CyberArk is a publicly traded information security company offering Privileged Account Security. In CyberArk Vault, you can ceate your Vault environment in the PrivateArk Administrative Client. After you have created the Vault, you can create Safes and allocate owners. Then you can store accounts and files in Safes where users can access them.
CyberArk Vault
CyberArk PrivateArk Client
CyberArk CIFS Connector
CyberArk SIM
CyberArk Secure File Exchange
Rate this question:
Firewall & Code-Data Isolation
Encryted Network Communication & Visual Security Audit Trail
Strong Authentication & Granular Access Control
File Encryption & Dual Control Security
All of above
Rate this question:
PrivateArk Client
PrivateArk Web Client
Private Vault Web Access
CIFS Connector
SFE interface
Rate this question:
Minimum 1 lowerchase alphabet character
Minimum 1 uppercase alphabet character
Minimum 1 numeric character
Minimum 1 special character
Configurable
Rate this question:
CPM
PSM
PVWA
EPV
OPM
Rate this question:
PSM
PVWA
EPV
OPM
CPM
Rate this question:
1
2
3
4
5
Rate this question:
Nobody
Supervisor
Administrator
None of above
RecoveryUser
Rate this question:
10
20
30
40
99
Rate this question:
CyberArk
LDAP
Radius
PKI
All of above
Rate this question:
10 days
20 days
30 days
40 days
Configurable
Rate this question:
Safe right
Safe access
Safe ownership
Safe credential
None of Above
Rate this question:
Confirmation needed to open a safe
Confirmation needed to retrieve files
Confirmation needed to open a safe and to retrieve files
At least 1 safe owner who are authorized to confirm request
All of above
Rate this question:
Safe
Folder
Object
Vault
None of above
Rate this question:
Administrator
Auditor
Master
Backup
None of above
Rate this question:
Wrong password
Wrong username
User suspension
Wrong authentication mode
License expired
Rate this question:
Directory mapping
Location
Organizational Unit
Authenticaton Method
All of above
Rate this question:
PIMS, SIMS & PSMS
SIMS, OPM & PSMS
PSMS, OPM & AIM
AIM, OPM & PIMS
All of above
Rate this question:
It uses JAVA
It uses Active Scripting
It uses dotNet Framework
It uses IIS
It uses ActiveX
Rate this question:
Yes, on all vesion
No, on all vesion
Yes, only on version 6 and below
Yes, only on version 5 and below
None of above
Rate this question:
Login using administrator account and reset the account's password
Login using administrator account and activate the account
Login using administrator account and unlock the account
Login using supervisor account and reset the account's password
Login using supervisor account and activate the account
Rate this question:
Nothing, if CyberArk uses LDAP authentication
Nothing, because CyberArk local authentication is differ from Active Directory authentication
User have to change his CyberArk password also
All of above
None of above
Rate this question:
MS SQL
Oracle DB
MySQL
DB2
All of above
Rate this question:
Yes
No
Yes, with custom plugin
Only for session monitor
Only for password change
Rate this question:
Requester will receive email notification upon approval
Approvals is working in hierarchy
Request can be set for a specific time & date
Approvals is working in minimum number of approvers
Maximum request access for 5 consecutive days
Rate this question:
Manual & automatic password verification
Manual password change
Automatic password reconciliation
ENE integration
One time password usage
Rate this question:
CyberArk email notification integration with existing email system
Email notification module for SMTP
Password synchronization
Password reconciliation
Password verification
Rate this question:
Active Directory
Oracle Internet Directory
Novell eDirectory
IBM Tivoli DS
All of Above
Rate this question:
Yes
No
Yes, if it is plaintext password only
Yes, if it is in plaintext or encrypted using known encryption algorithm
Yes if it is in encrypted form
Rate this question:
Video recording
Command recording
Sound recording
A, B & C correct
A & B correct
Rate this question:
Bring Your Own Client
Bring Your Own Connector
Bring Your Own Computer
Bring Your Own Component
Bring Your Own Condition
Rate this question:
CPM
PSM
EPV
OPM
PVWA
Rate this question:
Security concern
Email can be eavesdropped
Email can be redirected
Email is not secure
All of above
Rate this question:
DR Module
CPM
EPV
PVWA
PSM
Rate this question:
Create CPM Policy
Create PIM Policy
Create a PSM connection component & enable the PSM if needed
Create a secure connect policy
Rate this question:
Right away
1 hour
1 minute
30 minutes
12 hours
Rate this question:
Enable PSM option on specified policy
Add required PSM connection component
Create a safe
Configure ENE integration
Nothing, it was enabled by default
Rate this question:
Password reconciliation enabled for specific policy
Additional account on target server with sufficient rights
Enable automatic password verification
Enable password reconciliation when password is unsync
Auto password reconciliation enabled by default
Rate this question:
Create safe & define safe owner
Create PIM Policy
Create CPM & PSM Policy
Add account with its properties (username, password, address etc)
Setup a directory mapping
Rate this question:
True
False
Rate this question:
Use the privilege account to directly connect to target system by clicking on connect button
Copy the password for other usage
Change the password by clicking on change button
Verify the password by clicking on verify button
Rate this question:
You can use any client to access target system if PSM enabled
You can only use built in client to access target system if PSM enabled
You can use web client to access target system if PSM enabled
PSM is flexible
CyberArk PSM covers more target system type other than others
Rate this question:
True
False
Rate this question:
PSM connector can be integrated into web based application, with a set of conditions
By default PSM web capability only covers html login page with form id, input form for user/password and button name attribute
This statement is wrong
PSM web capability supports web login using Adobe Flash & Java
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.