Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

CAU302 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

CAU302 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: CyberArk Defender + Sentry
  • Last Update: May 2, 2024
  • Questions and Answers: 237
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

CAU302 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

CAU302 Practice Exam Questions with Answers CyberArk Defender + Sentry Certification

Question # 6

dbparm.ini is the main configuration file for the vault.

A.

TRUE

B.

FALSE

Full Access
Question # 7

Which file is used to open up a non-standard Firewall port to the Vault?

A.

dbparm.ini

B.

PARagent.ini

C.

passparm.ini

D.

Vault.ini

Full Access
Question # 8

The Vault needs to send SNMP traps to an SNMP solution. In which configuration file do you set the IP address of the SNMP solution?

A.

PARAgent.ini

B.

dbparm.ini

C.

ENEConf.ini

D.

my.ini

Full Access
Question # 9

An SMTP integration allows you to forward audit records from the vault to the SIEM.

A.

TRUE

B.

FALSE

Full Access
Question # 10

What is the primary purpose of Dual Control?

A.

Reduced risk of credential theft

B.

More frequent password changes

C.

Non-repudiation (individual accountability)

D.

To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorization

Full Access
Question # 11

What is the chief benefit of PSM?

A.

Privileged session isolation

B.

Automatic password management

C.

Privileged session recording

D.

Privileged session isolation and privileged session recording

Full Access
Question # 12

Match the log file name with the CyberArk Component that generates the log.

CAU302 question answer

Full Access
Question # 13

One of your users is receiving the error message “ITATS006E Station is suspended for User jsmith” when

attempting to sign in to the pvwa. Which utility would you use to correct this problem?

A.

createcredfile.exe

B.

cavaultmanager.exe

C.

PrivateArk

D.

PVWA

Full Access
Question # 14

Multiple PVWA servers can be load balanced.

A.

TRUE

B.

FALSE

Full Access
Question # 15

The following applications are pre-configured to work with PSM. but first need to be installed on the PSM server.

A.

SQL Plus

B.

Putty

C.

RDP

D.

WinSCP

E.

Toad

F.

VMWare vSphere Client

G.

Microsoft SQL Management Studio

Full Access
Question # 16

CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.

A.

TRUE

B.

FALSE

Full Access
Question # 17

Which file is used to integrate the Vault with the RADIUS server?

A.

radius.ini

B.

PARagent.ini

C.

ENEConf.ini

D.

dbparm.ini

Full Access
Question # 18

CyberArk recommends implementing object level access control on all Safes.

A.

True

B.

False

Full Access
Question # 19

In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?

A.

AAM Credential Provider (previously known as AIM Credential Provider)

B.

ExportVaultData utility

C.

PAReplicate utility

D.

Central Policy Manager

Full Access
Question # 20

Multiple PSM Servers can be load balanced.

A.

TRUE

B.

FALSE

Full Access
Question # 21

Which report could show all audit data in the vault?

A.

Privileged Account Compliance Status Report

B.

Activity Log

C.

Privileged Account Inventory Report

D.

Application Inventory Report

Full Access
Question # 22

In an SMTP integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SMTP server addresses).

A.

TRUE

B.

FALSE

Full Access
Question # 23

What is the name of the Platform parameter that controls how long a password will stay valid when One Time Passwords are enabled via the Master Policy?

A.

MinValidityPeriod

B.

Interval

C.

Immediatelnterval

D.

Timeout

Full Access
Question # 24

PSM captures a record of each command that was issues in SQL Plus.

A.

TRUE

B.

FALSE

Full Access
Question # 25

Using the SSH Key Manager it is possible to allow CPM to manage SSH Keys similarly to passwords.

A.

TRUE

B.

FALSE

Full Access
Question # 26

To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers must to be configured to communicate with the Primary Vault and Satellite Vaults. Which file needs to be changed on the PVWA to enable this setup?

A.

Vault.ini

B.

dbparm.ini

C.

pvwa.ini

D.

Satellite.ini

Full Access
Question # 27

SAFE Authorizations may be granted to___________________.

Select all that apply.

A.

Vault Users

B.

Vault Groups

C.

LDAP Users

D.

LDAP Groups

Full Access
Question # 28

Which of the following is considered a prerequisite for installing PSM?

A.

IIS web services role

B.

HTML5 Gateway

C.

Provider

D.

Remote Desktop Services

Full Access
Question # 29

According to the default web options settings, which group grants access to the reports page?

A.

PVWAMonitor

B.

PVWAUsers

C.

Auditors

D.

Vault administrators

Full Access
Question # 30

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe The members of the AD group UnixAdmms need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation The members of the AD group OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of OperationsManagers The members of OperationsManagers never need to be able to use the show, copy or connect buttons themselves.

Which safe permissions do you need to grant to UnixAdmins? Check all that apply

A.

Use Accounts

B.

Retrieve Accounts

C.

List Accounts

D.

Authorize Password Requests

E.

Access Safe without Authorization

Full Access
Question # 31

After the Vault Server is installed, the Microsoft Windows Firewall is now commandeered by the Vault Can the administrator change these firewall rules?

A.

Yes, but the administrator can only modify the firewall rules by editing the dbparm.ini file and the restarting the vault

B.

Yes, the administrator can still modify Firewall rules via the Windows Firewall interface

C.

No, the Vault does not permit any changes to the Firewall due to security requirements

D.

Yes, but the administrator can only modify the firewall rules by editing the FirewallRuIes mi file and the restarting the vault

Full Access
Question # 32

When using multiple Central Policy Managers (CPM), which one of the following Safes is shared by all CPMs?

A.

PasswordManagerSharedSafe

B.

PasswordManager_Pending

C.

PasswordManager_workspace

D.

PasswordManager_ADInternal

Full Access
Question # 33

If a password is changed manually on a server, bypassing the CPM, how would you configure the account so

that the CPM could resume management automatically?

A.

Configure the Provider to change the password to match the Vault’s Password

B.

Associate a reconcile account and configure the platform to reconcile automatically

C.

Associate a logon account and configure the platform to reconcile automatically

D.

Run the correct auto detection process to rediscover the password

Full Access
Question # 34

When working with the CyberArk High Availability Cluster, which services are running on the passive node?

A.

Cluster Vault Manager and PrivateArk Database

B.

Cluster Vault Manager, PrivateArk Database and Remote Control Agent

C.

Cluster Vault Manager

D.

Cluster Vault Manager and Remote Control Agent

Full Access
Question # 35

A safe was recently created by a user who is a member of the LDAP Vault Administrators group. Which of the

following users does not have access to the newly created safe by default?

A.

Master

B.

Administrator

C.

Auditor

D.

Backup

Full Access