Quiz For Cyberark's Cau302: Defender + Sentry (Over 230 Questions In Quiz Engine)

231 Questions | Attempts: 714
Share
This quiz is now for sale, Click here to buy this quiz
Price : $60.00 USD
Question 1 / 200
0 %
0/100
Score 0/100
1. Reports can be scheduled to run on a periodic basis.
Submit
Please wait...
About This Quiz
Quiz For Cyberarks Cau302: Defender + Sentry (Over 230 Questions In Quiz Engine) - Quiz

This quiz engine has be developed by CyberArk Engineers who have PASSED CyberArk's CAU302 (v10) certification exam. Real questions from the CyberArk CAU302 certification exam are developed into this quiz engine so you will be well prepared for the official CyberArk CAU302: Defender + Sentry certification exam.
Each quiz attempt... see moreincludes 80 questions, drawing from 230+ questions in the quiz engine, giving you 180 minutes to complete just like the official certification exam.
With OVER 230 questions in the quiz engine, this is the MOST comprehensive quiz to prepare you for CyberArk's CAU302 Defender + Sentry certification exam. You can take this quiz an UNLIMITED number of times, in order to help better prepare you for the official CyberArk CAU302: Defender + Sentry certification exam hosted by Pearson VUE.
After each attempt of this quiz you will be able to review your results, and many of the questions provide explanations for the correct answer making you feel as though you are being taught by a certified CyberArk instructor.
If you prefer to first attempt the FREE sample quiz, please click here. see less

Personalize your quiz and earn a certificate with your name on it!
2. The vault provides a tamper-proof audit trail.
Submit
3. The best practice for storing the Master CD is to store the CD in a secure location, such as a physical safe.
Submit
4. Which CyberArk component changes passwords on Target Devices?
Submit
5. CyberArk recommends two-factor authentication, preferably over RADIUS, for increased Vault security.

Explanation

EXPLANATION for Answer: Please, review CyberArk’s documentation on this topic: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/Security/Security%20Fundamentals-Introduction.htm

Submit
6. Password Vault Web Access is an ASP .NET application, deployed on IIS Server (WebServer).
Submit
7. Remote Desktop Session host needs a client access license (CAL).
Submit
8. Which Built-In group grants access to the ADMINISTRATION page?
Submit
9. Using the SSH Key Manager it is possible to allow CPM to manage SSH Keys similarly to passwords.
Submit
10. PSM captures a record of each command that was executed in Unix.
Submit
11. PSM captures a record of each command that was issued in SQL Plus.
Submit
12. Auto-Detection can be configured to leverage LDAP/S.
Submit
13. Users can be restricted to using certain CyberArk interfaces (e.g. PVWA or PACLI)
Submit
14. The primary purpose of exclusive accounts is to ensure non-repudiation (individual accountability).
Submit
15. One time passwords reduce the risk of Pass the Hash vulnerabilities in Windows.
Submit
16. In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.
Submit
17. The Remote Desktop Services role must be properly licensed by Microsoft.
Submit
18. The vault supports a number of dual factor authentication methods.
Submit
19. A vault admin received an email notification that a password verification process has failed, which service sent the message?
Submit
20. The primary purpose of the PSM server is Password Management.
Submit
21. In the vault each password is encrypted with a unique encryption key.
Submit
22. The CreateCredFile.exe utility is used to create or update a credential file.
Submit
23. CyberArk supports role based access control?
Submit
24. The Privileged Session Manager SSH Proxy (PSMP) should be installed on the Vault server.

Explanation

EXPLANATION for Answer: The PSMP must be installed on a dedicated machine, thus, not shared with other CyberArk products, that has access to the Vault and to the target systems.

Submit
25. DNS must be enabled on the Digital Vault Server.

Explanation

EXPLANATION for Answer: To maintain the security and integrity of the Digital Vault, CyberArk requires complete isolation to prevent Command and Control (C2) channels. Thus, DNS must NOT be enabled on the Digital Vault Server. DNS is known to be used by threat actors as a covert channel to bypass network segmentation and utilize internal resources as an outside interface.

Submit
26. The Digital Vault Server must be built from the original Microsoft installation media, and no third-party software, such as anti-virus or remote management solutions, must be installed.

Explanation

EXPLANATION for Answer: To avoid the potential for untrusted operating system components or the inadvertent introduction of third-party software, it is important that the Digital Vault Server be built from trusted original media. Any third-party software installed on the Digital Vault Server introduces risks not present in a standard, secure configuration. Such risks include: The opening of firewall ports, which introduce additional external attack vectors. Security vulnerabilities, potentially present in any third-party software, can create pivot points and introduce new attack vectors. Operational risks, including an impact to server availability, stemming from conflict between internal components of the Digital Vault and third-party software. Such conflicts often delay troubleshooting, which impacts CyberArk’s support SLAs and increase the time to resolution.

Submit
27. You have associated a logon account to one of your UNIX root accounts in the vault. When attempting to verify the root account's password the CPM will…
Submit
28. The System safe allows access to the Vault configuration files.
Submit
29. The Password upload utility can be used to create safes.
Submit
30. When managing SSH keys, CPM automatically pushes the Public Key to the target system.

Explanation

EXPLANATION for Answer: CPM automatically pushes the Public Key to the target system. CPM automatically pushes the Private Key to the vault. Please, read from CyberArk's website: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/SSHKM/Introduction.htm. Also, see video created by SSH Communications Security, https://youtu.be/ke_M3t_L3iY?t=49.

Submit
31. The Application Inventory report is related to AIM.
Submit
32. Multiple PSM Servers can be load balanced.
Submit
33. What is the purpose of the PrivateArk Database service?
Submit
34. The primary purpose of the CPM is Password Management.
Submit
35. You can change the vault license by uploading the new license to the system safe.
Submit
36. The PrivateArk client allows a user to view the contents of the vault like a filesystem.
Submit
37. The RemoteApp feature of PSM allows seamless Application windows (i.e. the Desktop of the PSM server will not be visible).
Submit
38. Which of the following protocols need to be installed on a standalone vault server?
Submit
39. The AllowedSafes parameter allows a regular expression that lists the safes that the target platform policy can be applied to.
Submit
40. Application inventory is related to AIM.
Submit
41. The Password Upload utility can be used to create safes.
Submit
42. To connect to a Windows server through PVWA, RDP is utilized.
Submit
43. To connect to a Unix server through PVWA, SSH is utilized.
Submit
44. Use the _____ to find and detect all the SSH Keys in your organization, and display the trusts relationships formed by SSH Keys between all the machines in the organization.

Explanation

EXPLANATION for Answer: To learn more, read more about CyberArk's SSH Keys Lifecycle Management.

Submit
45. CyberArk's PrivateArk Command Line Interface (PACLI) can be used to perform quick Vault-level functions without logging in to the PrivateArk client.
Submit
46. If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?
Submit
47. A Reconcile Account can be specified in the platform settings.
Submit
48. In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.
Submit
49. In order to avoid conflicts with the hardening process, third-party applications like Antivirus and Backup Agents should be installed on the Vault server before installing the Vault.
Submit
50. Multiple PVWA servers are always all active.
Submit
51. Tsparm.ini is the main configuration file for the vault.
Submit
52. After a PSM session is complete, the PSM server uploads the recording to the Vault for long-term storage.
Submit
53. What is the name of the account used to establish the initial RDP session from the end user client machine to the PSM server?
Submit
54. With Automatic Installation, you can use the PAS deployment scripts provided with the installation package to automatically install and deploy the Core PAS components on multiple servers, according to your organizational requirements.
Submit
55. Does CyberArk need service accounts on each server to change passwords?
Submit
56. A standalone Vault server requires DNS services to operate properly.
Submit
57. By default, the vault secure protocol uses which IP port and protocol.
Submit
58. In accordance with best practice, SSH access is denied for root accounts on UNIX/LINUX systems. What is the best way to allow CPM to manage accounts?
Submit
59. It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.
Submit
60. The Master Account and Master CD should be used only when either the Vault Administrator is locked out or the Vault Administrator has forgotten the password.
Submit
61. One can create exceptions to the Master Policy based on _____________.
Submit
62. What is the purpose of the HeadStartInterval setting in a platform?

Explanation

EXPLANATION for Answer: The number of days before the password expires (according to the ExpirationPeriod parameter) that the CPM will initiate a password change process. This parameter is not relevant if the policy will be applied to a member of the account group.

Submit
63. A Logon Account can be specified in the Master Policy.
Submit
64. Which one of the following reports is NOT generated by using PVWA?
Submit
65. It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.
Submit
66. Which report provides a list of accounts stored in the vault?
Submit
67. When managing SSH keys, CPM automatically pushes the Private Key to all target systems that use it.

Explanation

EXPLANATION for Answer: FALSE, because even though CPM automatically pushes the Private Key it is NEVER to the target system. Rather, the CPM automatically pushes the Private Key to the vault. Please, read from CyberArk's website: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/SSHKM/Introduction.htm. Also, see video created by SSH Communications Security, https://youtu.be/ke_M3t_L3iY?t=49.

Submit
68. It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.
Submit
69. What conditions must be met in order to log into the Vault as the Master user? (select all that apply)
Submit
70. CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.
Submit
71. To on-board Linux accounts using the Account Discovery utility, a CSV file can be uploaded.
Submit
72. Within the Vault each password is encrypted by
Submit
73. Prior to v10.7, which is the correct order of installation for PAS (Privileged Account Security) components?
Submit
74. PSM requires the Remote Desktop Session Host role service.
Submit
75. What is the purpose of the CyberArk Event Notification Engine service?
Submit
76. The vault server uses a modified version of the Microsoft Windows firewall service.

Explanation

EXPLANATION for Answer: The firewall rules can be modified through Windows Firewall service. To more rigorously monitor the firewall rules parameter MonitorFWRulesInterval can be added to the dbparm.ini file

Submit
77. What is the purpose of the PrivateArk Server service?
Submit
78. Parameters for the SIEM path is in the DBParm.ini.
Submit
79. What is the purpose of the password Reconcile process?
Submit
80. Which of these is not a report generated by the PVWA:
Submit
81. To connect to a Windows server through PVWA, SSH is utilized.

Explanation

EXPLANATION for Answer: To connect to a Windows server through PVWA it does so using RDP, NOT SSH. SSH is used to connect to a Unix server.

Submit
82. Due to the complexity of controlling and managing SSH Keys they pose an even greater risk than unmanaged privileged passwords.
Submit
83. Users within the PSMLiveSessions safe may view the PSM live monitoring feature in an environment with multiple PVWAs.
Submit
84. Dual Control is one of the foundations of Information Security as it is based upon the premise that, for a breach to be committed, then both parties would need to be in collusion and, because one should always alternate the pairs of people, it would require a much greater level of corruption in order to breach dual control procedures.
Submit
85. Users who have the 'Access Safe without confirmation' safe permission on a safe where accounts are configured for Dual Control, still need to request approval to use the account.
Submit
86. In Accounts Discovery, you can configure a Windows discovery to scan ______________.
Submit
87. Target account platforms can be restricted to accounts that are stored in specific Safes using the AllowedSafes property.
Submit
88. A Reconcile Account can be specified in the Master Policy.
Submit
89. The vault does NOT support Role Based Access Control.
Submit
90. Interval is the number of minutes that the CPM waits between loops when processing accounts associated with this platform.
Submit
91. During LDAP/S integration you should specify the Fully Qualified Domain Name (FQDN) of the Domain Controller.
Submit
92. Typically, Access control is implemented by the safes.
Submit
93. The vault server requires WINS services to work properly.

Explanation

EXPLANATION for Answer: Windows Internet Name Service (WINS) is a legacy computer name registration and resolution service that maps computer NetBIOS names to IP addresses. If you do not already have WINS deployed on your network, do not deploy WINS on the Vault Server.

Submit
94. The security of the Vault Server is entirely dependent on the security of the network.
Submit
95. The DR Vault is pingable when the CyberArk Disaster Recovery service is running.
Submit
96. The purpose of the password change process is to change the password according to organizational requirements.
Submit
97. The purpose of the password verification is to verify CyberArk is storing credentials correctly.
Submit
98. SIEM integration is a powerful tool to correlate Privileged Accounts and Privileged Activity.

Explanation

EXPLANATION for Answer: Please, read CyberArk’s documentation on this topic: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Integrating-with-SIEM-Applications.htm?Highlight=siem

Submit
99. What is the purpose of the Activity Log?
Submit
100. The Dbparm.ini file, in the Server\Conf installation folder, contains the general parameters of the Vault database.
Submit
101. It is not possible to use the Microsoft Windows native client, Remote Desktop Connection, for RDP to target server.

Explanation

EXPLANATION for Answer: It is possible to use the Microsoft Windows native client, Remote Desktop Connection, for RDP to a target server when a property value is properly configured. DisableRemoteApp needs to be set to No. To do this, login to PVWA and click Administration. Go to Options, and search for DisableRemoteApp, then update property value to No.

Submit
102. What is the maximum number of levels of authorizations you can set up in Dual Control?
Submit
103. If a user is a member of more than one group that has authorizations on a safe, by default that user is granted _______________.
Submit
104. Which of the following options is NOT set in the Master Policy?
Submit
105. When managing SSH keys, CPM automatically stores the Private Key:

Explanation

EXPLANATION for Answer: Please, read from CyberArk's website: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/SSHKM/Introduction.htm. Also, see video created by SSH Communications Security, https://youtu.be/ke_M3t_L3iY?t=49 .

