Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

CAU302 Exam Dumps - CyberArk Defender + Sentry

Go to page:
Question # 25

In version 10.7 the correct order of installation for components changed. Make the necessary corrections to the list below to show the new installation order.

Select and Place:

Full Access
Question # 26

The vault does not support Subnet Based Access Control.

A.

TRUE

B.

FALSE

Full Access
Question # 27

A vault admin received an email notification that a password verification process has failed Which service sent the message?

A.

The PrivateArk Server Service on the Vault.

B.

The CyberArk Password Manager service on the Components Server.

C.

The CyberArk Event Notification Engine Service on the Vault

D.

The CyberArk Privileged Session Manager service on the Vault.

Full Access
Question # 28

During the process of installing the CPM, you will be asked to provide the credentials for an administrate user in the Vault. What are these credentials used for?

A.

The credentials will be used later by the CPM to retrieve passwords from the Vault

B.

The credentials are by the installer to register the CPM in the CyberArk database

C.

The credentials are used by the installer to authenticate to the Vault and create the CPM environment (safes, users, etc.)

D.

The credentials will be used later by the CPM to update passwords in the Vault

Full Access
Question # 29

What is the name of the Platform parameter that determines the amount of time a person is allowed to use a One Time Password?

A.

MinValidityPeriod

B.

Interval

C.

ImmediateInterval

D.

Timeout

Full Access
Question # 30

Multiple PSM Servers can be load balanced.

A.

TRUE

B.

FALSE

Full Access
Question # 31

Which file is used to configure new firewall rules on the Vault?

A.

firewall.ini

B.

paragent.ini

C.

dbparm.ini

D.

padr.ini

Full Access
Question # 32

Which Master Policy?

A.

Password Expiration Time

B.

Enabling and Disabling of the Connection Through the PSM

C.

Password Complexity

D.

The use of "One-Time-Passwords"

Full Access
Go to page: