Cyberark Security Quiz - Manage Your Identity

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Kyosho
K
Kyosho
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,543
Questions: 45 | Attempts: 1,558

SettingsSettingsSettings
Identity Quizzes & Trivia

CyberArk is a publicly traded information security company offering Privileged Account Security. In CyberArk Vault, you can ceate your Vault environment in the PrivateArk Administrative Client. After you have created the Vault, you can create Safes and allocate owners. Then you can store accounts and files in Safes where users can access them.


Questions and Answers
  • 1. 

    CyberArk's PIM stands for :

    • A.

      Privilege Identity Management

    • B.

      Privilege information management

    • C.

      Personal information management

    • D.

      Personal identity management

    • E.

      Private identity management

    Correct Answer
    A. Privilege Identity Management
    Explanation
    PIM stands for Privilege Identity Management. This term refers to the practice of managing and controlling privileged accounts and access rights within an organization. Privileged accounts have elevated permissions and access to critical systems and data, making them a prime target for cyberattacks. CyberArk specializes in providing solutions for Privilege Identity Management, helping organizations secure and manage these privileged accounts to prevent unauthorized access and potential security breaches.

    Rate this question:

  • 2. 

    Underlying Component used on all Cyberark solutions :

    • A.

      CyberArk Vault

    • B.

      CyberArk PrivateArk Client

    • C.

      CyberArk CIFS Connector

    • D.

      CyberArk SIM

    • E.

      CyberArk Secure File Exchange

    Correct Answer
    A. CyberArk Vault
    Explanation
    The underlying component used on all CyberArk solutions is the CyberArk Vault. This is the central repository where all privileged account credentials and secrets are stored and managed. The CyberArk Vault ensures that these sensitive credentials are securely stored and accessed only by authorized users and applications. It provides a secure and auditable platform for managing and protecting privileged accounts, which is a critical aspect of cybersecurity.

    Rate this question:

  • 3. 

    CyberArk Vault protection layers :

    • A.

      Firewall & Code-Data Isolation

    • B.

      Encryted Network Communication & Visual Security Audit Trail

    • C.

      Strong Authentication & Granular Access Control

    • D.

      File Encryption & Dual Control Security

    • E.

      All of above

    Correct Answer
    E. All of above
    Explanation
    The CyberArk Vault protection layers include multiple security measures such as Firewall & Code-Data Isolation, Encrypted Network Communication & Visual Security Audit Trail, Strong Authentication & Granular Access Control, and File Encryption & Dual Control Security. All of these measures work together to provide comprehensive protection for the vault, ensuring that sensitive data is safeguarded from unauthorized access and potential cyber threats.

    Rate this question:

  • 4. 

    CyberArk Vault can be managed using :

    • A.

      PrivateArk Client

    • B.

      PrivateArk Web Client

    • C.

      Private Vault Web Access

    • D.

      CIFS Connector

    • E.

      SFE interface

    Correct Answer(s)
    A. PrivateArk Client
    B. PrivateArk Web Client
    C. Private Vault Web Access
    Explanation
    CyberArk Vault can be managed using PrivateArk Client, PrivateArk Web Client, and Private Vault Web Access. These three options provide different interfaces for managing the vault. PrivateArk Client is a desktop application that allows users to securely access and manage the vault. PrivateArk Web Client is a web-based interface that provides similar functionality as the client, but can be accessed from any device with an internet connection. Private Vault Web Access is another web-based interface that allows users to securely access and manage the vault remotely. These options provide flexibility in managing the CyberArk Vault based on user preferences and accessibility requirements.

    Rate this question:

  • 5. 

    Minimum password complexity required for CyberArk authentication using internal CyberArk scheme

    • A.

      Minimum 1 lowerchase alphabet character

    • B.

      Minimum 1 uppercase alphabet character

    • C.

      Minimum 1 numeric character

    • D.

      Minimum 1 special character

    • E.

      Configurable

    Correct Answer(s)
    A. Minimum 1 lowerchase alphabet character
    B. Minimum 1 uppercase alphabet character
    C. Minimum 1 numeric character
    Explanation
    The correct answer states that the minimum password complexity required for CyberArk authentication using the internal CyberArk scheme includes at least one lowercase alphabet character, one uppercase alphabet character, and one numeric character. This ensures that the password contains a combination of different character types, making it more secure and harder to guess or crack. The requirement for these specific character types helps to prevent weak passwords and enhance the overall security of the authentication process.

