PAM-SEN V2 Flashcards

1
Q

After a PSM session is complete, the PSM server uploads the recording to the Vault for long-term
storage.

A

A. TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

By default, the vault secure protocol uses which IP port and protocol.

A

A. TCP/1858

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the best practice for storing the Master CD?

A

C. Store the CD in a secure location, such as a physical safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What utility is used to create or update a credential file?

A

A. CreateCredFile.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You are successfully managing passwords in the alpha.cyberark.com domain; however, when you
attempt to manage a password in the beta.cyberark.com domain, you receive the ‘network path not
found’ error. What should you check first?

A

B. That the CPM can successfully resolve addresses in the beta.cyberark.com domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the name of the account used to establish the initial RDP session from the end user client
machine to the PSM server?

A

A. PSMConnect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

To apply a new license file you must:

A

A. Upload the license.xml file to the System Safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

At what point is a transparent user provisioned in the vault?

A

C. The first time the user logs in.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are supported authentication methods for CyberArk? Check all that apply.

A

A. CyberArk Password (SRP)
B. LDAP
C. SAML
D. PKI
E. RADIUS
F. OracleSSO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The security of the Vault Server is entirely dependent on the security of the network.

A

B. FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What would be a good use case for the Disaster Recovery module?

A

C. Off site replication is required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the correct order of installation for PAS components?

A

A. Vault, CPM, PVWA, PSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The RemoteApp feature of PSM allows seamless Application windows (i.e the Desktop of the PSM
server will not be visible.)

A

A. TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Does CyberArk need service accounts on each server to change passwords?

A

D. No, the CPM uses the account information stored in the vault to login and change the account’s
password using its own credentials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following protocols need to be installed on a standalone vault server? Check all that apply.

A

D. Internet Protocol version 4 (TCP/IPv4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following are prerequisites for installing PVWA.

A

A. Web Services Role

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.

A

A. TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name two ways of viewing the ITAlog:

A

A. Log into the vault locally and navigate to the Server folder under the PrivateArk install location.
C. Access the System Safe from the PrivateArk client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which CyberArk component changes passwords on Target Devices?

A

B. CPM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In an SMTP integration it is possible to use the fully-qualified domain name (FQDN) when specifying theSMTP server address(es).

A

B. FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The PrivateArk clients allows a user to view the contents of the vault like a filesystem.

A

A. TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? Choose all that apply.

A

A. Store the CD in a physical safe and mount the CD every time vault maintenance is performed
C. Copy the contents of the CD to a folder on the vault server and secure it with NTFS permissions.
D. Store the server key in a Hardware Security Module.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The Remote Desktop Services role must be properly licensed by Microsoft.

A

A. TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which file would you modify to configure your Vault Server to forward Activity Logs to a SIEM or
SYSLOG server?

A

A. dbparm.ini

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which keys are required to be present in order to start the PrivateArk Server Service?

A

A. Server Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

You are installing a CPM.
In addition to Add Safes, Add/Update Users, Reset Users?Passwords and Manage Server File
Categories, which Vault authorization(s) does a CyberArk user need to install the CPM?

A

B. Activate Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

You are configuring SNMP remote monitoring for your organization?s Vault servers.
In the PARAgent.ini, which parameter specifies the destination of the Vault SNMP traps?

A

A. SNMPHostIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In which configuration file do you add LoadBalancerClientAddressHeader when you enable x-forwardingon the PVWA loadbalancer?

A

B. web.config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

You want to improve performance on the CPM by restricting accounts for the CYBRWINDAD platform toonly the WINDEMEA and WINDEMEA_Admin safes. How do you set this in CyberArk?

A

A. In the CYBRWINDAD platform, under Automatic Password Management/General, configure
AllowedSafes and set to (WINDEMEA)|(WINDEMEA_ADMIN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Before the hardening process, your customer identified a PSM Universal Connector executable that will
be required to run on the PSM. Which file should you update to allow this to run?

A

A. PSMConfigureAppLocker.xml

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How should you configure PSM for SSH to support load balancing?

A

A. by using a network load balancer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

In which configuration file on the Vault can filters be configured to either include or exclude log
messages that are sent through SNMP?

