Special Summer Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What is the purpose of a linked account?

A.

To ensure that a particular collection of accounts all have the same password.

B.

To ensure a particular set of accounts all change at the same time.

C.

To connect the CPNI to a target system.

D.

To allow more than one account to work together as part of a password management process.

Full Access
Question # 5

Which of these accounts onboarding methods is considered proactive?

A.

Accounts Discovery

B.

Detecting accounts with PTA

C.

A Rest API integration with account provisioning software

D.

A DNA scan

Full Access
Question # 6

Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? (Choose three.)

A.

Store the CD in a physical safe and mount the CD every time Vault maintenance is performed

B.

Copy the entire contents of the CD to the system Safe on the Vault

C.

Copy the entire contents of the CD to a folder on the Vault Server and secure it with NTFS permissions

D.

Store the server key in a Hardware Security Module (HSM) and copy the rest the keys from the CD to a folder on the Vault Server and secure it with NTFS permissions

Full Access
Question # 7

Match the connection component to the corresponding OS/Function.

Full Access
Question # 8

You are installing PSM for SSH with AD-Bridge in CyberArkSSHD mode for your customer. ACME Corp What do you need to install to meet your customer's needs? (Choose 2)

A.

libssh

B.

CARKpsmp-mfra

C.

CARKpsmp

D.

CARKpsmp-AD Bridge

Full Access
Question # 9

When a group is granted the 'Authorize Account Requests' permission on a safe Dual Control requests must be approved by

A.

Any one person from that group

B.

Every person from that group

C.

The number of persons specified by the Master Policy

D.

That access cannot be granted to groups

Full Access
Question # 10

Secure Connect provides the following. Choose all that apply.

A.

PSM connections to target devices that are not managed by CyberArk.

B.

Session Recording

C.

Real-time live session monitoring.

D.

PSM connections from a terminal without the need to login to the PVWA

Full Access
Question # 11

A customer is deploying PVWAs in the Amazon Web Services Public Cloud. Which load balancing option does CyberArk recommend?

A.

Network Load Balancer

B.

Classic Load Balancer

C.

HTTPS load balancer

D.

Public standard load balancer

Full Access
Question # 12

Before the hardening process your customer identified a PSM Universal Connector executable that will be required to run on the PSM Which file should you update to allow this to run?

A.

PSMConfigureAppLockerxml

B.

PSMHardening xml

C.

PSMAppConfig xml

D.

PSMConfigureHardening xml

Full Access
Question # 13

Match each PTA alert category with the PTA sensors that collect the data for it.

Full Access
Question # 14

Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?

A.

Password change

B.

Password reconciliation

C.

Session suspension

D.

Session termination

Full Access
Question # 15

Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?

A.

Accounts Discovery

B.

Auto Detection

C.

Onboarding RestAPI functions

D.

PTA Rules

Full Access
Question # 16

CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.

A.

TRUE

B.

FALSE

Full Access
Question # 17

Which option in the PrivateArk client is used to update users' Vault group memberships?

A.

Update > General tab

B.

Update > Authorizations tab

C.

Update > Member Of tab

D.

Update > Group tab

Full Access
Question # 18

PTA can automatically suspend sessions if suspicious activities are detected in a privileged session, but only if the session is made via the CyberArk PSM.

A.

True

B.

False, the PTA can suspend sessions whether the session is made via the PSM or not

Full Access
Question # 19

When a DR Vault Server becomes an active vault, it will automatically revert back to DR mode once the Primary Vault comes back online.

A.

True; this is the default behavior

B.

False, the Vault administrator must manually set the DR Vault to DR mode by setting “FailoverMode=no” in the padr.ini file

C.

True, if the AllowFailback setting is set to “yes” in the padr.ini file

D.

False, the Vault administrator must manually set the DR Vault to DR mode by setting “FailoverMode=no” in the dbparm.ini file

Full Access
Question # 20

What is the purpose of the Interval setting in a CPM policy?

A.

To control how often the CPM looks for System Initiated CPM work.

B.

To control how often the CPM looks for User Initiated CPM work.

C.

To control how long the CPM rests between password changes.

D.

To control the maximum amount of time the CPM will wait for a password change to complete.

Full Access
Question # 21

For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.

A.

Create an exception to the Master Policy to exclude the group from the workflow process.

B.

Edith the master policy rule and modify the advanced’ Access safe without approval’ rule to include the group.

C.

On the safe in which the account is stored grant the group the’ Access safe without audit’ authorization.