    Rate this question:

  • 6. 

    Which CyberArk's modules responsible for changing password

    • A.

      CPM

    • B.

      PSM

    • C.

      PVWA

    • D.

      EPV

    • E.

      OPM

    Correct Answer
    A. CPM
    Explanation
    CPM (Central Policy Manager) is CyberArk's module responsible for changing passwords. It is designed to automate and enforce password changes for privileged accounts across various systems and applications. CPM ensures that passwords are regularly rotated, reducing the risk of unauthorized access and potential security breaches. By automating the password change process, CPM enhances security and enables organizations to maintain control over privileged account credentials.

    Rate this question:

  • 7. 

    Which CyberArk's modules responsible for recording session

    • A.

      PSM

    • B.

      PVWA

    • C.

      EPV

    • D.

      OPM

    • E.

      CPM

    Correct Answer
    A. PSM
    Explanation
    The CyberArk module responsible for recording sessions is the Privileged Session Manager (PSM). PSM is designed to provide secure access to privileged accounts by acting as a secure proxy, allowing users to access target systems without directly exposing credentials. It records and monitors all privileged sessions, including keystrokes and screenshots, providing a detailed audit trail for compliance and forensic analysis purposes. PSM ensures that all privileged sessions are securely recorded and can be reviewed if needed.

    Rate this question:

  • 8. 

    By default user will be suspended to login to the vault after entering ... times of wrong password

    • A.

      1

    • B.

      2

    • C.

      3

    • D.

      4

    • E.

      5

    Correct Answer
    E. 5
    Explanation
    By default, the user will be suspended from logging into the vault after entering 5 times of the wrong password. This means that if the user enters an incorrect password 5 times consecutively, their access to the vault will be temporarily suspended. This is a security measure implemented to protect the vault and its contents from unauthorized access or potential brute force attacks.

    Rate this question:

  • 9. 

    If a User was suspended, who is the user that able to revoke the suspension ?

    • A.

      Nobody

    • B.

      Supervisor

    • C.

      Administrator

    • D.

      None of above

    • E.

      RecoveryUser

    Correct Answer
    C. Administrator
    Explanation
    The correct answer is Administrator. An administrator is the user who has the authority to revoke the suspension of another user. They have the necessary permissions and privileges to manage user accounts and make changes to their status. The supervisor may have some level of authority, but they may not have the ability to revoke a suspension. The recovery user is not mentioned as a role or user type with the ability to revoke suspensions. Therefore, the correct answer is the Administrator.

    Rate this question:

  • 10. 

    Wrong Password count access suspension can be increased upto

    • A.

      10

    • B.

      20

    • C.

      30

    • D.

      40

    • E.

      99

    Correct Answer
    E. 99
    Explanation
    The given correct answer is 99. This suggests that the access suspension for wrong password count can be increased up to 99. This means that if a user enters the wrong password a certain number of times, their access to the system will be suspended until it is manually reset or a certain amount of time has passed. The system allows for a high number of wrong password attempts before imposing this suspension, giving users more chances to enter the correct password.

    Rate this question:

  • 11. 

    What are Authentication schemes supported by CyberArk Vault ?

    • A.

      CyberArk

    • B.

      LDAP

    • C.

      Radius

    • D.

      PKI

    • E.

      All of above

    Correct Answer
    E. All of above
    Explanation
    The correct answer is "All of above". CyberArk Vault supports multiple authentication schemes, including CyberArk, LDAP, Radius, and PKI. This means that users can authenticate themselves using any of these schemes, providing flexibility and options for secure access to the vault.

    Rate this question:

  • 12. 

    How long CyberArk Vault will kept deleted object until it reach true deletion stage ?

    • A.

      10 days

    • B.

      20 days

    • C.

      30 days

    • D.

      40 days

    • E.

      Configurable

    Correct Answer
    C. 30 days
    Explanation
    CyberArk Vault will keep a deleted object for 30 days until it reaches the true deletion stage. This means that the object will remain in the Vault for a period of 30 days before it is permanently deleted. During this time, the object can potentially be restored if needed. After the 30-day period, the object will be completely and irreversibly deleted from the Vault.

    Rate this question:

  • 13. 

    To allow specific user to access a specific safe the user need to have

    • A.

      Safe right

    • B.

      Safe access

    • C.

