Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.
A.
Server Key
B.
Recovery Public Key
C.
Recovery Private Key
D.
Safe Key
Answer:
C
User Votes:
A 1 votes
50%
B 1 votes
50%
C 1 votes
50%
D
50%
Discussions
0/ 1000
Question 2
Which file would you modify to configure your Vault Server to forward Activity Logs to a SIEM or SYSLOG server?
A.
dbparm.ini
B.
PARagent.ini
C.
ENEConf.ini
D.
padr.ini
Answer:
A
User Votes:
A 1 votes
50%
B 1 votes
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
The Remote Desktop Services role must be property licensed by Microsoft.
A.
TRUE
B.
FALSE
Answer:
B
User Votes:
A 1 votes
50%
B
50%
Discussions
0/ 1000
Question 4
Which of the following are secure options for storing the contents of the Operator CD, while still allowing the contents to be accessible upon a planned Vault restart? Choose all that apply
A.
Store the CD in a physical safe and mount the CD every time vault maintenance is performed.
B.
Copy the contents of the CD to the System Safe on the vault
C.
Copy the contents of the CD to a folder on the vault server and secure it with NTFS permissions.
D.
Store the server key in a Hardware Security Module.
E.
Store the server key in the Provider cache
Answer:
E
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
Discussions
0/ 1000
Question 5
The PrivateArk clients allows a user to view the contents of the vault like a filesystem.
A.
TRUE
B.
FALSE
Answer:
A
User Votes:
A
50%
B 1 votes
50%
Discussions
0/ 1000
Question 6
In an SMTP integration it is possible to use the fully-qualified domain name (FQDN) when specifying the SMTP server address(es)
A.
TRUE
B.
FALSE
Answer:
A
User Votes:
A
50%
B 1 votes
50%
Discussions
0/ 1000
Question 7
Which CyberArk component changes passwords on Target Devices?
A.
Vault
B.
CPM
C.
PVWA
D.
PSM
E.
PrivateArk
F.
OPM
G.
AIM
Answer:
B
User Votes:
A
50%
B 1 votes
50%
C
50%
D
50%
E
50%
F
50%
G
50%
Discussions
0/ 1000
Question 8
Name two ways of viewing the ITAlog
A.
Log into the vault locally and navigate to the Server folder under the PrivateArk install location.
B.
Log into the PVWA and go to the Reports tab.
C.
Access the System Safe from the PrivateArk client.
D.
Go to the Thirdpary log directory on the CPM
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
In order to retrieve data from the vault a user MUST use an interface provided by CyberArk.
A.
TRUE
B.
FALSE
Answer:
A
User Votes:
A
50%
B
50%
Discussions
0/ 1000
Question 10
Which of the following are prerequisites for installing PVWA Check all that Apply.
A.
Web Services Role
B.
NET 4.5.1 Framework Feature
C.
Remote Desktop Services Role
D.
Windows BitLocker
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 11
Which of the following protocols need to be installed on a standalone vault server?
A.
Check all that apply
B.
Client for Microsoft Networks
C.
QoS Packet Scheduler
D.
File and Printer Sharing for Microsoft Networks
E.
Internet Protocol Version 4 (TCP/IPv4)
F.
NIC Teaming Driver, if applicable
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
E
50%
F
50%
Discussions
0/ 1000
Question 12
Does CyberArk need service accounts on each server to change passwords?
A.
Yes. it requires a domain administrator account to change any password on any server.
B.
Yes. it requires a local administrator account on any Windows server and a root level account on any Unix server.
C.
No. passwords are changed by the Password Provider Agent.
D.
No. the CPM uses the account information stored in the vault to login and change the account's password using its own credentials
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 13
The RemoteApp feature of PSM allows seamless Application windows (i e the Desktop of the PSM server will not be visible)
A.
TRUE
B.
FALSE
Answer:
A
User Votes:
A
50%
B
50%
Discussions
0/ 1000
Question 14
Which is the correct order of installation for PAS components?
A.
Vault, CPM. PVWA, PSM
B.
CPM, Vault. PSM, PVWA
C.
Vault, CPM. PSM, PVWA
D.
PVWA, Vault, CPM, PSM
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 15
What would be a good use case for the Disaster Recovery module?
A.
Recovery Time Objectives or Recovery Point Objectives are at or near zero.
B.
Integration with an Enterprise Backup Solution is required.