D.

On the safe in which the account is stored grant the group the’ Access safe without confirmation’ authorization.

Full Access
Question # 22

Match each component to its respective Log File location.

Full Access
Question # 23

What is the easiest way to duplicate an existing platform?

A.

From PrivateArk, copy/paste the appropriate Policy.ini file; then rename it.

B.

From the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform and then click Duplicate; name the new platform.

C.

From PrivateArk, copy/paste the appropriate settings in PVConfiguration.xml; then update the policyName variable.

D.

From the PVWA, navigate to the platforms page, select an existing platform that is similar to the new target account platform, manually update the platform settings and click “Save as” INSTEAD of save to duplicate and rename the platform.

Full Access
Question # 24

An auditor initiates a live monitoring session to PSM server to view an ongoing live session. When the auditor’s machine makes an RDP connection the PSM server, which user will be used?

A.

PSMAdminConnect

B.

Shadowuser

C.

PSMConnect

D.

Credentials stored in the Vault for the target machine

Full Access
Question # 25

tsparm.ini is the main configuration file for the Vault.

A.

True

B.

False

Full Access
Question # 26

In addition to disabling Windows services or features not needed for PVWA operations, which tasks does PVWA Hardening.ps1 perform when run?

A.

Performs IIS hardening: Imports the CyberArk INF configuration

B.

Performs IIS hardening: Configures all group policy settings

C.

Performs IIS hardening: Renames the local Administrator Account

D.

Configures Windows Firewall: Removes all installation files.

Full Access
Question # 27

In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?

A.

True.

B.

False. Because the user can also enter credentials manually using Secure Connect.

C.

False. Because if credentials are not stored in the vault, the PSM will log into the target device as PSM Connect.

D.

False. Because if credentials are not stored in the vault, the PSM will prompt for credentials.

Full Access
Question # 28

Ad-Hoc Access (formerly Secure Connect) provides the following features. Choose all that apply.

A.

PSM connections to target devices that are not managed by CyberArk.

B.

Session Recording.

C.

Real-time live session monitoring.

D.

PSM connections from a terminal without the need to login to the PVWA.

Full Access
Question # 29

Which browser is supported for PSM Web Connectors developed using the CyberArk Plugin Generator Utility (PGUP

A.

Internet Explorer

B.

Google Chrome

C.

Microsoft Edge

D.

Firefox

Full Access
Question # 30

To enable the Automatic response “Add to Pending” within PTA when unmanaged credentials are found, what are the minimum permissions required by PTAUser for the PasswordManager_pending safe?

A.

List Accounts, View Safe members, Add accounts (includes update properties), Update Account content, Update Account properties

B.

List Accounts, Add accounts (includes update properties), Delete Accounts, Manage Safe

C.

Add accounts (includes update properties), Update Account content, Update Account properties, View Audit

D.

View Accounts, Update Account content, Update Account properties, Access Safe without confirmation, Manage Safe, View Audit

Full Access
Question # 31

Your organization requires all passwords be rotated every 90 days.

Where can you set this regulatory requirement?

A.

Master Policy

B.

Safe Templates

C.

PVWAConfig.xml

D.

Platform Configuration

Full Access
Question # 32

What is the primary purpose of One Time Passwords?

A.

Reduced risk of credential theft

B.

More frequent password changes

C.

Non-repudiation (individual accountability)

D.

To force a 'collusion to commit' fraud ensuring no single actor may use a password without authorization.

Full Access
Question # 33

What is the purpose of the PrivateArk Database service?

A.

Communicates with components

B.

Sends email alerts from the Vault

C.

Executes password changes

D.

Maintains Vault metadata

Full Access
Question # 34

Which Cyber Are components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.

A.

Discovery and Audit (DMA)

B.

Auto Detection (AD)

C.

Export Vault Data (EVD)

D.

On Demand Privileges Manager (OPM)

E.

Accounts Discovery

Full Access
Question # 35

In the Private Ark client, how do you add an LDAP group to a CyberArk group?

A.

Select Update on the CyberArk group, and then click Add > LDAP Group

B.

Select Update on the LDAP Group, and then click Add > LDAP Group

C.

Select Member Of on the CyberArk group, and then click Add > LDAP Group

D.

Select Member Of on the LDAP group, and then click Add > LDAP Group

Full Access
Question # 36

Due to network activity, ACME Corp’s PrivateArk Server became active on the OR Vault while the Primary Vault was also running normally. All the components continued to point to the Primary Vault.

