Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

The PrivateArk clients allows a user to view the contents of the vault like a filesystem.

A.

TRUE

B.

FALSE

Full Access
Question # 5

The account used to install a PVWA must have ownership of which safes? (Choose two.)

A.

VaultInternal

B.

PVWAConfig

C.

System

D.

Notification Engine

E.

PVWAReports

Full Access
Question # 6

Which authentication methods does PSM for SSH support?

A.

CyberArk password LDAP, RADIUS, SAML

B.

LDAP, Windows Authentication, SSH keys

C.

RADIUS, Oracle SSO, CyberArk Password

D.

CyberArk Password, LDAP, RADIUS

Full Access
Question # 7

A customer has two data centers and requires a single PVWA url.

Which deployment provides the fastest time to reach the PVWA and the most redundancy?

A.

Deploy two PVWAs behind a global traffic manager.

B.

Deploy one PVWA only.

C.

Deploy two PVWAs in an active/standby mode.

D.

Deploy two PVWAs using DNS round robin.

Full Access
Question # 8

Which parameter must be provided when registering a primary Vault in Azure, but not in Amazon Web Services?

A.

/RecPub

B.

/AdminPass

C.

/MasterPass

D.

/RDPGateway

Full Access
Question # 9

In which configuration file on the Vault can filters be configured to either include or exclude log messages that are sent through SNMP?

A.

PARAgent.ini

B.

DBParm.ini

C.

TSParm.ini

D.

CyberArkv2 MIB file

Full Access
Question # 10

After installing the first PSM server and before installing additional PSM servers, you must ensure the user performing the installation is not a direct owner of which safe?

A.

PSMUnmanagedSessionAccounts Safe

B.

PSMRecordingsSessionAccounts Safe

C.

PSMUnmanagedApplicationAccounts Safe

D.

PSMSessionBackupAccounts Safe

Full Access
Question # 11

The connect button requires PSM to work.

A.

TRUE

B.

FALSE

Full Access
Question # 12

Which component must be installed before the first CPM installation?

A.

PTA

B.

PSM

C.

PVWA

D.

EPM

Full Access
Question # 13

Which statements are correct about the PSM HTML5 gateway? (Choose two.)

A.

Smart card redirection is supported

B.

It does not support connections to target system where NLA is enabled on the PSM server

C.

SSH sessions cannot be established

D.

Printer redirection cannot be enabled

E.

It does not support session recording capabilities for applications that run outside a web browser

Full Access
Question # 14

Before the hardening process, your customer identified a PSM Universal Connector executable that will be required to run on the PSM.

Which file should you update to allow this to run?

A.

PSMConfigureAppLocker.xml

B.

PSMHardening.xml

C.

PSMAppConfig.xml

D.

PSMConfigureHardening.xml

Full Access
Question # 15

During the PSM installation process, Safes and a User are created.

In addition to Add Safes, Add/Update Users, Reset Users’ Passwords, and Activate Users, which authorization(s) does the Vault user installing the PSM need to enable them to be successfully created?

A.

Manage Vault File Categories Most Voted

B.

Manage Server File Categories

C.

Manage Directory Mapping, Manage Server File Categories

D.

Manage Directory Mapping, Manage Vault File Categories

Full Access
Question # 16

Which statement is correct about CPM behavior in a distributed Vault environment?

A.

CPMs should only access the primary Vault. When it is unavailable, CPM cannot access any Vault until another Vault is promoted as the new primary Vault.

B.

CPMs should access only the satellite Vaults.

C.

CPMs should only access the primary Vault. When it is unavailable, CPM cannot access any Vault until the original primary Vault is operational again.

D.

CPM should access all Vaults - primary and the satellite.

Full Access
Question # 17

To enable LDAP over SSL for a Vault when DNS lookups are blocked, which step must be completed?

A.

Add the FQDN & IP details for each LDAP host into the local hosts file of the Vault server. Most Voted

B.

Configure an AllowNonStandardFWAddresses rule in DBParm.ini on the Vault to allow outbound TCP 53 to the organization’s DNS servers.

C.

Ensure LDAP hosts added to the directory mapping configuration are defined using only IP addresses.

D.

Set the ReferralsDNSLookup parameter value to “No” in the directory configuration.

Full Access
Question # 18

What are the operating system prerequisites for installing CPM? Select all that apply.

A.

NET 3.51 Framework Feature

B.

Web Services Role

C.

Remote Desktop Services Role

D.

Windows 2008 R2 or higher.

Full Access
Question # 19

If a transparent user matches two different directory mappings, how does the system determine which user template to use?

A.

The system will use the template for the mapping listed first.

B.

The system will use the template for the mapping listed last.

C.

The system will grant all of the vault authorizations from the two templates.

D.

The system will grant only the vault authorizations that are listed in both templates

Full Access
Question # 20

Which utility should be used to register the Vault in Amazon Web Services?

A.

CAVaultManager Most Voted

B.

StorageManager

C.

CloudVaultManager

D.

CACert

Full Access
Question # 21

In a SIEM integration it is possible to use the fully-qualified domain name (FQDN) when specifying the SIEM server address(es)

A.

TRUE

B.

FALSE

Full Access
Question # 22

You are setting up a Linux host to act as an HTML 5 gateway for PSM sessions.

Which servers need to be trusted by the Linux host to secure communications through the gateway?

A.

PSM and PVWA

B.

PSM and CPM

C.

PVWA and Vault

D.

Vault and PSM

Full Access
Question # 23

Which SMTP address can be set on the Notification Settings page to re-invoke the ENE setup wizard after the initial Vault installation?

A.

255.255.255.255

B.

8.8.8.8

C.

192.168.1.1

D.

1.1.1.1

Full Access
Question # 24

For redundancy, you want to add a secondary RADIUS server.

What must you do to accomplish this?

A.

Add to the application settings of the PVWA web.config file.

B.

In the PVWA vault.ini file, list each RADIUS server host address in the "Addresses" attribute separated by commas.

C.

Open the DBParm.ini on the Vault server. Add the second RADIUS server configuration settings after the first one, separated by a comma. Most Voted

D.

In the PVWA web.config file, add the location element at the end of the config file. Set the path value to "Default Web Site/PasswordVault/api/auth/pkipn/logon".

Full Access
Question # 25

When configuring RADIUS authentication, which utility is used to create a file containing an encrypted version of the RADIUS secret?

A.

CAVaultManager

B.

CACert

C.

CreateAuthFile

D.

CreateCredFile

Full Access
Question # 26

In large-scale environments, it is important to enable the CPM to focus its search operations on specific Safes instead of scanning all Safes it sees in the Vault.

How is this accomplished?

A.

Administration Options > CPM Settings

B.

AllowedSafe Parameter on each platform policy

C.

MaxConcurrentConnection parameter on each platform policy

D.

Administration > Options > CPM Scanner

Full Access
Question # 27

Which user is enabled when replicating data between active and stand-by Vaults?

A.

DR

B.

Backup

C.

Operator

D.

Auditor

Full Access
Question # 28

Arrange the steps to failover to the DR CPM in the correct sequence.

Full Access
Question # 29

A customer wants to store PSM recordings for 100 days and estimates they will have 10 Windows sessions per day for 100 minutes each.

What is the minimum storage required for the Vault and PAReplicate for the PSM recordings?

A.

25 GB Most Voted

B.

250 GB

C.

500 GB

D.

5 GB

Full Access
Question # 30

What is the name of the account used to establish the initial RDP session from the end user client machine to the PSM server?

A.

PSMConnect

B.

PSMAdminConnect

C.

PSM

D.

The credentials the end user retrieved from the vault

Full Access
Question # 31

What is the recommended method to determine if a PVWA is unavailable and should be disabled in a load balancing pool?

A.

Monitor Port 443 on the PVWA server

B.

Monitor Port 1858 on the PVWA server

C.

Ping the PVWA server

D.

Monitor Port 3389 on the PVWA server

Full Access
Question # 32

This value needs to be added to the PVWA configuration file:

Assuming all CyberArk PVWA servers were installed using default paths/folders, which configuration file should you locate and edit to accomplish this?

A.

c:\inetpub\wwwroot\passwordvault\web.config

B.

c:\inetpub\wwwroot\passwordvault\services\web.config

C.

c:\cyberark\password vault web access\env\web.config

D.

c:\program files\cyberark\password vault web access\web.config

Full Access
Question # 33

What is required before the first CPM can be installed?

A.

The environment must have at least one Vault and one PVWA installed.

B.

The Vault environment must have at least one account stored in a safe.

C.

Custom platforms must be downloaded from the CyberArk Marketplace.

D.

The PSM component must be installed and proper functionality validated.

Full Access
Question # 34

What are the basic network requirements to deploy a CPM server?

A.

Port 1858 to Vault and Port 443 to PVWA

B.

Port 1858 only

C.

all ports to the Vault

D.

Port UDP/1858 to Vault and all required ports to targets and Port 389 to the PSM

Full Access
Question # 35

By default, the vault secure protocol uses which IP port and protocol.

A.

TCP/1858

B.

TCP/443

C.

UDP/1858

D.

TCP/80

Full Access
Question # 36

Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.

A.

Server Key

B.

Recovery Public Key

C.

Recovery Private Key

D.

Safe Key

Full Access
Question # 37

What is the purpose of the password Reconcile process?

A.

To test that CyberArk is storing accurate credentials for accounts.

B.

To change the password of an account according to organizationally defined password rules

C.

To allow CyberArk to manage unknown or lost credentials.

D.

To generate a new complex password.

Full Access
Question # 38

You are installing a CPM.

In addition to Add Safes, Add/Update Users, Reset Users’ Passwords and Manage Server File Categories, which Vault authorization(s) does a CyberArk user need to install the CPM?

A.

Manage Directory Mapping

B.

Activate Users

C.

Backup All Safes, Restore All Safes

D.

Audit Users, Add Network Areas

Full Access
Question # 39

If a customer has one data center and requires fault tolerance, how many PVWAs should be deployed?

A.

two or more

B.

one PVWA cluster

C.

one

D.

two PVWA clusters

Full Access
Question # 40

What is a valid combination of primary and secondary layers of authentication to a company's two-factor authentication policy?

A.

RSA SecurID Authentication (in PVWA) and LDAP Authentication

B.

CyberArk Authentication and RADIUS Authentication

C.

Oracle SSO (in PVWA) and SAML Authentication

D.

LDAP Authentication and RADIUS Authentication

Full Access