Submit
106. ImmediateInterval is the number of minutes that will elapse between when the user initiates an account management process and when the process is performed.
Submit
107. In an SMTP integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SMTP server address(es).
Submit
108. The vault internal safe contains the configuration for an LDAP integration.
Submit
109. When a DR vault server becomes an active vault, it will automatically fail back to the original state once the primary vault comes back online.
Submit
110. A Vault Administrator wants to change the PSM Server ID to comply with a naming standard, what is the process for changing the PSM Server ID?
Submit
111. You can connect to remote systems and applications without knowing or specifying the required password or key?

Explanation

EXPLANATION for Answer: It is possible with Privileged Single Sign-On.

Submit
112. You can install the HTML5 Gateway for PSM on a dedicated machine or on the same machine as PSM for SSH.

Explanation

EXPLANATION for Answer: See CyberArk’s documentation on this topic: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Install_PSM_HTML5.htm

Submit
113. At what point is a transparent user provisioned in the vault?
Submit
114. Which default vault user is automatically able to access any safe?
Submit
115. What is the purpose of the Entitlement Report?
Submit
116. Vault firewall rules can never be modified once applied.

Explanation

EXPLANATION for Answer: Yes, the firewall rules can be modified through Windows Firewall service. To more rigorously monitor the firewall rules parameter MonitorFWRulesInterval can be added to the dbparm.ini file.EXPLANATION for Answer: Yes, the firewall rules can be modified through the dbparm.ini file.

Submit
117. It is impossible to override Master Policy settings for a Platform.

Explanation

EXPLANATION of Answer: It is possible to override the Master Policy through an exception.

Submit
118. Which user is automatically given all Safe authorizations on all Safes?
Submit
119. HA, DR, Replicate are mutually exclusive and cannot be used in the same environment.

Explanation

EXPLANATION for Answer: While each of the components are mutually exclusive they CAN be used in the same environment.

Submit
120. A Logon Account can be specified in the Platform settings.
Submit
121. The replicate module allows an integration with Enterprise Backup Software.
Submit
122. What would be a good use case for a High Availability vault?
Submit
123. Which file can be used to help monitor firewall rule changes for the vault server?

Explanation

EXPLANATION for Answer: The firewall rules can be modified through Windows Firewall service. To more rigorously monitor the firewall rules parameter MonitorFWRulesInterval can be added to the dbparm.ini file.

Submit
124. When a safe is restricted for use during certain times a Vault Admin can still use the safe during those restricted times.
Submit
125. There are 2 types of backups: Continuous and Intermediate.

Explanation

EXPLANATION for Answer: There are only 2 types of backups, however they are not called Continuous and Intermediate. One of the backups is Indirect backup, and is the recommended backup. Indirect backup is an install of the Replicate Utility in any of the Node - PSM, PVWA, CPM .. any domain server which is reachable to vault. The other backup is called a Direct backup, and is an install of the Replicate Utility directly on Vault Server.

Submit
126. As long as you are a member of the Vault Admins group you can grant any permission on any safe?

Explanation

EXPLANATION for Answer: Being in Vault admins group only give you access to safes which are created during installation (safe created during installation process ) - This is clearly mentioned in documents.

Submit
127. It is possible to restrict the time of day, or day of week that password reconcile process occurs is managed in _______________.
Submit
128. What conditions must be met in order to log into the vault as the Master user? (select all that apply)
Submit
129. The vault does support Role Based Access Control.
Submit
130. Account Discovery utility can be used to perform a scan for all domain joined Windows systems, and each account identified can be automatically on-boarded.
Submit
131. When attempting to connect to a platform and the connect button is NOT enabled (v10) or you receive error message "Java is not enabled on your browser" (v9), to connect you likely need to first update the Master Policy setting "Require privileged session monitoring and isolation" to Active.
Submit
132. It is possible for an Auditor to watch PSM sessions in real time.
Submit
133. The default authorizations on a safe allow the user to delete an account.
Submit
134. What is the primary reason for installing more than 1 active CPM?
Submit
135. The TSParm.ini file, in the Server\Conf installation folder, contains the list of directories that can store Safes databases.
Submit
136. What value should be used in the field named Address to configure an LDAP connection through PVWA? Select the best answer.
Submit
137. Restricting the time of day, or day of week that a password change occurs is managed in _______________.
Submit
138. In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?
Submit
139. Which CyberArk components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts?
Submit
140. Name two ways of viewing the ITAlog:
Submit
141. Multiple PVWA servers provide automatic load balancing.

Explanation

EXPLANATION for Answer: While multiple PVWA servers can be load balanced, it requires a manual configuration and is not automatic.

Submit
142. Which of the following are supported authentication methods for CyberArk. Check all that apply.
Submit
143. A SIEM integration allows you to forward audit records to a monitoring solution.
Submit
144. When attempting to login to a linux server and it does NOT permit root account login, PermitRootLogin=No, use the Reconcile Account feature to seamlessly overcome the issue.

Explanation

EXPLANATION for Answer: The Logon Account feature should be used to associate a logon account with the root account. The Reconcile Account feature is for when a primary account’s password is either not reconcilable or not known, so a secondary account that has more permissions is associated with the primary account and has permissions to reconcile the primary accounts password between the vault and the target system.

Submit
145. Once the object level access control setting is checked, it can be unchecked at a later time.
Submit
146. To setup LDAP go to:
Submit
147. PSM offers: (select all that apply)

Explanation

EXPLANATION for Answer: Videos are stored for retrieval ONLY after the real-time recording has concluded.

Submit
148. Which report can be generated in both PVWA and PrivateArk?

Explanation

EXPLANATION for Answer: See CyberArk’s documentation: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Auditing-sessions.htm

Submit
149. Restricting the time of day, or day of week that a password verify process occurs is managed in _______________.
Submit
150. When on-boarding accounts using Account Feed, which of the following is true?
Submit
151. Which file would you modify to configure your vault Server to forward Activity Logs to a SIEM or SYSLOG server.
Submit
152. You are successfully managing passwords in the alpha.cyberark com domain; however when you attempt to manage a password in the beta.cyberark.com domain, you receive the 'network path not found* error What should you check first?
Submit
153. The connect button requires PSM to work.
Submit
154. The Administrator user has all vault authorizations but no access to data by default.
Submit
155. VAULT authorizations may be granted to ________________. (select all that apply.)
Submit
156. Which report could show all audit data in the vault?
Submit
157. For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.
Submit
158. What is the name of the Platform parameter that controls how long a password will stay valid when One Time Passwords are enabled via the Master Policy?

Explanation

EXPLANATION for Answer: MinValidityPeriod -The number of minutes to wait from the last retrieval of the password until it is replaced. This gives the user a minimum period to be able to use the password before it is replaced. Use -1 to ignore this property. This parameter is also used to release exclusive accounts automatically.

Submit
159. Which of the following files must be created or configured in order to run Password Upload Utility?
Submit
160. The Vault supports multiple instances of the following components. Choose all that apply.
Submit
161. The Vault needs to send SNMP traps to an SNMP solution. In which configuration file do you set the IP address of the SNMP solution?
Submit
162. The default authorization on a safe allow a user to store a new account.
Submit
163. Which file would you modify to configure the vault to send SNMP traps to your monitoring solution?
Submit
164. If a transparent user matches two different directory mappings, how does the system determine which user template to use?
Submit
165. What would be a good use case for the Disaster Recovery module?
Submit
166. The vault allows the use of Subnet Role Based Permissions?
Submit
167. What is the purpose of the Privileged Accounts Compliance Status?
Submit
168. To apply a new license file you must:
Submit
169. A server that has NOT yet been on-boarded with the Vault can NOT be connected to using PSM.

Explanation

EXPLANATION for Answer: Through the Secure Connect feature, servers that are NOT yet on-boarded to the Vault can be accessed by PSM.

Submit
170. Ad-Hoc Access (formerly Secure Connect) provides the following features. (select all that apply)
Submit
171. Platform settings are applied to _______________.
Submit
172. When managing SSH keys, CPM automatically stores the Public Key:

Explanation

EXPLANATION for Answer: Please, read from CyberArk's website: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/SSHKM/Introduction.htm . Also, see video created by SSH Communications Security, https://youtu.be/ke_M3t_L3iY?t=49 .

Submit
173. Beginning with v10.7, which is the correct order of installation for PAS (Privileged Account Security) components?

Explanation

NOTE: See documentation from CyberArk webpage: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/InstallationOverview.htm

Submit
174. What are the operating system prerequisites for installing CPM? (select all that apply)
Submit
175. SAFE authorizations may be granted to ________________. (select all that apply.)
Submit
176. Which of the following are prerequisites for installing PVWA. Check all that Apply.
Submit
177. PSM generates recordings on the Vault server in real time.
Submit
178. It is possible for a vault admin to access a safe at a restricted time.
Submit
179. For a user who is logged into PVWA and receives error message "ITATS006E Station is suspended for User .", the recommended action is to:
Submit
180. If Vault Administrator has forgotten the password or is locked out and the Master Account and/or Master CD are forgotten/lost, there is no way to regain Administrative access to the PAS.

Explanation

EXPLANATION for Answer: CyberArk Professional Services Team, for a fee, can reset the passwords of both the Administrator and Master account.

Submit
181. CyberArk recommends DNA (Discovery and Audit) scans once a ____________ to discover unprotected backdoors.
Submit
182. Which of the following statements are NOT true when enabling PSM recording for a target Windows server? (select all that apply)
Submit
183. The DR module allows an integration with Enterprise Backup software.
Submit
184. Which one of the built-in Vault users is not automatically added to the safe when it is first created in PVWA?