      Safe ownership

    • D.

      Safe credential

    • E.

      None of Above

    Correct Answer
    C. Safe ownership
    Explanation
    To allow a specific user to access a specific safe, the user needs to have safe ownership. This means that the user must be the designated owner of the safe in order to have the necessary permissions and privileges to access it. Safe ownership typically grants the user full control and authority over the safe, including the ability to grant or revoke access to other users.

    Rate this question:

  • 14. 

    What is CyberArk Vault Dual Control ?

    • A.

      Confirmation needed to open a safe

    • B.

      Confirmation needed to retrieve files

    • C.

      Confirmation needed to open a safe and to retrieve files

    • D.

      At least 1 safe owner who are authorized to confirm request

    • E.

      All of above

    Correct Answer
    A. Confirmation needed to open a safe
    Explanation
    CyberArk Vault Dual Control is a security measure that requires confirmation to open a safe. This means that before accessing the contents of the safe, an additional authorization is needed. This ensures that only authorized individuals can gain access to the safe and its contents, adding an extra layer of protection to sensitive information.

    Rate this question:

  • 15. 

    CyberArk Vault access control can be defined by

    • A.

      Safe

    • B.

      Folder

    • C.

      Object

    • D.

      Vault

    • E.

      None of above

    Correct Answer(s)
    A. Safe
    B. Folder
    C. Object
    Explanation
    CyberArk Vault access control can be defined by safe, folder, and object. This means that access control within the CyberArk Vault can be managed at the level of individual safes, folders, and objects stored within the vault. This allows for granular control over who can access specific data and resources within the vault, ensuring that sensitive information is protected and only accessible to authorized individuals.

    Rate this question:

  • 16. 

    Following are User Accounts Enabled by Default

    • A.

      Administrator

    • B.

      Auditor

    • C.

      Master

    • D.

      Backup

    • E.

      None of above

    Correct Answer
    A. Administrator
    Explanation
    The correct answer is "Administrator" because it is stated in the given information that the user accounts enabled by default are Administrator, Auditor, Master, Backup, and None of above. Since "Administrator" is listed as one of the user accounts, it is the correct answer.

    Rate this question:

  • 17. 

    Reason of CyberArk vault user login access denied

    • A.

      Wrong password

    • B.

      Wrong username

    • C.

      User suspension

    • D.

      Wrong authentication mode

    • E.

      License expired

    Correct Answer(s)
    A. Wrong password
    B. Wrong username
    C. User suspension
    D. Wrong authentication mode
    Explanation
    The reason for CyberArk vault user login access being denied can be due to various factors such as entering the wrong password or username, user suspension, using the wrong authentication mode, or if the license has expired. These factors can prevent the user from gaining access to the vault and its resources.

    Rate this question:

  • 18. 

    To enable LDAP user authentication which following items need to be configured

    • A.

      Directory mapping

    • B.

      Location

    • C.

      Organizational Unit

    • D.

      Authenticaton Method

    • E.

      All of above

    Correct Answer
    A. Directory mapping
    Explanation
    To enable LDAP user authentication, the directory mapping needs to be configured. Directory mapping is the process of mapping LDAP attributes to the corresponding attributes in the system being used for authentication. This allows the system to authenticate users against the LDAP directory by matching the mapped attributes. The other options mentioned, such as location, organizational unit, and authentication method, may also need to be configured for LDAP user authentication, but the essential step is setting up the directory mapping.

    Rate this question:

  • 19. 

    Mention 3 pilars of CYberArk solutions

    • A.

      PIMS, SIMS & PSMS

    • B.

      SIMS, OPM & PSMS

    • C.

      PSMS, OPM & AIM

    • D.

      AIM, OPM & PIMS

    • E.

      All of above

    Correct Answer
    A. PIMS, SIMS & PSMS
    Explanation
    The three pillars of CyberArk solutions are PIMS, SIMS, and PSMS. PIMS stands for Privileged Identity Management Solution, which focuses on managing and securing privileged accounts and credentials. SIMS refers to Session Isolation and Monitoring Solution, which involves isolating and monitoring privileged sessions to prevent unauthorized access. PSMS stands for Privileged Session Management Solution, which focuses on managing and securing privileged sessions and providing detailed auditing and monitoring capabilities. These three pillars collectively form the foundation of CyberArk's comprehensive approach to privileged access security.

    Rate this question:

  • 20. 

