Quiz For Cyberark's Cau302: Defender + Sentry (Over 230 Questions In Quiz Engine)

231 Questions | Attempts: 714
This quiz is now for sale, Click here to buy this quiz
Price : $60.00 USD
Question 1 / 201
🏆 Rank #--
Score 0/100

1. Reports can be scheduled to run on a periodic basis.

Submit
Please wait...
About This Quiz
Quiz For Cyberarks Cau302: Defender + Sentry (Over 230 Questions In Quiz Engine) - Quiz

This quiz engine has be developed by CyberArk Engineers who have PASSED CyberArk's CAU302 (v10) certification exam. Real questions from the CyberArk CAU302 certification exam are developed into this quiz engine so you will be well prepared for the official CyberArk CAU302: Defender + Sentry certification exam.
Each quiz attempt... see moreincludes 80 questions, drawing from 230+ questions in the quiz engine, giving you 180 minutes to complete just like the official certification exam.
With OVER 230 questions in the quiz engine, this is the MOST comprehensive quiz to prepare you for CyberArk's CAU302 Defender + Sentry certification exam. You can take this quiz an UNLIMITED number of times, in order to help better prepare you for the official CyberArk CAU302: Defender + Sentry certification exam hosted by Pearson VUE.
After each attempt of this quiz you will be able to review your results, and many of the questions provide explanations for the correct answer making you feel as though you are being taught by a certified CyberArk instructor.
If you prefer to first attempt the FREE sample quiz, please click here. see less

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. The vault provides a tamper-proof audit trail.

Submit

3. The best practice for storing the Master CD is to store the CD in a secure location, such as a physical safe.

Submit

4. Which CyberArk component changes passwords on Target Devices?

Submit

5. CyberArk recommends two-factor authentication, preferably over RADIUS, for increased Vault security.

Explanation

EXPLANATION for Answer: Please, review CyberArk’s documentation on this topic: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/Security/Security%20Fundamentals-Introduction.htm

Submit

6. Password Vault Web Access is an ASP .NET application, deployed on IIS Server (WebServer).

Submit

7. Remote Desktop Session host needs a client access license (CAL).

Submit

8. Which Built-In group grants access to the ADMINISTRATION page?

Submit

9. Using the SSH Key Manager it is possible to allow CPM to manage SSH Keys similarly to passwords.

Submit

10. PSM captures a record of each command that was executed in Unix.

Submit

11. PSM captures a record of each command that was issued in SQL Plus.

Submit

12. Auto-Detection can be configured to leverage LDAP/S.

Submit

13. Users can be restricted to using certain CyberArk interfaces (e.g. PVWA or PACLI)

Submit

14. The primary purpose of exclusive accounts is to ensure non-repudiation (individual accountability).

Submit

15. One time passwords reduce the risk of Pass the Hash vulnerabilities in Windows.

Submit

16. In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.

Submit

17. The Remote Desktop Services role must be properly licensed by Microsoft.

Submit

18. The vault supports a number of dual factor authentication methods.

Submit

19. A vault admin received an email notification that a password verification process has failed, which service sent the message?

Submit

20. The primary purpose of the PSM server is Password Management.

Submit

21. In the vault each password is encrypted with a unique encryption key.

Submit

22. The CreateCredFile.exe utility is used to create or update a credential file.

Submit

23. CyberArk supports role based access control?

Submit

24. The Privileged Session Manager SSH Proxy (PSMP) should be installed on the Vault server.

Explanation

EXPLANATION for Answer: The PSMP must be installed on a dedicated machine, thus, not shared with other CyberArk products, that has access to the Vault and to the target systems.

Submit

25. DNS must be enabled on the Digital Vault Server.

Explanation

EXPLANATION for Answer: To maintain the security and integrity of the Digital Vault, CyberArk requires complete isolation to prevent Command and Control (C2) channels. Thus, DNS must NOT be enabled on the Digital Vault Server. DNS is known to be used by threat actors as a covert channel to bypass network segmentation and utilize internal resources as an outside interface.

Submit

26. The Digital Vault Server must be built from the original Microsoft installation media, and no third-party software, such as anti-virus or remote management solutions, must be installed.

Explanation

EXPLANATION for Answer: To avoid the potential for untrusted operating system components or the inadvertent introduction of third-party software, it is important that the Digital Vault Server be built from trusted original media. Any third-party software installed on the Digital Vault Server introduces risks not present in a standard, secure configuration. Such risks include: The opening of firewall ports, which introduce additional external attack vectors. Security vulnerabilities, potentially present in any third-party software, can create pivot points and introduce new attack vectors. Operational risks, including an impact to server availability, stemming from conflict between internal components of the Digital Vault and third-party software. Such conflicts often delay troubleshooting, which impacts CyberArk’s support SLAs and increase the time to resolution.