Explanation

EXPLANATION for Answer: Vault Admin is automatically added to safes created during the installation process, however post-installation all newly created safes, created via PVWA, are NOT automatically added to the safe.

Submit
185. The vault internal safe contains all of the configuration for the vault.
Submit
186. Which CyberArk component requires disabling the Data Execution Prevention (DEP) so that none of the features within will be hindered?
Submit
187. Multiple Vault servers can be load balanced.

Explanation

EXPLANATION for Answer: Through Disaster Recovery (DR) configurations Satellite Vaults servers can and should be established, however, there is no “load balancing” between vaults.

Submit
188. When using the CyberArk Cluster, the following are running on the passive vault(s):

Explanation

EXPLANATION for Answer: Please, read CyberArk’s documentation on this topic https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Installing-the-CyberArk-Cluster-Vault-on-Distributed-Vaults.htm

Submit
189. Which CyberArk component permits the use of Subnet Mask?

Explanation

EXPLANATION for Answer: Please, review CyberArk’s documentation on this topic: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Configuring-a-Subnet-Mask.htm

Submit
190. Which utilities could you use to change debugging levels on the vault without having to restart the vault. (select all that apply)

Explanation

EXPLANATION for Answer: PAR-Private Ark Remote Control Agent allows you to perform several Vault admin tasks (without restarting the Vault) and view machine statistics.

Submit
191. An SMTP integration allows you to forward audit records to a monitoring solution.

Explanation

EXPLANATION for Answer: While the SMTP canNOT forward audit records to a monitoring solution, a SIEM integration can.

Submit
192. After firewall rules are applied to the vault, can they be modified?

Explanation

EXPLANATION for Answer: Yes, the firewall rules can be modified through Windows Firewall service. To more rigorously monitor the firewall rules parameter MonitorFWRulesInterval can be added to the dbparm.ini file.

Submit
193. To update a license, upload it to the system safe and then you must restart the PrivateArk service.

Explanation

EXPLANATION for Answer: It is NOT necessary to restart the PrivateArk service when ONLY the license file is updated.

Submit
194. What would be a good use case for the Replicate Module?
Submit
195. All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UNIXAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group OperationsStaff need to be able to use the show, copy, and connect buttons on those passwords on an emergency basis, but only with the approval of a member of OperationsManagers. The members of OperationsManagers never need to be able to use the show, copy or connect buttons themselves. Which safe permissions do you need to grant to OperationsStaff. Check all that apply.
Submit
196. Which files govern the password upload utility:
Submit
197. The Timeout setting is defined as:
Submit
198. When on-boarding a Satellite Vault you must update ____________.

Explanation

EXPLANATION for Answer: Please, read CyberArk’s documentation on this topic: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Installing-the-CyberArk-Satellite-Vault.htm?Highlight=satellite.ini

Submit
199. Match the following Privileged Access Workflow definitions to their respective terms.
Submit
200. Auto-Detection is NOT recommended for use, because it forces each discovered server to on-board all discovered accounts even though NOT all accounts need to be on-boarded.