    Why PrivateArk Web Client limited only to Internet Explorer

    • A.

      It uses JAVA

    • B.

      It uses Active Scripting

    • C.

      It uses dotNet Framework

    • D.

      It uses IIS

    • E.

      It uses ActiveX

    Correct Answer
    E. It uses ActiveX
    Explanation
    The reason why the PrivateArk Web Client is limited only to Internet Explorer is because it uses ActiveX. ActiveX is a technology developed by Microsoft that allows for the integration of interactive content and applications within web browsers. However, ActiveX is only supported by Internet Explorer and is not compatible with other web browsers such as Chrome or Firefox. Therefore, in order to use the PrivateArk Web Client, users must use Internet Explorer.

    Rate this question:

  • 21. 

    Does OpenSSL heartbleed bug affecting CyberArk Vault ?

    • A.

      Yes, on all vesion

    • B.

      No, on all vesion

    • C.

      Yes, only on version 6 and below

    • D.

      Yes, only on version 5 and below

    • E.

      None of above

    Correct Answer
    B. No, on all vesion
    Explanation
    The correct answer is "No, on all versions." This means that the OpenSSL heartbleed bug does not affect CyberArk Vault regardless of the version.

    Rate this question:

  • 22. 

    How to release user suspension

    • A.

      Login using administrator account and reset the account's password

    • B.

      Login using administrator account and activate the account

    • C.

      Login using administrator account and unlock the account

    • D.

      Login using supervisor account and reset the account's password

    • E.

      Login using supervisor account and activate the account

    Correct Answer
    B. Login using administrator account and activate the account
    Explanation
    To release a user suspension, the administrator needs to log in using their account and activate the suspended account. This means that the administrator has the authority to enable the account again and restore its functionality. By activating the account, the user will regain access to their account and any restrictions or suspensions will be lifted.

    Rate this question:

  • 23. 

    If CyberArk vault user changed his Active Directory password what will happened with his CyberArk account

    • A.

      Nothing, if CyberArk uses LDAP authentication

    • B.

      Nothing, because CyberArk local authentication is differ from Active Directory authentication

    • C.

      User have to change his CyberArk password also

    • D.

      All of above

    • E.

      None of above

    Correct Answer
    A. Nothing, if CyberArk uses LDAP authentication
    Explanation
    If CyberArk uses LDAP authentication, the CyberArk vault user's account will not be affected if they change their Active Directory password. This is because LDAP authentication allows CyberArk to authenticate users against the Active Directory, but it does not store or manage the user's password. Therefore, changing the Active Directory password will not impact the CyberArk account.

    Rate this question:

  • 24. 

    CyberArk can manage following Database's password

    • A.

      MS SQL

    • B.

      Oracle DB

    • C.

      MySQL

    • D.

      DB2

    • E.

      All of above

    Correct Answer
    E. All of above
    Explanation
    CyberArk is a privileged access security solution that helps organizations manage and protect their critical data and systems. It is capable of managing the passwords for various databases including MS SQL, Oracle DB, MySQL, and DB2. This means that CyberArk can securely store and control access to the passwords of these databases, ensuring that only authorized users can access and modify the data within them. Therefore, the correct answer is "All of above".

    Rate this question:

  • 25. 

    CyberArk can manage Facebook password & record Facebook session

    • A.

      Yes

    • B.

      No

    • C.

      Yes, with custom plugin

    • D.

      Only for session monitor

    • E.

      Only for password change

    Correct Answer
    A. Yes
    Explanation
    CyberArk is a privileged access management solution that helps organizations secure and manage their passwords and sessions. With CyberArk, it is possible to manage the Facebook password and record the Facebook session. This means that CyberArk can store and protect the Facebook password and also monitor and record the session activity on Facebook. This feature allows for better control and security of Facebook accounts within an organization.

    Rate this question:

  • 26. 

    About privilege account request/approval or also known as dual control, which following statement is false

    • A.

      Requester will receive email notification upon approval

    • B.

      Approvals is working in hierarchy

    • C.

      Request can be set for a specific time & date

    • D.

      Approvals is working in minimum number of approvers

    • E.

      Maximum request access for 5 consecutive days

    Correct Answer
    B. Approvals is working in hierarchy
    Explanation
    The statement "Approvals is working in hierarchy" is false. In the context of privilege account request/approval, the approval process does not necessarily follow a hierarchical structure. It can be designed to have multiple levels of approval, but it is not a requirement. The approval process can be configured based on different criteria such as role-based or rule-based approvals, rather than strictly following a hierarchy.