Submit

27. You have associated a logon account to one of your UNIX root accounts in the vault. When attempting to verify the root account's password the CPM will…

Submit

28. The System safe allows access to the Vault configuration files.

Submit

29. The Password upload utility can be used to create safes.

Submit

30. When managing SSH keys, CPM automatically pushes the Public Key to the target system.

Explanation

EXPLANATION for Answer: CPM automatically pushes the Public Key to the target system. CPM automatically pushes the Private Key to the vault. Please, read from CyberArk's website: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/SSHKM/Introduction.htm. Also, see video created by SSH Communications Security, https://youtu.be/ke_M3t_L3iY?t=49.

Submit

31. The Application Inventory report is related to AIM.

Submit

32. Multiple PSM Servers can be load balanced.

Submit

33. What is the purpose of the PrivateArk Database service?

Submit

34. The primary purpose of the CPM is Password Management.

Submit

35. You can change the vault license by uploading the new license to the system safe.

Submit

36. The PrivateArk client allows a user to view the contents of the vault like a filesystem.

Submit

37. The RemoteApp feature of PSM allows seamless Application windows (i.e. the Desktop of the PSM server will not be visible).

Submit

38. Which of the following protocols need to be installed on a standalone vault server?

Submit

39. The AllowedSafes parameter allows a regular expression that lists the safes that the target platform policy can be applied to.

Submit

40. Application inventory is related to AIM.

Submit

41. The Password Upload utility can be used to create safes.

Submit

42. To connect to a Windows server through PVWA, RDP is utilized.

Submit

43. To connect to a Unix server through PVWA, SSH is utilized.

Submit

44. Use the _____ to find and detect all the SSH Keys in your organization, and display the trusts relationships formed by SSH Keys between all the machines in the organization.

Explanation

EXPLANATION for Answer: To learn more, read more about CyberArk's SSH Keys Lifecycle Management.

Submit

45. CyberArk's PrivateArk Command Line Interface (PACLI) can be used to perform quick Vault-level functions without logging in to the PrivateArk client.

Submit

46. If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?

Submit

47. A Reconcile Account can be specified in the platform settings.

Submit

48. In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.

Submit

49. In order to avoid conflicts with the hardening process, third-party applications like Antivirus and Backup Agents should be installed on the Vault server before installing the Vault.

Submit

50. Multiple PVWA servers are always all active.

Submit

51. Tsparm.ini is the main configuration file for the vault.

Submit

52. After a PSM session is complete, the PSM server uploads the recording to the Vault for long-term storage.

Submit

53. What is the name of the account used to establish the initial RDP session from the end user client machine to the PSM server?

Submit

54. With Automatic Installation, you can use the PAS deployment scripts provided with the installation package to automatically install and deploy the Core PAS components on multiple servers, according to your organizational requirements.

Submit

55. Does CyberArk need service accounts on each server to change passwords?

Submit

56. A standalone Vault server requires DNS services to operate properly.

Submit

57. By default, the vault secure protocol uses which IP port and protocol.

Submit

58. In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX systems. What is the best way to allow CPM to manage accounts?

Submit

59. It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.

Submit

60. The Master Account and Master CD should be used only when either the Vault Administrator is locked out or the Vault Administrator has forgotten the password.

Submit

61. One can create exceptions to the Master Policy based on _____________.

Submit

62. What is the purpose of the HeadStartInterval setting in a platform?

Explanation

EXPLANATION for Answer: The number of days before the password expires (according to the ExpirationPeriod parameter) that the CPM will initiate a password change process. This parameter is not relevant if the policy will be applied to a member of the account group.

Submit

63. A Logon Account can be specified in the Master Policy.

Submit

64. Which one of the following reports is NOT generated by using PVWA?

Submit

65. It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.

Submit

66. Which report provides a list of accounts stored in the vault?

Submit

67. When managing SSH keys, CPM automatically pushes the Private Key to all target systems that use it.

Explanation

EXPLANATION for Answer: FALSE, because even though CPM automatically pushes the Private Key it is NEVER to the target system. Rather, the CPM automatically pushes the Private Key to the vault. Please, read from CyberArk's website: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/SSHKM/Introduction.htm. Also, see video created by SSH Communications Security, https://youtu.be/ke_M3t_L3iY?t=49.