Which steps should you perform to restore DR replication to normal?

A.

Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

B.

Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

C.

Shutdown PrivateArk Server on Primary Vault > Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

D.

Shutdown PrivateArk Server on DR Vault > Replicate data from DR Vault to Primary Vault > Shutdown PrivateArk Server on DR Vault > Start replication on DR vault

Full Access
Question # 37

How does the Vault administrator apply a new license file?

A.

Upload the license.xml file to the system Safe and restart the PrivateArk Server service

B.

Upload the license.xml file to the system Safe

C.

Upload the license.xml file to the Vault Internal Safe and restart the PrivateArk Server service

D.

Upload the license.xml file to the Vault Internal Safe

Full Access
Question # 38

When creating Distributed Vault environment architecture, what is the maximum number of Vault servers that can be deployed''

A.

5 - number of primary and satellite Vaults can be specified during installation

B.

3- all primary

C.

6-1 primary and 5 satellite

D.

10-2 primary and 8 satellite

Full Access
Question # 39

What is the name of the Platform parameters that controls how long a password will stay valid when One Time Passwords are enabled via the Master Policy?

A.

Min Validity Period

B.

Interval

C.

Immediate Interval

D.

Timeout

Full Access
Question # 40

You need to enable the PSM for all platforms. Where do you perform this task?

A.

Platform Management > (Platform) > UI & Workflows

B.

Master Policy > Session Management

C.

Master Policy > Privileged Access Workflows

D.

Administration > Options > Connection Components

Full Access
Question # 41

Which item is an option for PSM recording customization?

A.

Windows events text recorder with automatic play-back

B.

Windows events text recorder and universal keystrokes recording simultaneously

C.

Universal keystrokes text recorder with windows events text recorder disabled

D.

Custom audio recording for windows events

Full Access
Question # 42

What is the purpose of the HeadStartlnterval setting m a platform?

A.

It determines how far in advance audit data is collected tor reports

B.

It instructs the CPM to initiate the password change process X number of days before expiration.

C.

It instructs the AIM Provider to ‘skip the cache' during the defined time period

D.

It alerts users of upcoming password changes x number of days before expiration.

Full Access
Question # 43

Via Password Vault Web Access (PVWA), a user initiates a PSM connection to the target Linux machine using RemoteApp. When the client’s machine makes an RDP connection to the PSM server, which user will be utilized?

A.

Credentials stored in the Vault for the target machine

B.

Shadowuser

C.

PSMConnect

D.

PSMAdminConnect

Full Access
Question # 44

A customer is moving from an on-premises to a public cloud deployment. What is the best and most cost-effective option to secure the server key?

A.

Install the Vault in the cloud the same way that you would in an on-premises environment Place the server key in a password protected folder on the operating system

B.

Install the Vault in the cloud the same way that you would in an on-premises environment Purchase a Hardware Security Module to secure the server key

C.

Install the Vault using the Amazon Machine Images and secure the server key using native cloud Key Management Systems

D.

Install the Vault using the Amazon Machine Images and secure the server key with a Hardware Security Module

Full Access
Question # 45

The Privileged Access Management solution provides an out-of-the-box target platform to manage SSH keys, called UNIX Via SSH Keys.

How are these keys managed?

A.

CyberArk stores Private keys in the Vault and updates Public keys on target systems.

B.

CyberArk stores Public keys in the Vault and updates Private keys on target systems.

C.

CyberArk does not store Public or Private keys and instead uses a reconcile account to create keys on demand.

D.

CyberArk stores both Private and Public keys and can update target systems with either key.

Full Access
Question # 46

For each listed prerequisite, identify if it is mandatory or not mandatory to run the PSM Health Check.

Full Access
Question # 47

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests.

A.

HeadStartInterval

B.

Interval

C.

ImmediateInterval

D.

The CPM does not change the password under this circumstance

Full Access
Question # 48

What is a requirement for setting fault tolerance for PSMs?

A.

Use a load balancer

B.

use a backup solution

C.

CPM must be in all data centers

D.

Install the Vault in an HA Cluster

Full Access
Question # 49

Which usage can be added as a service account platform?

A.

Kerberos Tokens

B.

IIS Application Pools

C.

PowerShell Libraries

D.

Loosely Connected Devices

Full Access
Question # 50

Which SMTP address can be set on the Notification Settings page to re-invoke the ENE setup wizard after the initial Vault installation.

