You are on page 1of 3

Name: Anji Reddy Alavala QUIZ-2

mail id: anjireddy2103@gmail.com


Date of Submission: 13.12.2022

QUIZ-2

1. SMTP uses which port for its communication over the network. 25
• 3389
• 22
• 25
• 636

2. PSM recordings gets saved temporarily in PSM server. True


• True
• False

3. Safe naming convention should be less than 28 characters. True


• True
• False

4. In order to avoid conflicts with the hardening process, third party applications like antivirus &
backup agents should be installed on the vault server. False
• True
• False

5. Which is the file below to get the location of the safes directory? Tsparm.ini
• Dbparm.ini
• Passparm.ini
• Paragent.ini
• Tsparm.ini
6. State the reason why do we do not join CyberArk vault server to domain?
Because the vault server is LOCAL server, hence do not join the AD and any malicious attack
happened in the CyberArk that malicious attack does not reach the vault server.
Name: Anji Reddy Alavala QUIZ-2
mail id: anjireddy2103@gmail.com
Date of Submission: 13.12.2022

7. What is the installation order of CyberArk components before v10.7?


VAULT
CPM
PVWA
PSM

8. What do you mean by standalone architecture of CyberArk vault?


In standalone architecture we have two servers is there one is Prod.EPV is active and second one is
DR EPV is stand by (idle).

9. CPM uses which port for its communication with windows target server over the network?
139, 445

10. What are the pre-requisites to be considered before installing CyberArk Vault?
It should be LOCAL server do not join the AD, Vault binaries (Master CD, Operator CD,
License.xml), should be static IP allocated manually, Network hardening only should be there
(IP4&IP6), DNS and DHCP should not install, 3rd party apps should not install.

11. What is IIS and why is it required?


PVWA is a web portal service hence it requires IIS service.

12. What is DR replication?


Data will be replicated continuously from Primary Vault to DR Vault for every 5 min. DR Vault
constantly talks with Primary Vault through heart beat mechanism to ensure the it is alive or not, if it
is not alive then DR Vault act as a Primary Vault and Primary Vault act as a DR Vault vice versa.
13. When do we make use of master key in CyberArk?
Master key is used in disaster situations. EX: Administrator forgot the password will use master key
to resume the administrator password recovery.

14. Which keys comes under operator CD?


Master key, rec.pub key, rec.prv.key
Name: Anji Reddy Alavala QUIZ-2
mail id: anjireddy2103@gmail.com
Date of Submission: 13.12.2022

15. Which is the main configuration file of disaster recovery vault? PADR.ini

• Dpaprm.ini
• PADR.ini
• Web.config
• Paragent.ini

You might also like