Submit

68. It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.

Submit

69. What conditions must be met in order to log into the Vault as the Master user? (select all that apply)

Submit

70. CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.

Submit

71. To on-board Linux accounts using the Account Discovery utility, a CSV file can be uploaded.

Submit

72. Within the Vault each password is encrypted by

Submit

73. Prior to v10.7, which is the correct order of installation for PAS (Privileged Account Security) components?

Submit

74. PSM requires the Remote Desktop Session Host role service.

Submit

75. What is the purpose of the CyberArk Event Notification Engine service?

Submit

76. The vault server uses a modified version of the Microsoft Windows firewall service.

Explanation

EXPLANATION for Answer: The firewall rules can be modified through Windows Firewall service. To more rigorously monitor the firewall rules parameter MonitorFWRulesInterval can be added to the dbparm.ini file

Submit

77. What is the purpose of the PrivateArk Server service?

Submit

78. Parameters for the SIEM path is in the DBParm.ini.

Submit

79. What is the purpose of the password Reconcile process?

Submit

80. Which of these is not a report generated by the PVWA:

Submit

81. To connect to a Windows server through PVWA, SSH is utilized.

Explanation

EXPLANATION for Answer: To connect to a Windows server through PVWA it does so using RDP, NOT SSH. SSH is used to connect to a Unix server.

Submit

82. Due to the complexity of controlling and managing SSH Keys they pose an even greater risk than unmanaged privileged passwords.

Submit

83. Users within the PSMLiveSessions safe may view the PSM live monitoring feature in an environment with multiple PVWAs.

Submit

84. Dual Control is one of the foundations of Information Security as it is based upon the premise that, for a breach to be committed, then both parties would need to be in collusion and, because one should always alternate the pairs of people, it would require a much greater level of corruption in order to breach dual control procedures.

Submit

85. Users who have the 'Access Safe without confirmation' safe permission on a safe where accounts are configured for Dual Control, still need to request approval to use the account.

Submit

86. In Accounts Discovery, you can configure a Windows discovery to scan ______________.

Submit

87. Target account platforms can be restricted to accounts that are stored in specific Safes using the AllowedSafes property.

Submit

88. A Reconcile Account can be specified in the Master Policy.

Submit

89. The vault does NOT support Role Based Access Control.

Submit

90. Interval is the number of minutes that the CPM waits between loops when processing accounts associated with this platform.

Submit

91. During LDAP/S integration you should specify the Fully Qualified Domain Name (FQDN) of the Domain Controller.

Submit

92. Typically, Access control is implemented by the safes.

Submit

93. The vault server requires WINS services to work properly.

Explanation

EXPLANATION for Answer: Windows Internet Name Service (WINS) is a legacy computer name registration and resolution service that maps computer NetBIOS names to IP addresses. If you do not already have WINS deployed on your network, do not deploy WINS on the Vault Server.

Submit

94. The security of the Vault Server is entirely dependent on the security of the network.

Submit

95. The DR Vault is pingable when the CyberArk Disaster Recovery service is running.

Submit

96. The purpose of the password change process is to change the password according to organizational requirements.

Submit

97. The purpose of the password verification is to verify CyberArk is storing credentials correctly.

Submit

98. SIEM integration is a powerful tool to correlate Privileged Accounts and Privileged Activity.

Explanation

EXPLANATION for Answer: Please, read CyberArk’s documentation on this topic: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Integrating-with-SIEM-Applications.htm?Highlight=siem

Submit

99. What is the purpose of the Activity Log?

Submit

100. The Dbparm.ini file, in the Server\Conf installation folder, contains the general parameters of the Vault database.

Submit

101. It is not possible to use the Microsoft Windows native client, Remote Desktop Connection, for RDP to target server.

Explanation

EXPLANATION for Answer: It is possible to use the Microsoft Windows native client, Remote Desktop Connection, for RDP to a target server when a property value is properly configured. DisableRemoteApp needs to be set to No. To do this, login to PVWA and click Administration. Go to Options, and search for DisableRemoteApp, then update property value to No.

Submit

102. What is the maximum number of levels of authorizations you can set up in Dual Control?

Submit

103. If a user is a member of more than one group that has authorizations on a safe, by default that user is granted _______________.

Submit

104. Which of the following options is NOT set in the Master Policy?

Submit

105. When managing SSH keys, CPM automatically stores the Private Key:

Explanation

EXPLANATION for Answer: Please, read from CyberArk's website: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/SSHKM/Introduction.htm. Also, see video created by SSH Communications Security, https://youtu.be/ke_M3t_L3iY?t=49 .

Submit

106. ImmediateInterval is the number of minutes that will elapse between when the user initiates an account management process and when the process is performed.

Submit

107. In an SMTP integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SMTP server address(es).

Submit

108. The vault internal safe contains the configuration for an LDAP integration.

Submit

109. When a DR vault server becomes an active vault, it will automatically fail back to the original state once the primary vault comes back online.

