100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cyber Ark Sentry Exam 100% CORRECT SOLUTIONS VERIFIED

Rating
-
Sold
-
Pages
32
Grade
A+
Uploaded on
01-05-2024
Written in
2023/2024

yber Ark Sentry Exam 100% CORRECT SOLUTIONS VERIFIED Core Privileged Access Security (PAS) Components - ANSWER EPV + PSM +PTA Enterprise Password Vault (EPV) = - ANSWER Digital Vault + PVWA + CPM EPV - ANSWER Enterprise Password Vault Enterprise Password Vault - ANSWER A hardened and secured digital vault used to store privileged account information. CPM - ANSWER Central Policy Manager Central Policy Manager - ANSWER Performs password changes and SSH key rotations on devices based on the policies set by Vault Administrators. PVWA - ANSWER Password Vault Web Access Password Vault Web Access - ANSWER The web interface used by Administrators to perform administrative tasks and by end users to gain access to privileged account information. PSM - ANSWER Privileged Session Management Privileged Session Management - ANSWER Prevent cyber attacks by isolating desktops from sensitive target machines. Creates accountability and control over privileged session access with policies, workflows, and privileged single sign on. Delivers continuous monitoring and compliance with session recordings with zero footprint on target machines. CPM and PVWA Information Exchange - ANSWER Do not exchange policy information directly. Policy changes are saved to the Vault. Each component refreshes its local cache of policies via the VPN. PVWA/CPM Port - ANSWER TCP/443 Possible Reasons for Multiple CPMs - ANSWER Isolated network segments WAN link latency Scalability Eight Security Controls of CyberArk - ANSWER 1. Isolate and harden the digital vault server 2. Use 2-factor authentication 3. Restrict access to component servers 4. Limit privileges and points of administration 5. Protect sensitive accounts and encryption keys 6. Use secure protocols 7. Monitor logs for irregularities 8. Create and periodically test a DR plan What types of attacks does isolating the digital vault server protect against? - ANSWER Pass-the-hash and golden ticket (leverage Kerberos protocol) Principles of Isolating and Hardening the Digital Vault Server - ANSWER 1. Not be and never have been a member of a Windows domain 2. No third-party software 3. Network traffic is restricted to CyberArk protocols 4. Physical servers What types of attacks does two-factor authentication protect against? - ANSWER Key loggers or more advanced tools that are capable of harvesting plaintext passwords

Show more Read less
Institution
Cyber Ark
Course
Cyber Ark











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Ark
Course
Cyber Ark

Document information

Uploaded on
May 1, 2024
Number of pages
32
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
wilberforce

Also available in package deal

Thumbnail
Package deal
Gift bundle
-
9 2024
$ 89.41 More info

Get to know the seller

Seller avatar
wilberforce Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
0
Documents
289
Last sold
11 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions