a root level account on any Unix server.
29
Which of the following protocols need to be installed on a standalone vault server? Check all that apply. A. Client for Microsoft Networks B. QoS Packet Scheduler C. File and Printer Sharing for Microsoft Networks D. Internet Protocol version 4 (TCP/IPv4) E. NIC Teaming Driver, if applicable
A. Client for Microsoft Networks B. QoS Packet Scheduler C. File and Printer Sharing for Microsoft Networks D. Internet Protocol version 4 (TCP/IPv4)