A

A. PARAgent.ini

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A first PSM server has been installed. What should you confirm before installing any additional PSM servers?

A

C. The user performing the installation is not a direct owner in the PSMUnmanagedSessionAccounts
Safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

During the PSM installation process, Safes and a User are created.
In addition to Add Safes, Add/Update Users, Reset Users?Passwords, and Activate Users, which
authorization(s) does the Vault user installing the PSM need to enable them to be successfully created?

A

B. Manage Server File Categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Your customer wants to store the Safes Data on Vault Drive D instead of Drive C. Which file should you edit?

A

A. TSparm.ini

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What must you do to prepare a Windows server for PVWA installation?

A

A. In the InstallationAutomation folder, run the PVWA_Prerequisites.ps1 file as an administrator in
Powershell.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which statement about REST API is correct? (Choose two.)

A

A. When a user successfully authenticates to the Vault, an authentication token is returned.
D. Each REST API call requires that a valid authentication token be provided.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

HTML5 Gateway can be installed on which supported UNIX OS versions? (Choose two.)

A

A. Red Hat Enterprise Linux 7.x
B. CentOS 7.x
C. Ubuntu 20.x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which utility should be used to register the Vault in Amazon Web Services?

A

A. CAVaultManager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

You are configuring the Vault to send syslog audit data to your organization?s SIEM solution. What is a valid value for the SyslogServerProtocol parameter in DBPARM.INI file?

A

A. TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

When creating a distributed Vault environment architecture, what is the maximum number of Vault
servers that can be deployed?

A

C. 6 - 1 primary and 5 satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Arrange the steps to complete CPM Hardening for Out-of-Domain Deployment in the correct sequence

A

2 - a. Open Powershell as Administrator and run the script
3 - b. Review these script logs: HardeniningScript.log and CYBRHardeningsecedit.log.
1 - c. Locate the CPM_Hardening.ps1 script in the installation media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

To enable LDAP over SSL for a Vault when DNS lookups are blocked, which step must be completed?

A

A. Add the FQDN & IP details for each LDAP host into the local hosts file of the Vault server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

In which file must the attribute ?SignAuthnRequest=?true??be added to the PartnerIdentityProvider
element to support signed SAML requests?

A

A. saml.config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A customer is moving from an on-premises to a public cloud deployment. What is the best and most cost-effective option to secure the server key?

A

C. Install the Vault using the native cloud images and secure the server key using native cloud Key
Management Systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Your customer upgraded recently to version 12.2 to allow the Linux team to use the new MFA caching
feature. The PSM for SSH was installed with default configuration settings. After setting the
Authentication to SSH key and enabling MFA Caching from the PVWA interface, the Linux Team cannot
connect successfully using the new MFA caching feature. What is the most probable cause?

A

A. OpenSSH 7.8 or above is not installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which service must be set to Automatic (delayed start) after the Vault is installed and configured?

A

A. Windows Time service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

You want to add an additional maintenance user on the PSM for SSH.
How can you accomplish this if InstallCyberarkSSHD is set to Yes or No?

A

B. Create a local user called proxymng<number>.</number>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which SMTP address can be set on the Notification Settings page to re-invoke the ENE setup wizard
after the initial Vault installation?

A

D. 1.1.1.1

50
Q

CyberArk User Neil is trying to connect to the Target Linux server 192.168.1.164 using a domain
account ACME/linuxuser01 on domain acme.corp using PSM for SSH server 192.168.65.145. What is the correct syntax?

A

B. ssh neil@linuxuser01#acme.corp@192.168.1.164@192.168.65.145

51
Q

In addition to bit rate and estimated total duration of recordings per day, what is needed to determine
the amount of storage required for PSM recordings?

A

A. retention period

52
Q

Which components can connect to a satellite Vault in a distributed Vault architecture?

A

B. PVWA, PSM

53
Q

You are installing PSM for SSH with AD-Bridge and CyberArkSSHD mode set to integrated for your
customer. Which additional packages do you need to install to meet the customer?s needs? (Choose two.)

A

A. CARKpsmp-infra
B. libssh

54
Q

Which component should be installed on the Vault if Distributed Vaults are used with PSM?

A

A. RabbitMQ

55
Q

What is the default username for the PSM for SSH maintenance user when InstallCyberarkSSHD is set to yes?

