Cyberark Security Quiz - Manage Your Identity

45 Questions | Total Attempts: 892

SettingsSettingsSettings
Identity Quizzes & Trivia

CyberArk is a publicly traded information security company offering Privileged Account Security. In CyberArk Vault, you can ceate your Vault environment in the PrivateArk Administrative Client. After you have created the Vault, you can create Safes and allocate owners. Then you can store accounts and files in Safes where users can access them.


Questions and Answers
  • 1. 
    CyberArk's PIM stands for :
    • A. 

      Privilege Identity Management

    • B. 

      Privilege information management

    • C. 

      Personal information management

    • D. 

      Personal identity management

    • E. 

      Private identity management

  • 2. 
    Underlying Component used on all Cyberark solutions :
    • A. 

      CyberArk Vault

    • B. 

      CyberArk PrivateArk Client

    • C. 

      CyberArk CIFS Connector

    • D. 

      CyberArk SIM

    • E. 

      CyberArk Secure File Exchange

  • 3. 
    CyberArk Vault protection layers :
    • A. 

      Firewall & Code-Data Isolation

    • B. 

      Encryted Network Communication & Visual Security Audit Trail

    • C. 

      Strong Authentication & Granular Access Control

    • D. 

      File Encryption & Dual Control Security

    • E. 

      All of above

  • 4. 
    CyberArk Vault can be managed using :
    • A. 

      PrivateArk Client

    • B. 

      PrivateArk Web Client

    • C. 

      Private Vault Web Access

    • D. 

      CIFS Connector

    • E. 

      SFE interface

  • 5. 
    Minimum password complexity required for CyberArk authentication using internal CyberArk scheme
    • A. 

      Minimum 1 lowerchase alphabet character

    • B. 

      Minimum 1 uppercase alphabet character

    • C. 

      Minimum 1 numeric character

    • D. 

      Minimum 1 special character

    • E. 

      Configurable

  • 6. 
    Which CyberArk's modules responsible for changing password
    • A. 

      CPM

    • B. 

      PSM

    • C. 

      PVWA

    • D. 

      EPV

    • E. 

      OPM

  • 7. 
    Which CyberArk's modules responsible for recording session
    • A. 

      PSM

    • B. 

      PVWA

    • C. 

      EPV

    • D. 

      OPM

    • E. 

      CPM

  • 8. 
    By default user will be suspended to login to the vault after entering ... times of wrong password
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

    • E. 

      5

  • 9. 
    If a User was suspended, who is the user that able to revoke the suspension ?
    • A. 

      Nobody

    • B. 

      Supervisor

    • C. 

      Administrator

    • D. 

      None of above

    • E. 

      RecoveryUser

  • 10. 
    Wrong Password count access suspension can be increased upto
    • A. 

      10

    • B. 

      20

    • C. 

      30

    • D. 

      40

    • E. 

      99

  • 11. 
    What are Authentication schemes supported by CyberArk Vault ?
    • A. 

      CyberArk

    • B. 

      LDAP

    • C. 

      Radius

    • D. 

      PKI

    • E. 

      All of above

  • 12. 
    How long CyberArk Vault will kept deleted object until it reach true deletion stage ?
    • A. 

      10 days

    • B. 

      20 days

    • C. 

      30 days

    • D. 

      40 days

    • E. 

      Configurable

  • 13. 
    To allow specific user to access a specific safe the user need to have
    • A. 

      Safe right

    • B. 

      Safe access

    • C. 

      Safe ownership

    • D. 

      Safe credential

    • E. 

      None of Above

  • 14. 
    What is CyberArk Vault Dual Control ?
    • A. 

      Confirmation needed to open a safe

    • B. 

      Confirmation needed to retrieve files

    • C. 

      Confirmation needed to open a safe and to retrieve files

    • D. 

      At least 1 safe owner who are authorized to confirm request

    • E. 

      All of above

  • 15. 
    CyberArk Vault access control can be defined by
    • A. 

      Safe

    • B. 

      Folder

    • C. 

      Object

    • D. 

      Vault

    • E. 

      None of above

  • 16. 
    Following are User Accounts Enabled by Default
    • A. 

      Administrator

    • B. 

      Auditor

    • C. 

      Master

    • D. 

      Backup

    • E. 

      None of above

  • 17. 
    Reason of CyberArk vault user login access denied
    • A. 

      Wrong password

    • B. 

      Wrong username

    • C. 

      User suspension

    • D. 

      Wrong authentication mode

    • E. 

      License expired

  • 18. 
    To enable LDAP user authentication which following items need to be configured
    • A. 

      Directory mapping

    • B. 

      Location

    • C. 

      Organizational Unit

    • D. 

      Authenticaton Method

    • E. 

      All of above

  • 19. 
    Mention 3 pilars of CYberArk solutions
    • A. 

      PIMS, SIMS & PSMS

    • B. 

      SIMS, OPM & PSMS

    • C. 

      PSMS, OPM & AIM

    • D. 

      AIM, OPM & PIMS

    • E. 

      All of above

  • 20. 
    Why PrivateArk Web Client limited only to Internet Explorer
    • A. 

      It uses JAVA

    • B. 

      It uses Active Scripting

    • C. 

      It uses dotNet Framework

    • D. 

      It uses IIS

    • E. 

      It uses ActiveX

  • 21. 
    Does OpenSSL heartbleed bug affecting CyberArk Vault ?
    • A. 

      Yes, on all vesion

    • B. 

      No, on all vesion

    • C. 

      Yes, only on version 6 and below

    • D. 

      Yes, only on version 5 and below

    • E. 

      None of above

  • 22. 
    How to release user suspension
    • A. 

      Login using administrator account and reset the account's password

    • B. 

      Login using administrator account and activate the account

    • C. 

      Login using administrator account and unlock the account

    • D. 

      Login using supervisor account and reset the account's password

    • E. 

      Login using supervisor account and activate the account

  • 23. 
    If CyberArk vault user changed his Active Directory password what will happened with his CyberArk account
    • A. 

      Nothing, if CyberArk uses LDAP authentication

    • B. 

      Nothing, because CyberArk local authentication is differ from Active Directory authentication

    • C. 

      User have to change his CyberArk password also

    • D. 

      All of above

    • E. 

      None of above

  • 24. 
    CyberArk can manage following Database's password
    • A. 

      MS SQL

    • B. 

      Oracle DB

    • C. 

      MySQL

    • D. 

      DB2

    • E. 

      All of above

  • 25. 
    CyberArk can manage Facebook password & record Facebook session
    • A. 

      Yes

    • B. 

      No

    • C. 

      Yes, with custom plugin

    • D. 

      Only for session monitor

    • E. 

      Only for password change

Back to Top Back to top