Submit

110. A Vault Administrator wants to change the PSM Server ID to comply with a naming standard, what is the process for changing the PSM Server ID?

Submit

111. You can connect to remote systems and applications without knowing or specifying the required password or key?

Explanation

EXPLANATION for Answer: It is possible with Privileged Single Sign-On.

Submit

112. You can install the HTML5 Gateway for PSM on a dedicated machine or on the same machine as PSM for SSH.

Explanation

EXPLANATION for Answer: See CyberArk’s documentation on this topic: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Install_PSM_HTML5.htm

Submit

113. At what point is a transparent user provisioned in the vault?

Submit

114. Which default vault user is automatically able to access any safe?

Submit

115. What is the purpose of the Entitlement Report?

Submit

116. Vault firewall rules can never be modified once applied.

Explanation

EXPLANATION for Answer: Yes, the firewall rules can be modified through Windows Firewall service. To more rigorously monitor the firewall rules parameter MonitorFWRulesInterval can be added to the dbparm.ini file.EXPLANATION for Answer: Yes, the firewall rules can be modified through the dbparm.ini file.

Submit

117. It is impossible to override Master Policy settings for a Platform.

Explanation

EXPLANATION of Answer: It is possible to override the Master Policy through an exception.

Submit

118. Which user is automatically given all Safe authorizations on all Safes?

Submit

119. HA, DR, Replicate are mutually exclusive and cannot be used in the same environment.

Explanation

EXPLANATION for Answer: While each of the components are mutually exclusive they CAN be used in the same environment.

Submit

120. A Logon Account can be specified in the Platform settings.

Submit

121. The replicate module allows an integration with Enterprise Backup Software.

Submit

122. What would be a good use case for a High Availability vault?

Submit

123. Which file can be used to help monitor firewall rule changes for the vault server?

Explanation

EXPLANATION for Answer: The firewall rules can be modified through Windows Firewall service. To more rigorously monitor the firewall rules parameter MonitorFWRulesInterval can be added to the dbparm.ini file.

Submit

124. When a safe is restricted for use during certain times a Vault Admin can still use the safe during those restricted times.

Submit

125. There are 2 types of backups: Continuous and Intermediate.

Explanation

EXPLANATION for Answer: There are only 2 types of backups, however they are not called Continuous and Intermediate. One of the backups is Indirect backup, and is the recommended backup. Indirect backup is an install of the Replicate Utility in any of the Node - PSM, PVWA, CPM .. any domain server which is reachable to vault. The other backup is called a Direct backup, and is an install of the Replicate Utility directly on Vault Server.

Submit

126. As long as you are a member of the Vault Admins group you can grant any permission on any safe?

Explanation

EXPLANATION for Answer: Being in Vault admins group only give you access to safes which are created during installation (safe created during installation process ) - This is clearly mentioned in documents.

Submit

127. It is possible to restrict the time of day, or day of week that password reconcile process occurs is managed in _______________.

Submit

128. What conditions must be met in order to log into the vault as the Master user? (select all that apply)

Submit

129. The vault does support Role Based Access Control.

Submit

130. Account Discovery utility can be used to perform a scan for all domain joined Windows systems, and each account identified can be automatically on-boarded.

Submit

131. When attempting to connect to a platform and the connect button is NOT enabled (v10) or you receive error message "Java is not enabled on your browser" (v9), to connect you likely need to first update the Master Policy setting "Require privileged session monitoring and isolation" to Active.

Submit

132. It is possible for an Auditor to watch PSM sessions in real time.

Submit

133. The default authorizations on a safe allow the user to delete an account.

Submit

134. What is the primary reason for installing more than 1 active CPM?

Submit

135. The TSParm.ini file, in the Server\Conf installation folder, contains the list of directories that can store Safes databases.

Submit

136. What value should be used in the field named Address to configure an LDAP connection through PVWA? Select the best answer.

Submit

137. Restricting the time of day, or day of week that a password change occurs is managed in _______________.

Submit

138. In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?

Submit

139. Which CyberArk components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts?

Submit

140. Name two ways of viewing the ITAlog:

Submit

141. Multiple PVWA servers provide automatic load balancing.

Explanation

EXPLANATION for Answer: While multiple PVWA servers can be load balanced, it requires a manual configuration and is not automatic.

Submit

142. Which of the following are supported authentication methods for CyberArk. Check all that apply.

Submit

143. A SIEM integration allows you to forward audit records to a monitoring solution.

Submit

144. When attempting to login to a linux server and it does NOT permit root account login, PermitRootLogin=No, use the Reconcile Account feature to seamlessly overcome the issue.