A

A. proxymng

56
Q

Which parameter must be identical for both the Identity Provider (IdP) and the PVWA?

A

C. IdP “Audience” and “ServiceProviderName” in the PVWA saml.config file

57
Q

All 80 employees from your satellite Tokyo office are complaining that browsing the PVWA site is very
slow; however, your New York headquarters users are not experiencing this. The current PAM solution
is:
2 distributed Vaults, the primary one in New York and a satellite in Tokyo
2 PVWA servers, both in New York with load balancing configured
2 PSM servers, both in New York without load balancing configured
1 CPM server in New York
All PVWA, PSM, and CPM servers are connected to the primary Vault
Which proposal optimally resolves the performance issue while minimizing the impact to production?

A

A. Install two new PVWA servers in Tokyo data center, configure load balancing, connect to the local
satellite Vault and provide the URL of new PVWA servers to the local employees.

58
Q

You have been asked to limit a platform called “Windows_Servers”to safes called “WindowsDC1”and
“WindowsDC2”. The platform must not be assigned to any other safe. What is the correct way to accomplish this?

A

A. Edit the “Windows_Servers”platform, expand “Automatic Password Management”, then select
General and modify “AllowedSafes”to be (WindowsDC1)|(WindowsDC2).

59
Q

The account used to install a PVWA must have ownership of which safes? (Choose two.)

A

A. VaultInternal
D. Notification Engine

60
Q

DRAG DROP -
Arrange the steps to install the Password Vault Web Access (PVWA) in the correct sequence.

A

2 - A) Run the PVWAInstallation.ps1 script in Powershell as Administrator.
1 - B) Run the PVWA_Prerequisites.ps1 script in Powershell as Administrator.
3 - C) Run the PVWARegisterComponent.ps1 script with the Vault password and run the
PVWA_Hardening.ps1 script in Powershell as Administrator.

61
Q

Which configuration file and Vault utility are used to migrate the server key to an HSM?

A

A. DBparm.ini and CAVaultManager.exe

62
Q

There is a requirement for a password to change between 01:00 and 03:00 on Saturdays and Sundays;
however, this does not work consistently. Which platform setting may be the cause?

A

A. The Interval setting for the platform is incorrect and must be less than 120.

63
Q

What must you do to synchronize a new Vault server with an organization?s NTP server?

A

A. Configure an AllowNonStandardFWAddresses rule for the organization?s NTP server in DBParm.ini
on the Vault server.

64
Q

You need to add a new PSM server to an existing CyberArk environment. What is the best way to determine the sizing of this server?

A

A. Review the ?Recommended Server Specifications?for PSMs in the CyberArk Documents website.

65
Q

Which file must you edit to ensure the PSM for SSH server is not hardened automatically after
installation?

A

C. psmpparms

66
Q

When integrating a Vault with HSM, which file is uploaded to the HSM device?

A

A. server.key

67
Q

What is a prerequisite step before CyberArk can be configured to support RADIUS authentication?

A

B. In the RADIUS server, define the CyberArk Vault as a RADIUS client/agent.

68
Q

A customer wants to store PSM recordings for 100 days and estimates they will have 10 Windows
sessions per day for 100 minutes each. What is the minimum storage required for the Vault and PAReplicate for the PSM recordings?

A

A. 25 GB

69
Q

In large-scale environments, it is important to enable the CPM to focus its search operations on specificSafes instead of scanning all Safes it sees in the Vault. How is this accomplished?

A

B. AllowedSafe Parameter on each platform policy

70
Q

In addition to disabling Windows services or features not needed for PVWA operations, which tasks
does PVWA_Hardening.ps1 perform when run? (Choose two.)

A

A. performs IIS hardening
E. imports the CyberArk INF configuration

71
Q

When SAML authentication is used to sign in to the PVWA, which service performs the actual
authentication?

A

B. Identity Provider (IdP)

72
Q

Which components support load balancing? (Choose two.)

A

B. PVWA
C. PSM

73
Q

Which method can be used to directly authenticate users to PSM for SSH? (Choose three.)