    Rate this question:

  • 27. 

    Password management consists of following actions, except

    • A.

      Manual & automatic password verification

    • B.

      Manual password change

    • C.

      Automatic password reconciliation

    • D.

      ENE integration

    • E.

      One time password usage

    Correct Answer
    D. ENE integration
    Explanation
    The correct answer is "ENE integration." Password management involves actions such as manual and automatic password verification, manual password change, automatic password reconciliation, and one-time password usage. ENE integration is not a part of password management, as it is not mentioned or related to any password-related action or process.

    Rate this question:

  • 28. 

    What is ENE integration

    • A.

      CyberArk email notification integration with existing email system

    • B.

      Email notification module for SMTP

    • C.

      Password synchronization

    • D.

      Password reconciliation

    • E.

      Password verification

    Correct Answer
    A. CyberArk email notification integration with existing email system
    Explanation
    The correct answer is CyberArk email notification integration with existing email system. This means that ENE integration refers to the process of integrating CyberArk's email notification system with an organization's existing email system. This integration allows CyberArk to send email notifications through the organization's email system, ensuring that users receive important notifications regarding their passwords and account security.

    Rate this question:

  • 29. 

    Which following User Directory supported by CyberArk

    • A.

      Active Directory

    • B.

      Oracle Internet Directory

    • C.

      Novell eDirectory

    • D.

      IBM Tivoli DS

    • E.

      All of Above

    Correct Answer
    E. All of Above
    Explanation
    CyberArk supports all the mentioned User Directories, including Active Directory, Oracle Internet Directory, Novell eDirectory, and IBM Tivoli DS. This means that CyberArk can integrate and work with these different User Directories, providing a comprehensive solution for managing user authentication and access control across various systems and platforms.

    Rate this question:

  • 30. 

    CyberArk can change password in a text file

    • A.

      Yes

    • B.

      No

    • C.

      Yes, if it is plaintext password only

    • D.

      Yes, if it is in plaintext or encrypted using known encryption algorithm

    • E.

      Yes if it is in encrypted form

    Correct Answer
    D. Yes, if it is in plaintext or encrypted using known encryption algorithm
    Explanation
    CyberArk has the capability to change passwords in a text file. This can be done if the password is either in plaintext or encrypted using a known encryption algorithm. Therefore, the answer is "Yes, if it is in plaintext or encrypted using known encryption algorithm."

    Rate this question:

  • 31. 

    PSM for SSH have following capabilities

    • A.

      Video recording

    • B.

      Command recording

    • C.

      Sound recording

    • D.

      A, B & C correct

    • E.

      A & B correct

    Correct Answer
    E. A & B correct
    Explanation
    The correct answer is A & B correct. This means that the PSM for SSH has the capabilities of video recording and command recording. Sound recording is not mentioned as one of the capabilities.

    Rate this question:

  • 32. 

    What is BYOC

    • A.

      Bring Your Own Client

    • B.

      Bring Your Own Connector

    • C.

      Bring Your Own Computer

    • D.

      Bring Your Own Component

    • E.

      Bring Your Own Condition

    Correct Answer
    A. Bring Your Own Client
    Explanation
    BYOC stands for Bring Your Own Client. This term refers to a practice where individuals or employees are allowed to use their own personal devices or software applications to access and interact with a company's services or systems. This allows for flexibility and convenience as individuals can use their preferred devices or applications while still being able to connect and collaborate with the company's resources.

    Rate this question:

  • 33. 

    BYOC applicable to what module ?

    • A.

      CPM

    • B.

      PSM

    • C.

      EPV

    • D.

      OPM

    • E.

      PVWA

    Correct Answer
    B. PSM
    Explanation
    BYOC (Bring Your Own Credential) is applicable to the PSM (Privileged Session Manager) module.

    Rate this question:

  • 34. 

    If a password request got approved why only notification sent to requester but not the password for the target system itself ?

    • A.

      Security concern

    • B.

      Email can be eavesdropped

    • C.

      Email can be redirected

    • D.

      Email is not secure

    • E.

