CAD Practice Test Video Answers
1. B
CyberArk Vault stores and protects privileged credentials securely.
2. A
The least privilege principle minimizes access risks.
3. B
CPM handles password management and automated rotation.
4. B
LDAP allows centralized authentication and policy enforcement.
5. B
PSM monitors and records privileged sessions for audit.
6. B
Dual Control enforces two-user approval for password access.
7. A
SIEM integration enables real-time privileged activity detection.
8. B
PSM Connect manages communication with target systems.
9. A
A Safe stores privileged accounts securely.
10. A
Accounts must be assigned to Safes with proper permissions.
11. A
Failed verification leaves the password unchanged and alerts.
12. B
High-security policies require frequent rotations.
13. A
Immediate disablement and audit review ensure protection.
14. A
List Accounts limits users to viewing without retrieval.
15. B
CPM automates password changes.
16. A
PVWA offers secure web-based management access.
17. B
PCI DSS mandates privileged access controls.
18. C
PSM records and replays privileged sessions.
19. A
Dual Control requires a second user approval.
20. A
The utility simplifies bulk account imports.
21. A
PTA detects anomalies in privileged activity.
22. A
Master Policy defines organization-wide credential rules.
23. D
Password Change History confirms compliance rotations.
24. A
Dual Vault ensures redundancy and disaster recovery.
25. A
Secure channels protect CPM communications.
26. A
Access revocation is immediate after permission removal.
27. B
PVWA manages check-in/check-out functionality.
28. A
Hands-on simulation boosts adult learning retention.
29. A
PVWA notifications can be customized by users.
30. A
Defining members and access precedes Safe creation.
31. A
Practical demonstrations improve mentoring success.
32. A
Scenario-based testing evaluates true proficiency.
33. A
Regular audits enforce compliance adherence.
34. A
Vault Administrators maintain system health.
35. A
CCP enables secure app credential retrieval.
36. A
CPM enforces unique password generation rules.
37. A
MFA enhances authentication beyond passwords.
38. A
Automated onboarding reflects successful adoption.
39. A
Owners manage policies; members have limited rights.