A

A. CyberArk authentication
B. LDAP authentication
C. RADIUS authentication

74
Q

You are designing the number of PVWAs a customer must deploy. The customer has three data centerswith a distributed Vault in each, requires high availability, and wants to use all Vaults at all times. How many PVWAs does the customer need?

A

A. six or more

75
Q

After installing the Vault, you need to allow Firewall Access for Windows Time service to sync with NTPservers 10.1.1.1 and 10.2.2.2. What should you do?

A

A. Edit DBParm.ini to add:
AllowNonStandardFWAddresses=[10.1.1.1,10.2.2.2],Yes,123:outbound/udp.

76
Q

Which command should be executed to harden a Vault after registering it to Azure?

A

A. HardenAzureFW.ps1

77
Q

Which files does the Vault Installation Wizard prompt you for during the Vault install?

A

A. Operator CD and License

78
Q

Which statement is correct about a post-install hardening?

A

C. It is executed after Vault installation by running CAVaultHarden.exe and hardening options can be
edited by changing the Hardening.ini file.

79
Q

As a member of a PAM Level-2 support team, you are troubleshooting an issue related to load
balancing four PVWA servers at two data centers. You received a note from your Level-1 support teamstating ?When testing PVWA website from a workstation, we noticed that the ?Source IP of last sign-in?
was shown as the VIP (Virtual IP address) assigned to the four PVWA servers instead of the workstationIP where the PVWA site was launched from.?
Which step should you take?

A

A. Verify the ?LoadBalancerClientAddressHeader?parameter setting in PVWA configuration file
Web.config is set to ?X-Forwarded-For?.

80
Q

You are installing the HTML5 gateway on a Linux host using the RPM provided.
After installing the Tomcat webapp, what is the next step in the installation process?

A

A. Deploy the HTML5 service (guacd)

81
Q

What is required before the first CPM can be installed?

A

A. The environment must have at least one Vault and one PVWA installed

82
Q

When configuring RADIUS authentication, which utility is used to create a file containing an encrypted
version of the RADIUS secret?

A

A. CAVaultManager

83
Q

What is the purpose of the CPM_Preinstallation.ps1 script included with the CPM installation package?

A

D. It verifies the NET version installed on the server and sets the IIS SSL TLS server configuration.

84
Q

Which tools are used during a CPM renaming process? (Choose two.)

A

A. APIKeyManager Utility
B. CreateCredFile Utility

85
Q

When performing ?In Domain?hardening of a PSM server, which steps must be performed? (Choose
two.)

A

A. Import CyberArk policy settings from the provided file into a new GPO.
C. Link GPO to a dedicated OU containing CyberArk PSM servers.

86
Q

Which step is required to register a Vault manually in Amazon Web Services using CAVaultManager?

A

C. Specify the Cloud region using the /CloudRegion flag

87
Q

What authentication methods can be implemented to enforce Two-Factor Authentication (2FA) for usersauthenticating to CyberArk using both the PVWA (through the browser) and the PrivateArk Client?

A

A. LDAP and RADIUS

88
Q

Which pre-requisite step must be completed before installing a Vault?

A

B. Install a clean operating system.

89
Q

Which browser is supported for PSM Web Connectors developed using the CyberArk Plugin Generator
Utility (PGU)?

A

B. Google Chrome

90
Q

What is a valid combination of primary and secondary layers of authentication to a company’s two-factorauthentication policy?

A

A. RSA SecurID Authentication (in PVWA) and LDAP Authentication

91
Q

You want to add an additional maintenance user on the PSM for SSH.

A

C. Create a local user and add it to group configured for the parameter AllowGroups in the
/etc/sshd_config file.

92
Q

Which authentication methods does PSM for SSH support?

A

D. CyberArk Password, LDAP, RADIUS

93
Q

Which statement is correct about CPM behavior in a distributed Vault environment?

A

A. CPMs should only access the primary Vault. When it is unavailable, CPM cannot access any Vault
until another Vault is promoted as the new primary Vault.

94
Q

What is the purpose of the PSM health check hardening?

A

A. Remove IIS settings which can be considered security vulnerabilities.

95
Q

A customer’s environment has three data centers consisting of 5,000 servers in Germany, 10,000
servers in Canada, and 1,500 servers in Singapore. You want to manage target servers and avoid
complex firewall rules. How many CPMs should you deploy?