Explanation

EXPLANATION for Answer: The Logon Account feature should be used to associate a logon account with the root account. The Reconcile Account feature is for when a primary account’s password is either not reconcilable or not known, so a secondary account that has more permissions is associated with the primary account and has permissions to reconcile the primary accounts password between the vault and the target system.

Submit

145. Once the object level access control setting is checked, it can be unchecked at a later time.

Submit

146. To setup LDAP go to:

Submit

147. PSM offers: (select all that apply)

Explanation

EXPLANATION for Answer: Videos are stored for retrieval ONLY after the real-time recording has concluded.

Submit

148. Which report can be generated in both PVWA and PrivateArk?

Explanation

EXPLANATION for Answer: See CyberArk’s documentation: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Auditing-sessions.htm

Submit

149. Restricting the time of day, or day of week that a password verify process occurs is managed in _______________.

Submit

150. When on-boarding accounts using Account Feed, which of the following is true?

Submit

151. Which file would you modify to configure your vault Server to forward Activity Logs to a SIEM or SYSLOG server.

Submit

152. You are successfully managing passwords in the alpha.cyberark com domain; however when you attempt to manage a password in the beta.cyberark.com domain, you receive the 'network path not found* error What should you check first?

Submit

153. The connect button requires PSM to work.

Submit

154. The Administrator user has all vault authorizations but no access to data by default.

Submit

155. VAULT authorizations may be granted to ________________. (select all that apply.)

Submit

156. Which report could show all audit data in the vault?

Submit

157. For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.

Submit

158. What is the name of the Platform parameter that controls how long a password will stay valid when One Time Passwords are enabled via the Master Policy?

Explanation

EXPLANATION for Answer: MinValidityPeriod -The number of minutes to wait from the last retrieval of the password until it is replaced. This gives the user a minimum period to be able to use the password before it is replaced. Use -1 to ignore this property. This parameter is also used to release exclusive accounts automatically.

Submit

159. Which of the following files must be created or configured in order to run Password Upload Utility?

Submit

160. The Vault supports multiple instances of the following components. Choose all that apply.

Submit

161. The Vault needs to send SNMP traps to an SNMP solution. In which configuration file do you set the IP address of the SNMP solution?

Submit

162. The default authorization on a safe allow a user to store a new account.

Submit

163. Which file would you modify to configure the vault to send SNMP traps to your monitoring solution?

Submit

164. If a transparent user matches two different directory mappings, how does the system determine which user template to use?

Submit

165. What would be a good use case for the Disaster Recovery module?

Submit

166. The vault allows the use of Subnet Role Based Permissions?

Submit

167. What is the purpose of the Privileged Accounts Compliance Status?

Submit

168. To apply a new license file you must:

Submit

169. A server that has NOT yet been on-boarded with the Vault can NOT be connected to using PSM.

Explanation

EXPLANATION for Answer: Through the Secure Connect feature, servers that are NOT yet on-boarded to the Vault can be accessed by PSM.

Submit

170. Ad-Hoc Access (formerly Secure Connect) provides the following features. (select all that apply)

Submit

171. Platform settings are applied to _______________.

Submit

172. When managing SSH keys, CPM automatically stores the Public Key:

Explanation

EXPLANATION for Answer: Please, read from CyberArk's website: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/SSHKM/Introduction.htm . Also, see video created by SSH Communications Security, https://youtu.be/ke_M3t_L3iY?t=49 .

Submit

173. Beginning with v10.7, which is the correct order of installation for PAS (Privileged Account Security) components?

Explanation

NOTE: See documentation from CyberArk webpage: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/InstallationOverview.htm

Submit

174. What are the operating system prerequisites for installing CPM? (select all that apply)

Submit

175. SAFE authorizations may be granted to ________________. (select all that apply.)

Submit

176. Which of the following are prerequisites for installing PVWA. Check all that Apply.

Submit

177. PSM generates recordings on the Vault server in real time.

Submit

178. It is possible for a vault admin to access a safe at a restricted time.

Submit

179. For a user who is logged into PVWA and receives error message "ITATS006E Station is suspended for User .", the recommended action is to:

Submit

180. If Vault Administrator has forgotten the password or is locked out and the Master Account and/or Master CD are forgotten/lost, there is no way to regain Administrative access to the PAS.

Explanation

EXPLANATION for Answer: CyberArk Professional Services Team, for a fee, can reset the passwords of both the Administrator and Master account.