      All of above

    Correct Answer
    E. All of above
    Explanation
    The correct answer is "All of above". This means that all the options mentioned - security concern, email can be eavesdropped, email can be redirected, and email is not secure - are valid reasons for not sending the password for the target system itself via email. Sending the password through email can pose security risks as emails can be intercepted, read by unauthorized individuals, or redirected to unintended recipients. Therefore, to ensure the security of the password and the target system, it is best to only send a notification to the requester rather than the actual password.

    Rate this question:

  • 35. 

    Which module used to replicate vault at production site to disaster recovery site ?

    • A.

      DR Module

    • B.

      CPM

    • C.

      EPV

    • D.

      PVWA

    • E.

      PSM

    Correct Answer
    A. DR Module
    Explanation
    The correct answer is DR Module. The DR Module is used to replicate the vault at the production site to the disaster recovery site. This module ensures that in the event of a disaster or failure at the production site, the vault and its contents can be quickly and seamlessly restored at the disaster recovery site.

    Rate this question:

  • 36. 

    To create a PIM policy, what need to be done ?

    • A.

      Create CPM Policy

    • B.

      Create PIM Policy

    • C.

      Create a PSM connection component & enable the PSM if needed

    • D.

      Create a secure connect policy

    Correct Answer(s)
    A. Create CPM Policy
    B. Create PIM Policy
    C. Create a PSM connection component & enable the PSM if needed
    Explanation
    To create a PIM policy, multiple steps need to be followed. First, a CPM (Central Policy Manager) policy needs to be created. This policy will define the overall rules and settings for the PIM policy. Then, a PIM (Policy Information Manager) policy needs to be created. This policy will contain specific information and guidelines for managing and enforcing the desired policies. Additionally, a PSM (Policy Server Manager) connection component needs to be created, and if necessary, the PSM should be enabled to ensure secure connections. Finally, a secure connect policy should be created to establish secure connections between the PIM policy and other components.

    Rate this question:

  • 37. 

    What is the shortest time CPM can be configured to change password after each usage

    • A.

      Right away

    • B.

      1 hour

    • C.

      1 minute

    • D.

      30 minutes

    • E.

      12 hours

    Correct Answer
    C. 1 minute
    Explanation
    CPM can be configured to change the password after each usage in the shortest time of 1 minute. This means that every time a user logs in and uses their password, it will automatically be changed after 1 minute. This configuration ensures a high level of security by constantly rotating passwords and minimizing the risk of unauthorized access.

    Rate this question:

  • 38. 

    What need to be done to enable PSM for a policy

    • A.

      Enable PSM option on specified policy

    • B.

      Add required PSM connection component

    • C.

      Create a safe

    • D.

      Configure ENE integration

    • E.

      Nothing, it was enabled by default

    Correct Answer(s)
    A. Enable PSM option on specified policy
    B. Add required PSM connection component
    Explanation
    To enable PSM for a policy, the first step is to enable the PSM option on the specified policy. This allows the policy to utilize PSM features. Additionally, it is necessary to add the required PSM connection component. This component establishes the connection between the policy and the PSM system. By completing these two steps, PSM can be effectively enabled for the policy.

    Rate this question:

  • 39. 

    What you need to have to enable auto password reconciliation policy

    • A.

      Password reconciliation enabled for specific policy

    • B.

      Additional account on target server with sufficient rights

    • C.

      Enable automatic password verification

    • D.

      Enable password reconciliation when password is unsync

    • E.

      Auto password reconciliation enabled by default

    Correct Answer(s)
    A. Password reconciliation enabled for specific policy
    B. Additional account on target server with sufficient rights
    C. Enable automatic password verification
    D. Enable password reconciliation when password is unsync
    Explanation
    To enable auto password reconciliation policy, you need to have the following:
    1) Password reconciliation enabled for a specific policy. This means that the policy should be configured to allow password reconciliation.
    2) An additional account on the target server with sufficient rights. This account will be used for password verification and reconciliation.
    3) Automatic password verification should be enabled. This ensures that the system automatically verifies the password.
    4) Password reconciliation should be enabled when the password is unsynced. This means that if there is a mismatch or inconsistency in passwords, the system will reconcile and synchronize them.
    Therefore, all these factors need to be in place for auto password reconciliation policy to work effectively.

    Rate this question:

  • 40. 

    Below steps are required to register a privilege account to CyberArk PIMS using PVWA :

    • A.

      Create safe & define safe owner

    • B.

      Create PIM Policy

    • C.

