Cyber Ark Sentry Final Exam 100% CORRECT SOLUTIONS VERIFIED
Cyber Ark Sentry Final Exam 100% CORRECT SOLUTIONS VERIFIED Multiple PVWA servers are always all active - ANSWER true Within the Vault each password is encrypted by - ANSWER It own unique key. In an SMTP integration it is recommended to use the FQDN when specifying the SMTP server address(es) - ANSWER true The vault supports a number of dual factor authentication methods. - ANSWER true During LDAP/S integration you should specify the FQDN of Domain Controller - ANSWER true A stand alone Vault server requires DNS services to operate properly - ANSWER false The DR module allows an integration with Enterprise Backup software - ANSWER false Does CyberArk need service accounts on each server to change passwords? - ANSWER No, the CPM uses account information stored in the vault to login and change the account's password using its own credentials. The connect button requires PSM to work - ANSWER FALSE Which keys are required to be present in order to start the PrivateArk Server Service? - ANSWER Server Key Recovery Public Key A vault administrator wants to change the PSM server ID to comply with a naming standard. What is the process for changing the PSM server ID? - ANSWER First, login to the PVWA, browse to administration, system config, options, PSM, Configured PSM servers and select the PSM Server you need to change from the list of servers. In the properties pane, set the value of the ID property to the new Server ID, click Apply and OK. Next, edit the basic_ file located on the PSM server in the PSM root directory and update the PSMServerID parameter with the new Server ID, save the file and restarted the "CyberArk PSM" server on PSM server. Multiple PVWA servers provide automatic load balancing. - ANSWER false The vault provides tamper-proof audit trail. - ANSWER True The following applications are included with PSM and require no additional installation or configuration. - ANSWER SQL Plus RDP Putty WinSCP If a transparent user matches two different directory mappings, how does the system determine which user template to use? - ANSWER The system will use the template for the mapping listed first. What would be a good use case for a High Availability vault? - ANSWER Recovery Time Objectives or Recovery Point Objectives are eat or near zero. Name two ways of viewing the ITAlog - ANSWER 1. Log into the vault locally and navigate to the Server folder under the PrivateArk install location. 2. Access the System Safe from PrivateArk client. What is the purpose of the PrivateArk Database service? - ANSWER Maintains Vault metadata. The vault uses a modified version of the Microsoft Windows firewall. - ANSWER true What is the best practice for storing the Master CD? - ANSWER Store the CD in a secure location, such as a physical safe.
Written for
- Institution
- Cyber Ark
- Course
- Cyber Ark
Document information
- Uploaded on
- May 1, 2024
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cyber ark sentry final exam 100 correct soluti
-
cyber ark sentry final exam 100 correct solut
Also available in package deal