Privilege Identity Management

45 Questions | Total Attempts: 736

Settings
Identity Quizzes & Trivia

Questions and Answers
  • 1. 
    CyberArk's PIM stands for :
    • A. 

      Privilege Identity Management

    • B. 

      Privilege information management

    • C. 

      Personal information management

    • D. 

      Personal identity management

    • E. 

      Private identity management

  • 2. 
    Underlying Component used on all Cyberark solutions :
    • A. 

      CyberArk Vault

    • B. 

      CyberArk PrivateArk Client

    • C. 

      CyberArk CIFS Connector

    • D. 

      CyberArk SIM

    • E. 

      CyberArk Secure File Exchange

  • 3. 
    CyberArk Vault protection layers :
    • A. 

      Firewall & Code-Data Isolation

    • B. 

      Encryted Network Communication & Visual Security Audit Trail

    • C. 

      Strong Authentication & Granular Access Control

    • D. 

      File Encryption & Dual Control Security

    • E. 

      All of above

  • 4. 
    CyberArk Vault can be managed using :
    • A. 

      PrivateArk Client

    • B. 

      PrivateArk Web Client

    • C. 

      Private Vault Web Access

    • D. 

      CIFS Connector

    • E. 

      SFE interface

  • 5. 
    Minimum password complexity required for CyberArk authentication using internal CyberArk scheme
    • A. 

      Minimum 1 lowerchase alphabet character

    • B. 

      Minimum 1 uppercase alphabet character

    • C. 

      Minimum 1 numeric character

    • D. 

      Minimum 1 special character

    • E. 

      Configurable

  • 6. 
    Which CyberArk's modules responsible for changing password
    • A. 

      CPM

    • B. 

      PSM

    • C. 

      PVWA

    • D. 

      EPV

    • E. 

      OPM

  • 7. 
    Which CyberArk's modules responsible for recording session
    • A. 

      PSM

    • B. 

      PVWA

    • C. 

      EPV

    • D. 

      OPM

    • E. 

      CPM

  • 8. 
    By default user will be suspended to login to the vault after entering ... times of wrong password
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

    • E. 

      5

  • 9. 
    If a User was suspended, who is the user that able to revoke the suspension ?
    • A. 

      Nobody

    • B. 

      Supervisor

    • C. 

      Administrator

    • D. 

      None of above

    • E. 

      RecoveryUser

  • 10. 
    Wrong Password count access suspension can be increased upto
    • A. 

      10

    • B. 

      20

    • C. 

      30

    • D. 

      40

    • E. 

      99

  • 11. 
    What are Authentication schemes supported by CyberArk Vault ?
    • A. 

      CyberArk

    • B. 

      LDAP

    • C. 

      Radius

    • D. 

      PKI

    • E. 

      All of above

  • 12. 
    How long CyberArk Vault will kept deleted object until it reach true deletion stage ?
    • A. 

      10 days

    • B. 

      20 days

    • C. 

      30 days

    • D. 

      40 days

    • E. 

      Configurable

  • 13. 
    To allow specific user to access a specific safe the user need to have
    • A. 

      Safe right

    • B. 

      Safe access

    • C. 

      Safe ownership

    • D. 

      Safe credential

    • E. 

      None of Above

  • 14. 
    What is CyberArk Vault Dual Control ?
    • A. 

      Confirmation needed to open a safe

    • B. 

      Confirmation needed to retrieve files

    • C. 

      Confirmation needed to open a safe and to retrieve files

    • D. 

      At least 1 safe owner who are authorized to confirm request

    • E. 

      All of above

  • 15. 
    CyberArk Vault access control can be defined by
    • A. 

      Safe

    • B. 

      Folder

    • C. 

      Object

    • D. 

      Vault

    • E. 

      None of above

  • 16. 
    Following are User Accounts Enabled by Default
    • A. 

      Administrator

    • B. 

      Auditor

    • C. 

      Master

    • D. 

      Backup

    • E. 

      None of above

  • 17. 
    Reason of CyberArk vault user login access denied
    • A. 

      Wrong password

    • B. 

      Wrong username

    • C. 

      User suspension

    • D. 

      Wrong authentication mode

    • E. 

      License expired

  • 18. 
    To enable LDAP user authentication which following items need to be configured
    • A. 

      Directory mapping

    • B. 

      Location

    • C. 

      Organizational Unit

    • D. 

      Authenticaton Method

    • E. 

      All of above

  • 19. 
    Mention 3 pilars of CYberArk solutions
    • A. 

      PIMS, SIMS & PSMS

    • B. 

      SIMS, OPM & PSMS

    • C. 

      PSMS, OPM & AIM

    • D. 

      AIM, OPM & PIMS

    • E. 

      All of above

  • 20. 
    Why PrivateArk Web Client limited only to Internet Explorer
    • A. 

      It uses JAVA

    • B. 

      It uses Active Scripting

    • C. 

      It uses dotNet Framework

    • D. 

      It uses IIS

    • E. 

      It uses ActiveX

  • 21. 
    Does OpenSSL heartbleed bug affecting CyberArk Vault ?
    • A. 

      Yes, on all vesion

    • B. 

      No, on all vesion

    • C. 

      Yes, only on version 6 and below

    • D. 

      Yes, only on version 5 and below

    • E. 

      None of above

  • 22. 
    • A. 

      Login using administrator account and reset the account's password

    • B. 

      Login using administrator account and activate the account

    • C. 

      Login using administrator account and unlock the account

    • D. 

      Login using supervisor account and reset the account's password

    • E. 

      Login using supervisor account and activate the account

  • 23. 
    If CyberArk vault user changed his Active Directory password what will happened with his CyberArk account
    • A. 

      Nothing, if CyberArk uses LDAP authentication

    • B. 

      Nothing, because CyberArk local authentication is differ from Active Directory authentication

    • C. 

      User have to change his CyberArk password also

    • D. 

      All of above

    • E. 

      None of above

  • 24. 
    CyberArk can manage following Database's password
    • A. 

      MS SQL

    • B. 

      Oracle DB

    • C. 

      MySQL

    • D. 

      DB2

    • E. 

      All of above

  • 25. 
    CyberArk can manage Facebook password & record Facebook session
    • A. 

      Yes

    • B. 

      No

    • C. 

      Yes, with custom plugin

    • D. 

      Only for session monitor

    • E. 

      Only for password change

  • 26. 
    About privilege account request/approval or also known as dual control, which following statement is false
    • A. 

      Requester will receive email notification upon approval

    • B. 

      Approvals is working in hierarchy

    • C. 

      Request can be set for a specific time & date

    • D. 

      Approvals is working in minimum number of approvers

    • E. 

      Maximum request access for 5 consecutive days

  • 27. 
    Password management consists of following actions, except
    • A. 

      Manual & automatic password verification

    • B. 

      Manual password change

    • C. 

      Automatic password reconciliation

    • D. 

      ENE integration

    • E. 

      One time password usage

  • 28. 
    What is ENE integration
    • A. 

      CyberArk email notification integration with existing email system

    • B. 

      Email notification module for SMTP

    • C. 

      Password synchronization

    • D. 

      Password reconciliation

    • E. 

      Password verification

  • 29. 
    Which following User Directory supported by CyberArk
    • A. 

      Active Directory

    • B. 

      Oracle Internet Directory

    • C. 

      Novell eDirectory

    • D. 

      IBM Tivoli DS

    • E. 

      All of Above

  • 30. 
    CyberArk can change password in a text file
    • A. 

      Yes

    • B. 

      No

    • C. 

      Yes, if it is plaintext password only

    • D. 

      Yes, if it is in plaintext or encrypted using known encryption algorithm

    • E. 

      Yes if it is in encrypted form

  • 31. 
    PSM for SSH have following capabilities
    • A. 

      Video recording

    • B. 

      Command recording

    • C. 

      Sound recording

    • D. 

      A, B & C correct

    • E. 

      A & B correct

  • 32. 
    What is BYOC
    • A. 

      Bring Your Own Client

    • B. 

      Bring Your Own Connector

    • C. 

      Bring Your Own Computer

    • D. 

      Bring Your Own Component

    • E. 

      Bring Your Own Condition

  • 33. 
    BYOC applicable to what module ?
    • A. 

      CPM

    • B. 

      PSM

    • C. 

      EPV

    • D. 

      OPM

    • E. 

      PVWA

  • 34. 
    If a password request got approved why only notification sent to requester but not the password for the target system itself ?
    • A. 

      Security concern

    • B. 

      Email can be eavesdropped

    • C. 

      Email can be redirected

    • D. 

      Email is not secure

    • E. 

      All of above

  • 35. 
    Which module used to replicate vault at production site to disaster recovery site ?
    • A. 

      DR Module

    • B. 

      CPM

    • C. 

      EPV

    • D. 

      PVWA

    • E. 

      PSM

  • 36. 
    To create a PIM policy, what need to be done ?
    • A. 

      Create CPM Policy

    • B. 

      Create PIM Policy

    • C. 

      Create a PSM connection component & enable the PSM if needed

    • D. 

      Create a secure connect policy

  • 37. 
    What is the shortest time CPM can be configured to change password after each usage
    • A. 

      Right away

    • B. 

      1 hour

    • C. 

      1 minute

    • D. 

      30 minutes

    • E. 

      12 hours

  • 38. 
    What need to be done to enable PSM for a policy
    • A. 

      Enable PSM option on specified policy

    • B. 

      Add required PSM connection component

    • C. 

      Create a safe

    • D. 

      Configure ENE integration

    • E. 

      Nothing, it was enabled by default

  • 39. 
    • A. 

      Password reconciliation enabled for specific policy

    • B. 

      Additional account on target server with sufficient rights

    • C. 

      Enable automatic password verification

    • D. 

      Enable password reconciliation when password is unsync

    • E. 

      Auto password reconciliation enabled by default

  • 40. 
    Below steps are required to register a privilege account to CyberArk PIMS using PVWA :
    • A. 

      Create safe & define safe owner

    • B. 

      Create PIM Policy

    • C. 

      Create CPM & PSM Policy

    • D. 

      Add account with its properties (username, password, address etc)

    • E. 

      Setup a directory mapping

  • 41. 
    If PSM enabled for a specific policy, auditor user can terminate remote session currently active
    • A. 

      True

    • B. 

      False

  • 42. 
    • A. 

      Use the privilege account to directly connect to target system by clicking on connect button

    • B. 

      Copy the password for other usage

    • C. 

      Change the password by clicking on change button

    • D. 

      Verify the password by clicking on verify button

  • 43. 
    • A. 

      You can use any client to access target system if PSM enabled

    • B. 

      You can only use built in client to access target system if PSM enabled

    • C. 

      You can use web client to access target system if PSM enabled

    • D. 

      PSM is flexible

    • E. 

      CyberArk PSM covers more target system type other than others

  • 44. 
    CyberArk PSM has web form capability
    • A. 

      True

    • B. 

      False

  • 45. 
    • A. 

      PSM connector can be integrated into web based application, with a set of conditions

    • B. 

      By default PSM web capability only covers html login page with form id, input form for user/password and button name attribute

    • C. 

      This statement is wrong

    • D. 

      PSM web capability supports web login using Adobe Flash & Java