A

B. 3 total, 1 per data center

96
Q

What is a step to enable NTP synchronization on a stand-alone Vault?

A

C. Edit dbparm.ini and add a Firewall rule for the NTP address.

97
Q

What are the basic network requirements to deploy a CPM server?

A

A. Port 1858 to Vault and Port 443 to PVWA

98
Q

You want to change the name of the PVWAappuser of the second PVWA server.

A

D. Rename user in PrivateArk
E. Create new cred file for user

99
Q

Which statements are correct about the PSM HTML5 gateway? (Choose two.)

A

B. It does not support connections to target system where NLA is enabled on the PSM server
D. Printer redirection cannot be enabled

100
Q

A customer has five PVWA servers. Three are located at the primary data center and the remaining twoare at a satellite data center.

A

A. It must not alter page content, or should include a mechanism to prevent pages from being altered.
B. It must support “sticky sessions”

101
Q

A new domain controller has been added to your domain. You need to ensure the CyberArk
infrastructure can use the new domain controller for authentication. Which locations must you update?

A

A. on the Vault server in C:\Windows\System32\drivers\etc\hosts and in the PVWAApplication under
Administration > LDAP Integration > Directories > Hosts

102
Q

You are beginning the post-install process after a manual PSM installation is completed.

A

A. Disable screen saver for the PSM local users.

103
Q

As Vault Admin, you have been asked to enable your organization’s CyberArk users to authenticate
using LDAP.

A
  • B. Manage Directory Mapping
104
Q

Which user is enabled when replicating data between active and stand-by Vaults?

A

A. DR

105
Q

This value needs to be added to the PVWA configuration file:
Assuming all CyberArk PVWA servers were installed using default paths/folders, which configuration fileshould you locate and edit to accomplish this?

A

A. c:\inetpub\wwwroot\passwordvault\web.config

106
Q

A customer has five main data centers with one PVWA in each center under different URLs.

A

D. Load balance all PVWAs under same URL.

107
Q

What is the recommended method to determine if a PVWA is unavailable and should be disabled in a
load balancing pool?

A

B. Monitor Port 1858 on the PVWA server

108
Q

For redundancy, you want to add a secondary RADIUS server.
What must you do to accomplish this?

A

C. Open the DBParm.ini on the Vault server. Add the second RADIUS server configuration settings
after the first one, separated by a comma.

109
Q

Which parameter must be provided when registering a primary Vault in Azure, but not in Amazon Web
Services?

A

D. /RDPGateway

110
Q

Which component must be installed before the first CPM installation?

A

C. PVWA

111
Q

You are setting up a Linux host to act as an HTML 5 gateway for PSM sessions.

A

A. PSM and PVWA

112
Q

What is a requirement for setting fault tolerance for PSMs?

A

A. Use a load balancer

113
Q

A customer asked you to help scope the company’s PSM deployment.
What should be included in the scoping conversation?

A

C. Recordings retention period

114
Q

A customer has three data centers distributed globally and wants highly-available PSM connections in
each segmented zone. In addition, the customer needs a highly-available PSM connection for the
CyberArk Admins.
What will best satisfy this customer’s needs?

A

C. two PSMs per zone with a load balancer and two PSMs for Admins with a dedicated load balancer

115
Q

A customer has two data centers and requires a single PVWA url.
Which deployment provides the fastest time to reach the PVWA and the most redundancy?

A

D. Deploy two PVWAs using DNS round robin.

116
Q

What is determined by the “MaxConcurrentConnections” setting within a platform?

A

A. maximum number of concurrent connections that can be opened between the CPM and the remotemachines for the platform

117
Q

If a customer has one data center and requires fault tolerance, how many PVWAs should be deployed?

A

A. two or more

118
Q

You are installing multiple PVWAs behind a load balancer.
Which statement is correct?

A

C. The load balancer must support “sticky sessions”.

119
Q

What is a prerequisite step before installing the Vault on Windows 2019?

A

B. Check that the server IP address is correctly configured and that it is static

120
Q

After installing the first PSM server and before installing additional PSM servers, you must ensure the
user performing the installation is not a direct owner of which safe?

A

A. PSMUnmanagedSessionAccounts Safe

121
Q
A