Explanation

EXPLANATION: Auto-Detection should NOT be utilized, instead CyberArk recommends using a more capable product called Accounts Discovery which provides the functionality to or not to on-board an account.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 19, 2019
    Quiz Created by
    Nathan Roberts
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Reports can be scheduled to run on a periodic basis.
The vault provides a tamper-proof audit trail.
The best practice for storing the Master CD is to store the CD in a...
Which CyberArk component changes passwords on Target Devices?
CyberArk recommends two-factor authentication, preferably over RADIUS,...
Password Vault Web Access is an ASP .NET application, deployed on IIS...
Remote Desktop Session host needs a client access license (CAL).
Which Built-In group grants access to the ADMINISTRATION page?
Using the SSH Key Manager it is possible to allow CPM to manage SSH...
PSM captures a record of each command that was executed in Unix.
PSM captures a record of each command that was issued in SQL Plus.
Auto-Detection can be configured to leverage LDAP/S.
Users can be restricted to using certain CyberArk interfaces (e.g....
The primary purpose of exclusive accounts is to ensure non-repudiation...
One time passwords reduce the risk of Pass the Hash vulnerabilities in...
In order to retrieve data from the vault a user MUST use an interface...
The Remote Desktop Services role must be properly licensed by...
The vault supports a number of dual factor authentication methods.
A vault admin received an email notification that a password...
The primary purpose of the PSM server is Password Management.
In the vault each password is encrypted with a unique encryption key.
The CreateCredFile.exe utility is used to create or update a...
CyberArk supports role based access control?
The Privileged Session Manager SSH Proxy (PSMP) should be installed on...
DNS must be enabled on the Digital Vault Server.
The Digital Vault Server must be built from the original Microsoft...
You have associated a logon account to one of your UNIX root accounts...
The System safe allows access to the Vault configuration files.
The Password upload utility can be used to create safes.
When managing SSH keys, CPM automatically pushes the Public Key to the...
The Application Inventory report is related to AIM.
Multiple PSM Servers can be load balanced.
What is the purpose of the PrivateArk Database service?
The primary purpose of the CPM is Password Management.
You can change the vault license by uploading the new license to the...
The PrivateArk client allows a user to view the contents of the vault...
The RemoteApp feature of PSM allows seamless Application windows (i.e....
Which of the following protocols need to be installed on a standalone...
The AllowedSafes parameter allows a regular expression that lists the...
Application inventory is related to AIM.
The Password Upload utility can be used to create safes.
To connect to a Windows server through PVWA, RDP is utilized.
To connect to a Unix server through PVWA, SSH is utilized.
Use the _____ to find and detect all the SSH Keys in your...
CyberArk's PrivateArk Command Line Interface (PACLI) can be...
If a password is changed manually on a server, bypassing the CPM, how...
A Reconcile Account can be specified in the platform settings.
In order to retrieve data from the vault a user MUST use an interface...
In order to avoid conflicts with the hardening process, third-party...
Multiple PVWA servers are always all active.
Tsparm.ini is the main configuration file for the vault.
After a PSM session is complete, the PSM server uploads the recording...
What is the name of the account used to establish the initial RDP...
With Automatic Installation, you can use the PAS deployment scripts...
Does CyberArk need service accounts on each server to change...
A standalone Vault server requires DNS services to operate properly.
By default, the vault secure protocol uses which IP port and protocol.
In accordance with best practice, SSH access is denied for root...
It is possible to leverage DNA to provide discovery functions that are...
The Master Account and Master CD should be used only when either the...
One can create exceptions to the Master Policy based on _____________.
What is the purpose of the HeadStartInterval setting in a platform?
A Logon Account can be specified in the Master Policy.
Which one of the following reports is NOT generated by using PVWA?
It is possible to leverage DNA to provide discovery functions that are...
Which report provides a list of accounts stored in the vault?
When managing SSH keys, CPM automatically pushes the Private Key to...
It is possible to disable the Show and Copy buttons without removing...
What conditions must be met in order to log into the Vault as the...
CyberArk implements license limits by controlling the number and types...
To on-board Linux accounts using the Account Discovery utility, a CSV...
Within the Vault each password is encrypted by
Prior to v10.7, which is the correct order of installation for PAS...
PSM requires the Remote Desktop Session Host role service.
What is the purpose of the CyberArk Event Notification Engine service?
The vault server uses a modified version of the Microsoft Windows...
What is the purpose of the PrivateArk Server service?
Parameters for the SIEM path is in the DBParm.ini.
What is the purpose of the password Reconcile process?
Which of these is not a report generated by the PVWA:
To connect to a Windows server through PVWA, SSH is utilized.
Due to the complexity of controlling and managing SSH Keys they pose...
Users within the PSMLiveSessions safe may view the PSM live monitoring...
Dual Control is one of the foundations of Information Security as it...
Users who have the 'Access Safe without confirmation' safe permission...
In Accounts Discovery, you can configure a Windows discovery to scan...
Target account platforms can be restricted to accounts that are stored...
A Reconcile Account can be specified in the Master Policy.
The vault does NOT support Role Based Access Control.
Interval is the number of minutes that the CPM waits between loops...
During LDAP/S integration you should specify the Fully Qualified...
Typically, Access control is implemented by the safes.
The vault server requires WINS services to work properly.
The security of the Vault Server is entirely dependent on the security...
The DR Vault is pingable when the CyberArk Disaster Recovery service...
The purpose of the password change process is to change the password...
The purpose of the password verification is to verify CyberArk is...