A.

255.255.255.255

B.

8.8.8.8

C.

192.168.1.1

D.

1.1.1.1

Full Access
Question # 51

Which authentication methods does PSM for SSH support?

A.

CyberArk Password, LDAP, RADIUS, SAML

B.

LDAP, Windows Authentication, SSH Keys

C.

RADIUS, Oracle SSO, CyberArk Password

D.

CyberArk Password, LDAP, RADIUS

Full Access
Question # 52

You have been asked to design the number of PVWAs a customer must deploy. The customer has three data centers with a distributed vault in each, requires high availability, and wants to use all vaults, at all times. How many PVWAs does the customer need?

A.

six

B.

four

C.

two

D.

three

Full Access
Question # 53

Which of the following PTA detections require the deployment of a Network Sensor or installing the PTA Agent on the domain controller?

A.

Suspected credential theft

B.

Over-Pass-The-Hash

C.

Golden Ticket

D.

Unmanaged privileged access

Full Access
Question # 54

A user is receiving the error message “ITATS006E Station is suspended for User jsmith” when attempting to sign into the Password Vault Web Access (PVWA). Which utility would a Vault administrator use to correct this problem?

A.

createcredfile.exe

B.

cavaultmanager.exe

C.

PrivateArk

D.

PVWA

Full Access
Question # 55

Which of the following PTA detections are included in the Core PAS offering?

A.

Suspected Credential Theft

B.

Over-Pass-The Hash

C.

Golden Ticket

D.

Unmanaged Privileged Access

Full Access
Question # 56

In a rule using “Privileged Session Analysis and Response” in PTA, which session options are available to configure as responses to activities?

A.

Suspend, Terminate, None

B.

Suspend, Terminate, Lock Account

C.

Pause, Terminate, None

D.

Suspend, Terminate

Full Access
Question # 57

A Reconcile Account can be specified in the Master Policy.

A.

TRUE

B.

FALSE

Full Access
Question # 58

The password upload utility must run from the CPM server

A.

TRUE

B.

FALSE

Full Access
Question # 59

When a DR Vault Server becomes an active vault, it will automatically fail back to the original state once the Primary Vault comes back online.

A.

True; this is the default behavior

B.

False; this is not possible

C.

True, if the AllowFailback setting is set to “yes” in the padr.ini file

D.

True, if the AllowFailback setting is set to “yes” in the dbparm.ini file

Full Access
Question # 60

CyberArk user Neil is trying to connect to the Target Linux server 192.168.1.64 using a domain account ACME/linuxuser01 on Domain Acme.corp using PSM for SSH server 192.168.65.145. What is the correct syntax?

A.

Ssh neil@linuxuser01:acme.corp@192.168.1.64@192.168.1.45

B.

Ssh neil@linuxuser01#acme.corp@192.168.1.64@192.168.1.45

C.

Ssh neil@linuxuser01@192.168.1.64@192.168.65.145

D.

Ssh neil@linuxuser01@acme.corp@192.168.1.64@192.168.1.45

Full Access
Question # 61

You are onboarding 5,000 UNIX root accounts for rotation by the CPM. You discover that the CPM is unable to log in directly with the root account and will need to use a secondary account.

How should this be configured to allow for password management using least privilege?

A.

Configure each CPM to use the correct logon account.

B.

Configure each CPM to use the correct reconcile account.

C.

Configure the UNIX platform to use the correct logon account.

D.

Configure the UNIX platform to use the correct reconcile account.

Full Access
Question # 62

According to the DEFAULT Web Options settings, which group grants access to the REPORTS page?

A.

PVWAUsers

B.

Vault Admins

C.

Auditors

D.

PVWAMonitor

Full Access
Question # 63

If the AccountUploader Utility is used to create accounts with SSH keys, which parameter do you use to set the full or relative path of the SSH private key file that will be attached to the account?

A.

KeyPath

B.

KeyFile

C.

ObjectName

D.

Address

Full Access
Question # 64

Which is the primary purpose of exclusive accounts?

A.

Reduced risk of credential theft

B.

More frequent password changes

C.

Non-repudiation (individual accountability)

D.

To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorization

Full Access
Question # 65

Customers who have the ‘Access Safe without confirmation’ safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.

A.

TRUE

B.

FALSE

Full Access
Question # 66

VAULT authorizations may be granted to_____.

A.

Vault Users

B.

Vault Groups

C.

LDAP Users

D.

LDAP Groups

Full Access