Looking for more? Click here to get the full PDF with 142+ practice questions for $10 for offline study and deeper preparation.
Question 1
Which parameter controls how often the CPM looks for Soon-to-be-expired Passwords that need to be changed?
A. HeadStartInterval
B. Interval
C. ImmediateInterval
D. The CPM does not change the password under this circumstance
Show Answer
Correct Answer:
B. Interval
Question 2
Which of the following components can be used to create a tape backup of the Vault?
A. Disaster Recovery
B. Distributed Vaults
C. Replicate
D. High Availability
Show Answer
Correct Answer:
C. Replicate
Question 3
Which one of the following reports is NOT generated by using the PVWA?
A. Account Inventory
B. Application Inventory
C. Safes List
D. Compliance Status
Show Answer
Correct Answer:
C. Safes List
Question 4
A Vault administrator have associated a logon account to one of their Unix root accounts in the vault. When attempting to verify the root account's password the Central Policy Manager (CPM) will:
A. ignore the logon account and attempt to log in as root
B. prompt the end user with a dialog box asking for the login account to use
C. log in first with the logon account, then run the SU command to log in as root using the password in the Vault
D. none of these
Show Answer
Correct Answer:
C. log in first with the logon account, then run the SU command to log in as root using the password in the Vault
Question 5
You are creating a new Rest API user that utilizes CyberArk Authentication. What is a correct process to provision this user?
A. Private Ark Client > Tools > Administrative Tools > Users and Groups > New > User
C. PVWA > User Provisioning > LDAP Integration > Add Mapping
D. PVWA > User Provisioning > Users and Groups > New > User
Show Answer
Correct Answer:
A. Private Ark Client > Tools > Administrative Tools > Users and Groups > New > User
Question 6
You are creating a Dual Control workflow for a team's safe. Which safe permissions must you grant to the Approvers group?
A. List accounts, Authorize account request
B. Retrieve accounts, Access Safe without confirmation
C. Retrieve accounts, Authorize account request
D. List accounts, Unlock accounts
Show Answer
Correct Answer:
A. List accounts, Authorize account request
Question 7
Which is the primary purpose of exclusive accounts?
A. Reduced risk of credential theft
B. More frequent password changes
C. Non-repudiation (individual accountability)
D. To force a 'collusion to commit' fraud ensuring no single actor may use a password without authorization
Show Answer
Correct Answer:
C. Non-repudiation (individual accountability)
Question 8
Which Automatic Remediation is configurable for a PTA detection of a `Suspected Credential Theft`?
A. Add to Pending
B. Rotate Credentials
C. Reconcile Credentials
D. Disable Account
Show Answer
Correct Answer:
B. Rotate Credentials
Question 9
VAULT authorizations may be granted to ____________________. (Choose all that apply.)
A. Vault Users
B. Vault Groups
C. LDAP Users
D. LDAP Groups
Show Answer
Correct Answer:
A. Vault Users
Question 10
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?
A. Configure the Provider to change the password to match the Vault's Password
B. Associate a reconcile account and configure the platform to reconcile automatically
C. Associate a logon account and configure the platform to reconcile automatically
D. Run the correct auto detection process to rediscover the password
Show Answer
Correct Answer:
B. Associate a reconcile account and configure the platform to reconcile automatically
Question 11
Which usage can be added as a service account platform?
A. Kerberos Tokens
B. IIS Application Pools
C. PowerShell Libraries
D. Loosely Connected Devices
Show Answer
Correct Answer:
B. IIS Application Pools
Question 12
In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?
A. True
B. False. Because the user can also enter credentials manually using Secure Connect
C. False. Because if credentials are not stored in the vault, the PSM will log into the target device as PSMConnect
D. False. Because if credentials are not stored in the vault, the PSM will prompt for credentials
Show Answer
Correct Answer:
B. False. Because the user can also enter credentials manually using Secure Connect
Question 13
When Dual Control is enabled a user must first submit a request in the Password Vault Web Access (PVWA) and receive approval before being able to launch a secure connection via PSM for Windows (previously known as RDP Proxy).
A. True
B. False, a user can submit the request after the connection has already been initiated via the PSM for Windows
Show Answer
Correct Answer:
A. True
Question 14
When a DR Vault Server becomes an active vault, it will automatically fail back to the original state once the Primary Vault comes back online.
A. True; this is the default behavior
B. False; this is not possible
C. True, if the AllowFailback setting is set to "yes" in the padr.ini file
D. True, if the AllowFailback setting is set to "yes" in the dbparm.ini file
Show Answer
Correct Answer:
B. False; this is not possible
Question 15
You have been asked to turn off the time access restrictions for a safe. Where is this setting found?
A. PrivateArk
B. RestAPI
C. Password Vault Web Access (PVWA)
D. Vault
Show Answer
Correct Answer:
A. PrivateArk
Question 16
Target account platforms can be restricted to accounts that are stored in specific Safes using the AllowedSafes property.
A. TRUE
B. FALSE
Show Answer
Correct Answer:
A. TRUE
Question 17
To enable the Automatic response `Add to Pending` within PTA when unmanaged credentials are found, what are the minimum permissions required by PTAUser for the PasswordManager_pending safe?
A. List Accounts, View Safe members, Add accounts (includes update properties), Update Account content, Update Account properties
B. List Accounts, Add accounts (includes update properties), Delete Accounts, Manage Safe