SIEM integration is a powerful tool to correlate Privileged Accounts...
What is the purpose of the Activity Log?
The Dbparm.ini file, in the Server\Conf installation folder, contains...
It is not possible to use the Microsoft Windows native client, Remote...
What is the maximum number of levels of authorizations you can set up...
If a user is a member of more than one group that has authorizations...
Which of the following options is NOT set in the Master Policy?
When managing SSH keys, CPM automatically stores the Private Key:
ImmediateInterval is the number of minutes that will elapse between...
In an SMTP integration it is recommended to use the fully-qualified...
The vault internal safe contains the configuration for an LDAP...
When a DR vault server becomes an active vault, it will automatically...
A Vault Administrator wants to change the PSM Server ID to comply with...
You can connect to remote systems and applications without knowing or...
You can install the HTML5 Gateway for PSM on a dedicated machine or on...
At what point is a transparent user provisioned in the vault?
Which default vault user is automatically able to access any safe?
What is the purpose of the Entitlement Report?
Vault firewall rules can never be modified once applied.
It is impossible to override Master Policy settings for a Platform.
Which user is automatically given all Safe authorizations on all...
HA, DR, Replicate are mutually exclusive and cannot be used in the...
A Logon Account can be specified in the Platform settings.
The replicate module allows an integration with Enterprise Backup...
What would be a good use case for a High Availability vault?
Which file can be used to help monitor firewall rule changes for the...
When a safe is restricted for use during certain times a Vault Admin...
There are 2 types of backups: Continuous and Intermediate.
As long as you are a member of the Vault Admins group you can grant...
It is possible to restrict the time of day, or day of week that...
What conditions must be met in order to log into the vault as the...
The vault does support Role Based Access Control.
Account Discovery utility can be used to perform a scan for all domain...
When attempting to connect to a platform and the connect button is NOT...
It is possible for an Auditor to watch PSM sessions in real time.
The default authorizations on a safe allow the user to delete an...
What is the primary reason for installing more than 1 active CPM?
The TSParm.ini file, in the Server\Conf installation folder, contains...
What value should be used in the field named Address to configure an...
Restricting the time of day, or day of week that a password change...
In order to connect to a target device through PSM, the account...
Which CyberArk components or products can be used to discover Windows...
Name two ways of viewing the ITAlog:
Multiple PVWA servers provide automatic load balancing.
Which of the following are supported authentication methods for...
A SIEM integration allows you to forward audit records to a monitoring...
When attempting to login to a linux server and it does NOT permit root...
Once the object level access control setting is checked, it can be...
To setup LDAP go to:
PSM offers: (select all that apply)
Which report can be generated in both PVWA and PrivateArk?
Restricting the time of day, or day of week that a password verify...
When on-boarding accounts using Account Feed, which of the following...
Which file would you modify to configure your vault Server to forward...
You are successfully managing passwords in the alpha.cyberark com...
The connect button requires PSM to work.
The Administrator user has all vault authorizations but no access to...
VAULT authorizations may be granted to ________________. (select all...
Which report could show all audit data in the vault?
For an account attached to a platform that requires Dual Control based...
What is the name of the Platform parameter that controls how long a...
Which of the following files must be created or configured in order to...
The Vault supports multiple instances of the following components....
The Vault needs to send SNMP traps to an SNMP solution. In which...
The default authorization on a safe allow a user to store a new...
Which file would you modify to configure the vault to send SNMP traps...
If a transparent user matches two different directory mappings, how...
What would be a good use case for the Disaster Recovery module?
The vault allows the use of Subnet Role Based Permissions?
What is the purpose of the Privileged Accounts Compliance Status?
To apply a new license file you must:
A server that has NOT yet been on-boarded with the Vault can NOT be...
Ad-Hoc Access (formerly Secure Connect) provides the following...
Platform settings are applied to _______________.
When managing SSH keys, CPM automatically stores the Public Key:
Beginning with v10.7, which is the correct order of installation for...
What are the operating system prerequisites for installing CPM?...
SAFE authorizations may be granted to ________________. (select all...
Which of the following are prerequisites for installing PVWA. Check...
PSM generates recordings on the Vault server in real time.
It is possible for a vault admin to access a safe at a restricted...
For a user who is logged into PVWA and receives error message...
If Vault Administrator has forgotten the password or is locked out and...
CyberArk recommends DNA (Discovery and Audit) scans once a...
Which of the following statements are NOT true when enabling PSM...
The DR module allows an integration with Enterprise Backup software.
Which one of the built-in Vault users is not automatically added to...
The vault internal safe contains all of the configuration for the...
Which CyberArk component requires disabling the Data Execution...
Multiple Vault servers can be load balanced.
When using the CyberArk Cluster, the following are running on the...
Which CyberArk component permits the use of Subnet Mask?
Which utilities could you use to change debugging levels on the vault...
An SMTP integration allows you to forward audit records to a...
After firewall rules are applied to the vault, can they be modified?
To update a license, upload it to the system safe and then you must...
What would be a good use case for the Replicate Module?
All of your Unix root passwords are stored in the safe UnixRoot. Dual...
Which files govern the password upload utility:
The Timeout setting is defined as:
When on-boarding a Satellite Vault you must update ____________.
Match the following Privileged Access Workflow definitions to their...
Auto-Detection is NOT recommended for use, because it forces each...
Alert!

Advertisement