Cyber Ark PAS Install and Configure TEST 100% CORRECT SOLUTIONS VERIFIED
Cyber Ark PAS Install and Configure TEST 100% CORRECT SOLUTIONS VERIFIED EPV - ANSWER Enterprise Password Vault PSM - ANSWER Privilege Session Manager EPV = - ANSWER EPV = Digital Vault + PVWA +CPM PVWA - ANSWER Password Vault Web Access Portal CPM - ANSWER Central Policy Manager Enterprise Password Vault (EPV) - ANSWER A hardened and secured digital vault used to store privileged account information Central Policy Manager (CPM) - ANSWER Performs password changes and SSH key rotations on devices based on the policies set by Vault Administrators Password Vault Web Access (PVWA) - ANSWER The web interface used by Administrators to perform administrative tasks and by end users to gain access to privileged account information Dual Control - ANSWER Manager approval for access at time of request Privileged Session Management (PSM) - ANSWER 1. Isolate - Prevent cyber attacks by isolating desktops from sensitive target machines 2. Control - Create accountability and control over privileged sessions access with policies, workflows, and privileged SSO 3. Monitor - Deliver continuous monitoring and compliance with session recording with zero footprint on target machines 3 Main Aspects of PSM - ANSWER Isolate, monitor, and control Steps of PSM - ANSWER 1. Logon through PVWA 2. RDP over SSL Connection to PSM 3. Fetch credentials from vault 4. Connect using native protocols 5. Store session recording 6. Logs forwarded to SIEM/SysLog CyberArk Proprietary Protocol or VPN Port - ANSWER TCP_1858 CPM Communication to Target Systems - ANSWER Their native protocols CPM Access to UNIX or SSH systems - ANSWER P-link P-link - ANSWER A command line version of putty 8 Key Security Fundamentals for CyberArk Deployment - ANSWER 1. Isolate and harden the digital vault server 2. Use 2-factor authentication 3. Restrict access to component servers 4. Limit privileges and points of administration 5. Protect sensitive accounts and encryption keys 6. User secure protocols 7. Monitor logs for irregularities 8. Create and periodically test a DR plan 1st Key Security Fundamental for CyberArk Deployment - ANSWER Isolate and harden the digital vault server 2nd Key Security Fundamental for CyberArk Deployment - ANSWER Use 2-factor authentication 3rd Key Security Fundamental for CyberArk Deployment - ANSWER Restrict access to component servers 4th Key Security Fundamental for CyberArk Deployment - ANSWER Limit privileges and points of administration 5th Key Security Fundamental for CyberArk Deployment - ANSWER Protect sensitive accounts and encryption keys 6th Key Security Fundamental for CyberArk Deployment - ANSWER User secure protocols 7th Key Security Fundamental for CyberArk Deployment - ANSWER Monitor logs for irregularities 8th Key Security Fundamental for CyberArk Deployment - ANSWER Create and periodically test a DR plan Digital Vault Layers - ANSWER Tamper proof auditability, hierarchical encryption, session encryption, authentication, firewall, segregation of duties, and comprehensive monitoring Number of Digital Vault Layers - ANSWER 7 Percentage of Encryption Processes th
Geschreven voor
- Instelling
- Cyber
- Vak
- Cyber
Documentinformatie
- Geüpload op
- 16 april 2024
- Aantal pagina's
- 5
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
cyber ark pas install and configure test 100
-
cyber ark pas install and configure test 100 co
-
cyber ark pas install and configure test 100 co
Ook beschikbaar in voordeelbundel