11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CAU302 Exam Dumps - CyberArk Defender + Sentry

Question # 4

What is the maximum number of levels of authorizations you can set up in Dual Control?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 5

Which service should NOT be running on the DR Vault when the primary Production Vault is up?

A.

PrivateArk Database

B.

PrivateArk Server

C.

CyberArk Vault Disaster Recovery (DR) service

D.

CyberArk Logical Container

Full Access
Question # 6

In accordance with best practice. SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow CPM to manage root accounts.

A.

Create a privileged account on the target server Allow this account the ability to SSH directly from the CPM machine Configure this account as the Reconcile account of the target server's root account.

B.

Create a non-privileged account on the target server Allow this account the ability to SSH directly from the CPM machine. Configure this account as the Logon account of the target server's root account

C.

Configure the Unix system to allow SSH logins.

D.

Configure the CPM to allow SSH logins

Full Access
Question # 7

The DR module allows an integration with Enterprise Backup software

A.

TRUE

B.

FALSE

Full Access
Question # 8

PSM generates recordings on the Vault server in real time.

A.

True

B.

False

Full Access
Question # 9

Which file is used to integrate the Vault with the RADIUS server?

A.

radius.ini

B.

PARagent.ini

C.

ENEConf.ini

D.

dbparm.ini

Full Access
Question # 10

One of your users is receiving the error message “ITATS006E Station is suspended for User jsmith” when

attempting to sign in to the pvwa. Which utility would you use to correct this problem?

A.

createcredfile.exe

B.

cavaultmanager.exe

C.

PrivateArk

D.

PVWA

Full Access
Question # 11

PSM requires the Remote Desktop Session Host role service.

A.

TRUE

B.

FALSE

Full Access
Question # 12

To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers need to be configured to communicate with the Primary Vault and Satellite Vaults. What file needs to be changed on the PVWA to enable this setup?

A.

Vault.ini

B.

dbparm.ini

C.

pvwa.ini

D.

Satellite.ini

Full Access
Question # 13

What is the proper way to allow the Vault to resolve host names?

A.

Define a DNS server.

B.

Define a WINS server.

C.

Define the local hosts file.

D.

The Vault cannot resolve host names due to security standards.

Full Access
Question # 14

It is impossible to override Master Policy settings for a Platform

A.

TRUE

B.

FALSE

Full Access
Question # 15

Any user can monitor live sessions in real time when initiating RDP connection via Secure Connect through PSM.

A.

True

B.

False

Full Access
Question # 16

Which service should NOT be running on the DR Vault when the primary production Vault is up?

A.

PrivateArk Database

B.

PrivateArk Server

C.

CyberArk Vault Disaster Recovery Service

D.

CyberArk Logical Container

Full Access
Question # 17

Which of the following are prerequisites for installing PVWA Check all that Apply

A.

Web Services Role

B.

NET 4.5.1 Framework Feature

C.

Remote Desktop Services Role

D.

Windows BitLocker

Full Access
Question # 18

Multiple PVWA servers are always all active

A.

TRUE

B.

FALSE

Full Access
Question # 19

A Reconcile Account can be specified in the Master Policy.

A.

TRUE

B.

FALSE

Full Access
Question # 20

Which of the following sends out Simple Network Management Protocol (SNMP) traps?

A.

PrivateArk Remote Control Agent

B.

PrivateArk Server

C.

CyberArk Event Notification Engine

D.

CyberArk SNMP agent

Full Access
Question # 21

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the

accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and

connect buttons on those passwords at any time without confirmation. The members of the AD group

OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an

emergency basis, but only with the approval of a member of OperationsManagers. The members of

OperationsManagers never need to be able to use the show, copy or connect buttons themselves.

Which safe permissions do you need to grant to OperationsManagers? (Choose all that apply.)

A.

Use Accounts

B.

Retrieve Accounts

C.

List Accounts

D.

Authorize Password Requests

E.

Access Safe without Authorization

Full Access
Question # 22

Accounts Discovery allows secure connections to domain controllers.

A.

TRUE.

B.

FALSE

Full Access
Question # 23

When managing SSH keys. CPM automatically pushes the Public Key to the target system.

A.

TRUE

B.

FALSE

Full Access
Question # 24

If a password is changed manually on a server, bypassing the CPM, how would you configure the account so

that the CPM could resume management automatically?

A.

Configure the Provider to change the password to match the Vault’s Password

B.

Associate a reconcile account and configure the platform to reconcile automatically

C.

Associate a logon account and configure the platform to reconcile automatically

D.

Run the correct auto detection process to rediscover the password

Full Access
Question # 25

In version 10.7 the correct order of installation for components changed. Make the necessary corrections to the list below to show the new installation order.

Select and Place:

Full Access
Question # 26

The vault does not support Subnet Based Access Control.

A.

TRUE

B.

FALSE

Full Access
Question # 27

A vault admin received an email notification that a password verification process has failed Which service sent the message?

A.

The PrivateArk Server Service on the Vault.

B.

The CyberArk Password Manager service on the Components Server.

C.

The CyberArk Event Notification Engine Service on the Vault

D.

The CyberArk Privileged Session Manager service on the Vault.

Full Access
Question # 28

During the process of installing the CPM, you will be asked to provide the credentials for an administrate user in the Vault. What are these credentials used for?

A.

The credentials will be used later by the CPM to retrieve passwords from the Vault

B.

The credentials are by the installer to register the CPM in the CyberArk database

C.

The credentials are used by the installer to authenticate to the Vault and create the CPM environment (safes, users, etc.)

D.

The credentials will be used later by the CPM to update passwords in the Vault

Full Access
Question # 29

What is the name of the Platform parameter that determines the amount of time a person is allowed to use a One Time Password?

A.

MinValidityPeriod

B.

Interval

C.

ImmediateInterval

D.

Timeout

Full Access
Question # 30

Multiple PSM Servers can be load balanced.

A.

TRUE

B.

FALSE

Full Access
Question # 31

Which file is used to configure new firewall rules on the Vault?

A.

firewall.ini

B.

paragent.ini

C.

dbparm.ini

D.

padr.ini

Full Access
Question # 32

Which Master Policy?

A.

Password Expiration Time

B.

Enabling and Disabling of the Connection Through the PSM

C.

Password Complexity

D.

The use of "One-Time-Passwords"

Full Access
Question # 33

PSM requires the Remote Desktop Gateway role service.

A.

TRUE

B.

FALSE

Full Access
Question # 34

In the vault each password is encrypted with a unique encryption key.

A.

TRUE

B.

FALSE

Full Access