Submit

181. CyberArk recommends DNA (Discovery and Audit) scans once a ____________ to discover unprotected backdoors.

Submit

182. Which of the following statements are NOT true when enabling PSM recording for a target Windows server? (select all that apply)

Submit

183. The DR module allows an integration with Enterprise Backup software.

Submit

184. Which one of the built-in Vault users is not automatically added to the safe when it is first created in PVWA?

Explanation

EXPLANATION for Answer: Vault Admin is automatically added to safes created during the installation process, however post-installation all newly created safes, created via PVWA, are NOT automatically added to the safe.

Submit

185. The vault internal safe contains all of the configuration for the vault.

Submit

186. Which CyberArk component requires disabling the Data Execution Prevention (DEP) so that none of the features within will be hindered?

Submit

187. Multiple Vault servers can be load balanced.

Explanation

EXPLANATION for Answer: Through Disaster Recovery (DR) configurations Satellite Vaults servers can and should be established, however, there is no “load balancing” between vaults.

Submit

188. When using the CyberArk Cluster, the following are running on the passive vault(s):

Explanation

EXPLANATION for Answer: Please, read CyberArk’s documentation on this topic https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Installing-the-CyberArk-Cluster-Vault-on-Distributed-Vaults.htm

Submit

189. Which CyberArk component permits the use of Subnet Mask?

Explanation

EXPLANATION for Answer: Please, review CyberArk’s documentation on this topic: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Configuring-a-Subnet-Mask.htm

Submit

190. Which utilities could you use to change debugging levels on the vault without having to restart the vault. (select all that apply)

Explanation

EXPLANATION for Answer: PAR-Private Ark Remote Control Agent allows you to perform several Vault admin tasks (without restarting the Vault) and view machine statistics.

Submit

191. An SMTP integration allows you to forward audit records to a monitoring solution.

Explanation

EXPLANATION for Answer: While the SMTP canNOT forward audit records to a monitoring solution, a SIEM integration can.

Submit

192. After firewall rules are applied to the vault, can they be modified?

Explanation

EXPLANATION for Answer: Yes, the firewall rules can be modified through Windows Firewall service. To more rigorously monitor the firewall rules parameter MonitorFWRulesInterval can be added to the dbparm.ini file.

Submit

193. To update a license, upload it to the system safe and then you must restart the PrivateArk service.

Explanation

EXPLANATION for Answer: It is NOT necessary to restart the PrivateArk service when ONLY the license file is updated.

Submit

194. What would be a good use case for the Replicate Module?

Submit

195. All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UNIXAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group OperationsStaff need to be able to use the show, copy, and connect buttons on those passwords on an emergency basis, but only with the approval of a member of OperationsManagers. The members of OperationsManagers never need to be able to use the show, copy or connect buttons themselves. Which safe permissions do you need to grant to OperationsStaff. Check all that apply.

Submit

196. Which files govern the password upload utility:

Submit

197. The Timeout setting is defined as:

Submit

198. When on-boarding a Satellite Vault you must update ____________.

Explanation

EXPLANATION for Answer: Please, read CyberArk’s documentation on this topic: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Installing-the-CyberArk-Satellite-Vault.htm?Highlight=satellite.ini

Submit

199. Match the following Privileged Access Workflow definitions to their respective terms.

Submit

200. Auto-Detection is NOT recommended for use, because it forces each discovered server to on-board all discovered accounts even though NOT all accounts need to be on-boarded.

Explanation

EXPLANATION: Auto-Detection should NOT be utilized, instead CyberArk recommends using a more capable product called Accounts Discovery which provides the functionality to or not to on-board an account.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Reports can be scheduled to run on a periodic basis.
The vault provides a tamper-proof audit trail.
The best practice for storing the Master CD is to store the CD in a...
Which CyberArk component changes passwords on Target Devices?
CyberArk recommends two-factor authentication, preferably over RADIUS,...
Password Vault Web Access is an ASP .NET application, deployed on IIS...
Remote Desktop Session host needs a client access license (CAL).
Which Built-In group grants access to the ADMINISTRATION page?
Using the SSH Key Manager it is possible to allow CPM to manage SSH...
PSM captures a record of each command that was executed in Unix.
PSM captures a record of each command that was issued in SQL Plus.
Auto-Detection can be configured to leverage LDAP/S.
Users can be restricted to using certain CyberArk interfaces (e.g....
The primary purpose of exclusive accounts is to ensure non-repudiation...
One time passwords reduce the risk of Pass the Hash vulnerabilities in...
In order to retrieve data from the vault a user MUST use an interface...
The Remote Desktop Services role must be properly licensed by...
The vault supports a number of dual factor authentication methods.
A vault admin received an email notification that a password...
The primary purpose of the PSM server is Password Management.
In the vault each password is encrypted with a unique encryption key.
The CreateCredFile.exe utility is used to create or update a...
CyberArk supports role based access control?
The Privileged Session Manager SSH Proxy (PSMP) should be installed on...
DNS must be enabled on the Digital Vault Server.
The Digital Vault Server must be built from the original Microsoft...
You have associated a logon account to one of your UNIX root accounts...
The System safe allows access to the Vault configuration files.
The Password upload utility can be used to create safes.
When managing SSH keys, CPM automatically pushes the Public Key to the...
The Application Inventory report is related to AIM.
Multiple PSM Servers can be load balanced.
What is the purpose of the PrivateArk Database service?
The primary purpose of the CPM is Password Management.
You can change the vault license by uploading the new license to the...
The PrivateArk client allows a user to view the contents of the vault...
The RemoteApp feature of PSM allows seamless Application windows (i.e....
Which of the following protocols need to be installed on a standalone...
The AllowedSafes parameter allows a regular expression that lists the...
Application inventory is related to AIM.
The Password Upload utility can be used to create safes.
To connect to a Windows server through PVWA, RDP is utilized.
To connect to a Unix server through PVWA, SSH is utilized.
Use the _____ to find and detect all the SSH Keys in your...
CyberArk's PrivateArk Command Line Interface (PACLI) can be...
If a password is changed manually on a server, bypassing the CPM, how...
A Reconcile Account can be specified in the platform settings.
In order to retrieve data from the vault a user MUST use an interface...
In order to avoid conflicts with the hardening process, third-party...
Multiple PVWA servers are always all active.
Tsparm.ini is the main configuration file for the vault.
After a PSM session is complete, the PSM server uploads the recording...
What is the name of the account used to establish the initial RDP...
With Automatic Installation, you can use the PAS deployment scripts...
Does CyberArk need service accounts on each server to change...
A standalone Vault server requires DNS services to operate properly.
By default, the vault secure protocol uses which IP port and protocol.
In accordance with best practice, SSH access is denied for root...
It is possible to leverage DNA to provide discovery functions that are...
The Master Account and Master CD should be used only when either the...
One can create exceptions to the Master Policy based on _____________.
What is the purpose of the HeadStartInterval setting in a platform?
A Logon Account can be specified in the Master Policy.
Which one of the following reports is NOT generated by using PVWA?
It is possible to leverage DNA to provide discovery functions that are...
Which report provides a list of accounts stored in the vault?
When managing SSH keys, CPM automatically pushes the Private Key to...
It is possible to disable the Show and Copy buttons without removing...
What conditions must be met in order to log into the Vault as the...
CyberArk implements license limits by controlling the number and types...
To on-board Linux accounts using the Account Discovery utility, a CSV...
Within the Vault each password is encrypted by
Prior to v10.7, which is the correct order of installation for PAS...
PSM requires the Remote Desktop Session Host role service.
What is the purpose of the CyberArk Event Notification Engine service?
The vault server uses a modified version of the Microsoft Windows...
What is the purpose of the PrivateArk Server service?
Parameters for the SIEM path is in the DBParm.ini.
What is the purpose of the password Reconcile process?
Which of these is not a report generated by the PVWA:
To connect to a Windows server through PVWA, SSH is utilized.
Due to the complexity of controlling and managing SSH Keys they pose...
Users within the PSMLiveSessions safe may view the PSM live monitoring...
Dual Control is one of the foundations of Information Security as it...
Users who have the 'Access Safe without confirmation' safe permission...
In Accounts Discovery, you can configure a Windows discovery to scan...
Target account platforms can be restricted to accounts that are stored...
A Reconcile Account can be specified in the Master Policy.
The vault does NOT support Role Based Access Control.
Interval is the number of minutes that the CPM waits between loops...
During LDAP/S integration you should specify the Fully Qualified...
Typically, Access control is implemented by the safes.
The vault server requires WINS services to work properly.
The security of the Vault Server is entirely dependent on the security...
The DR Vault is pingable when the CyberArk Disaster Recovery service...
The purpose of the password change process is to change the password...
The purpose of the password verification is to verify CyberArk is...
SIEM integration is a powerful tool to correlate Privileged Accounts...