      Create CPM & PSM Policy

    • D.

      Add account with its properties (username, password, address etc)

    • E.

      Setup a directory mapping

    Correct Answer(s)
    A. Create safe & define safe owner
    B. Create PIM Policy
    C. Create CPM & PSM Policy
    D. Add account with its properties (username, password, address etc)
    Explanation
    The given answer is correct because these are the necessary steps to register a privilege account to CyberArk PIMS using PVWA. Creating a safe and defining a safe owner ensures that the account is securely stored. Creating a PIM policy allows for the management of privileged accounts. Creating CPM and PSM policies helps in managing the sessions and connections to the privileged accounts. Adding the account with its properties provides the necessary information for accessing the account. Setting up a directory mapping allows for the integration of the privilege account with the existing directory services.

    Rate this question:

  • 41. 

    If PSM enabled for a specific policy, auditor user can terminate remote session currently active

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    If PSM (Privileged Session Management) is enabled for a specific policy, it means that the auditor user has the ability to terminate a remote session that is currently active. This implies that the auditor user has the necessary privileges and control over the remote sessions to end them if needed. Therefore, the statement "If PSM enabled for a specific policy, auditor user can terminate remote session currently active" is true.

    Rate this question:

  • 42. 

    User with sufficient rights can do following about the privilege account registered

    • A.

      Use the privilege account to directly connect to target system by clicking on connect button

    • B.

      Copy the password for other usage

    • C.

      Change the password by clicking on change button

    • D.

      Verify the password by clicking on verify button

    Correct Answer(s)
    A. Use the privilege account to directly connect to target system by clicking on connect button
    B. Copy the password for other usage
    C. Change the password by clicking on change button
    D. Verify the password by clicking on verify button
    Explanation
    The user with sufficient rights can perform various actions with the privilege account. They can directly connect to the target system by clicking on the connect button, allowing them to access the system. They can also copy the password for other usage, which implies that they can use the password for tasks other than connecting to the target system. Additionally, they can change the password by clicking on the change button, giving them the ability to modify the account's password. Lastly, they can verify the password by clicking on the verify button, ensuring that the password is correct and functional.

    Rate this question:

  • 43. 

    Bring Your Own Clients means

    • A.

      You can use any client to access target system if PSM enabled

    • B.

      You can only use built in client to access target system if PSM enabled

    • C.

      You can use web client to access target system if PSM enabled

    • D.

      PSM is flexible

    • E.

      CyberArk PSM covers more target system type other than others

    Correct Answer(s)
    A. You can use any client to access target system if PSM enabled
    D. PSM is flexible
    E. CyberArk PSM covers more target system type other than others
    Explanation
    The correct answer suggests that "Bring Your Own Clients" means that you can use any client to access the target system if PSM (Privileged Session Management) is enabled. This implies that users have the freedom to choose their preferred client for accessing the target system. Additionally, the answer states that PSM is flexible, indicating that it can adapt to different client preferences. Furthermore, it mentions that CyberArk PSM covers more target system types compared to others, suggesting that it supports a wider range of systems.

    Rate this question:

  • 44. 

    CyberArk PSM has web form capability

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    CyberArk PSM (Privileged Session Manager) does have web form capability. This means that it is capable of recording and replaying user actions on web-based applications, allowing for secure access and management of privileged accounts. With this capability, CyberArk PSM can effectively control and monitor privileged sessions on web platforms, enhancing security and preventing unauthorized access to sensitive information.

    Rate this question:

  • 45. 

    CyberArk PSM has web form capability, what does it mean ?

    • A.

      PSM connector can be integrated into web based application, with a set of conditions

    • B.

      By default PSM web capability only covers html login page with form id, input form for user/password and button name attribute

    • C.

      This statement is wrong

    • D.

      PSM web capability supports web login using Adobe Flash & Java

    Correct Answer(s)
    A. PSM connector can be integrated into web based application, with a set of conditions
    B. By default PSM web capability only covers html login page with form id, input form for user/password and button name attribute
    Explanation
    The correct answer states that PSM connector can be integrated into web-based applications with a set of conditions. By default, PSM web capability only covers HTML login pages with form id, input form for user/password, and button name attribute. This means that PSM can be used to securely manage and control access to web-based applications, specifically focusing on the login process. However, it does not support web login using Adobe Flash and Java.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 15, 2014
    Quiz Created by
    Kyosho
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.