What is the purpose of the Activity Log?
The Dbparm.ini file, in the Server\Conf installation folder, contains...
It is not possible to use the Microsoft Windows native client, Remote...
What is the maximum number of levels of authorizations you can set up...
If a user is a member of more than one group that has authorizations...
Which of the following options is NOT set in the Master Policy?
When managing SSH keys, CPM automatically stores the Private Key:
ImmediateInterval is the number of minutes that will elapse between...
In an SMTP integration it is recommended to use the fully-qualified...
The vault internal safe contains the configuration for an LDAP...
When a DR vault server becomes an active vault, it will automatically...
A Vault Administrator wants to change the PSM Server ID to comply with...
You can connect to remote systems and applications without knowing or...
You can install the HTML5 Gateway for PSM on a dedicated machine or on...
At what point is a transparent user provisioned in the vault?
Which default vault user is automatically able to access any safe?
What is the purpose of the Entitlement Report?
Vault firewall rules can never be modified once applied.
It is impossible to override Master Policy settings for a Platform.
Which user is automatically given all Safe authorizations on all...
HA, DR, Replicate are mutually exclusive and cannot be used in the...
A Logon Account can be specified in the Platform settings.
The replicate module allows an integration with Enterprise Backup...
What would be a good use case for a High Availability vault?
Which file can be used to help monitor firewall rule changes for the...
When a safe is restricted for use during certain times a Vault Admin...
There are 2 types of backups: Continuous and Intermediate.
As long as you are a member of the Vault Admins group you can grant...
It is possible to restrict the time of day, or day of week that...
What conditions must be met in order to log into the vault as the...
The vault does support Role Based Access Control.
Account Discovery utility can be used to perform a scan for all domain...
When attempting to connect to a platform and the connect button is NOT...
It is possible for an Auditor to watch PSM sessions in real time.
The default authorizations on a safe allow the user to delete an...
What is the primary reason for installing more than 1 active CPM?
The TSParm.ini file, in the Server\Conf installation folder, contains...
What value should be used in the field named Address to configure an...
Restricting the time of day, or day of week that a password change...
In order to connect to a target device through PSM, the account...
Which CyberArk components or products can be used to discover Windows...
Name two ways of viewing the ITAlog:
Multiple PVWA servers provide automatic load balancing.
Which of the following are supported authentication methods for...
A SIEM integration allows you to forward audit records to a monitoring...
When attempting to login to a linux server and it does NOT permit root...
Once the object level access control setting is checked, it can be...
To setup LDAP go to:
PSM offers: (select all that apply)
Which report can be generated in both PVWA and PrivateArk?
Restricting the time of day, or day of week that a password verify...
When on-boarding accounts using Account Feed, which of the following...
Which file would you modify to configure your vault Server to forward...
You are successfully managing passwords in the alpha.cyberark com...
The connect button requires PSM to work.
The Administrator user has all vault authorizations but no access to...
VAULT authorizations may be granted to ________________. (select all...
Which report could show all audit data in the vault?
For an account attached to a platform that requires Dual Control based...
What is the name of the Platform parameter that controls how long a...
Which of the following files must be created or configured in order to...
The Vault supports multiple instances of the following components....
The Vault needs to send SNMP traps to an SNMP solution. In which...
The default authorization on a safe allow a user to store a new...
Which file would you modify to configure the vault to send SNMP traps...
If a transparent user matches two different directory mappings, how...
What would be a good use case for the Disaster Recovery module?
The vault allows the use of Subnet Role Based Permissions?
What is the purpose of the Privileged Accounts Compliance Status?
To apply a new license file you must:
A server that has NOT yet been on-boarded with the Vault can NOT be...
Ad-Hoc Access (formerly Secure Connect) provides the following...
Platform settings are applied to _______________.
When managing SSH keys, CPM automatically stores the Public Key:
Beginning with v10.7, which is the correct order of installation for...
What are the operating system prerequisites for installing CPM?...
SAFE authorizations may be granted to ________________. (select all...
Which of the following are prerequisites for installing PVWA. Check...
PSM generates recordings on the Vault server in real time.
It is possible for a vault admin to access a safe at a restricted...
For a user who is logged into PVWA and receives error message...
If Vault Administrator has forgotten the password or is locked out and...
CyberArk recommends DNA (Discovery and Audit) scans once a...
Which of the following statements are NOT true when enabling PSM...
The DR module allows an integration with Enterprise Backup software.
Which one of the built-in Vault users is not automatically added to...
The vault internal safe contains all of the configuration for the...
Which CyberArk component requires disabling the Data Execution...
Multiple Vault servers can be load balanced.
When using the CyberArk Cluster, the following are running on the...
Which CyberArk component permits the use of Subnet Mask?
Which utilities could you use to change debugging levels on the vault...
An SMTP integration allows you to forward audit records to a...
After firewall rules are applied to the vault, can they be modified?
To update a license, upload it to the system safe and then you must...
What would be a good use case for the Replicate Module?
All of your Unix root passwords are stored in the safe UnixRoot. Dual...
Which files govern the password upload utility:
The Timeout setting is defined as:
When on-boarding a Satellite Vault you must update ____________.
Match the following Privileged Access Workflow definitions to their...
Auto-Detection is NOT recommended for use, because it forces each...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!