Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

CAU302 CyberArk Defender + Sentry Questions and Answers

Questions 4

When planning to load balance at least 2 PSM Servers in an "in-domain" deployment, is it required to move the PSMConnect and PSMAdminConnect users to the domain level?

Options:

A.

Yes. but only the PSMConnect user must be moved to the domain.

B.

No. this is the customers decision and will work with local or domain based users.

C.

Yes, both PSMConnect and PSMAdminConnect users should be moved to the domain

D.

No. both accounts must be left as local accounts.

Buy Now
Questions 5

In an SMTP integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SMTP server addresses).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 6

When managing SSH keys. CPM automatically pushes the Public Key to the target system.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 7

Where does the Vault administrator configure in Password Vault Web Access (PVWA) the Fully Qualified Domain Name (FQDN) of the domain controller during LDAP/S integration?

Options:

A.

PVWA > Platform Management > LDAP Integration

B.

PVWA > Administration > LDAP Integration

C.

PVWA > Administration > Options > LDAP Integration

D.

PVWA > LDAP Integration

Buy Now
Questions 8

PSM requires the Remote Desktop Session Host role service.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 9

Which service should NOT be running on the DR Vault when the primary Production Vault is up?

Options:

A.

PrivateArk Database

B.

PrivateArk Server

C.

CyberArk Vault Disaster Recovery (DR) service

D.

CyberArk Logical Container

Buy Now
Questions 10

Time of day of week restrictions on when password changes can occur are configured in ________________.

Options:

A.

The Master Policy

B.

The Platform settings

C.

The Safe settings

D.

The Account Details

Buy Now
Questions 11

A SIEM integration allows you to forward ITALOG records to a monitoring solution.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 12

Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)

Options:

A.

Suspected Credential Theft

B.

Over-Pass-The-Hash

C.

Golden Ticket

D.

Unmanaged Privileged Access

Buy Now
Questions 13

Which CyberArk components or products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts'? Select all that apply.

Options:

A.

Discovery and Audit (DNA)

B.

Auto Detection (AD)

C.

Export Vault Data (EVD)

D.

On Demand Privileges Manager (OPM)

E.

Accounts Discovery

Buy Now
Questions 14

Which file is used to open up a non-standard Firewall port to the Vault?

Options:

A.

dbparm.ini

B.

PARagent.ini

C.

passparm.ini

D.

Vault.ini

Buy Now
Questions 15

When a DR vault server becomes an active vault, it will automatically fail bacK to the original state once the primary vault comes back online.

Options:

A.

True, this is the default behavior

B.

False, this is not possible

C.

True, if the 'AllowFailback' setting is set to yes in the PADR.ini file.

D.

True, if the 'AllowFailback' setting is set to yes in the dbparm ini file.

Buy Now
Questions 16

One of your users is receiving the error message “ITATS006E Station is suspended for User jsmith” when

attempting to sign in to the pvwa. Which utility would you use to correct this problem?

Options:

A.

createcredfile.exe

B.

cavaultmanager.exe

C.

PrivateArk

D.

PVWA

Buy Now
Questions 17

If a password is changed manually on a server, bypassing the CPM, how would you configure the account so

that the CPM could resume management automatically?

Options:

A.

Configure the Provider to change the password to match the Vault’s Password

B.

Associate a reconcile account and configure the platform to reconcile automatically

C.

Associate a logon account and configure the platform to reconcile automatically

D.

Run the correct auto detection process to rediscover the password

Buy Now
Questions 18

What are the operating system prerequisites for installing CPM? Select all that apply.

Options:

A.

NET 3.51 Framework Feature

B.

Web Services Role

C.

Remote Desktop Services Role

D.

Windows 2008 R2 or higher

Buy Now
Questions 19

The Vault supports multiple instances of the following components Choose all that Apply

Options:

A.

PVWA

B.

CPM

C.

PSM

D.

AIM Provider

Buy Now
Questions 20

It is possible to control the hours of the day during which a safe may be used.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 21

Multiple PVWA servers can be load balanced.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault. For which purpose are these credentials used?

Options:

A.

The credentials will be used later by the CPM to retrieve passwords from the Vault.

B.

The credentials are used by the installer to register the CPM in the CyberArk database.

C.

The credentials are used by the installer to authenticate to the Vault and create the Central Policy Manager (CPM) environment (Safes, users, etc.).

D.

The credentials will be used later by the CPM to update passwords in the Vault.

Buy Now
Questions 23

Select the best practice for storing the Master CD.

Options:

A.

Copy the files to the Vault server and discard the CD.

B.

Copy the contents of the CD to a Hardware Security Module and discard the CD.

C.

Store the CD in a secure location, such as a physical safe.

D.

Store the CD in a secure location, such as a physical safe, and copy the contents of the CD to a folder

(secured with NTFS permissions) on the vault.

Buy Now
Questions 24

Which one of the built-in Vault users is not automatically added to the safe when it is first created in PVWA?

Options:

A.

Master

B.

Administrator

C.

Auditor

D.

Operator

Buy Now
Questions 25

When working with the CyberArk High Availability Cluster, which services are running on the passive node?

Options:

A.

Cluster Vault Manager and PrivateArk Database

B.

Cluster Vault Manager, PrivateArk Database and Remote Control Agent

C.

Cluster Vault Manager

D.

Cluster Vault Manager and Remote Control Agent

Buy Now
Questions 26

Within the Vault each password is encrypted by

Options:

A.

The Server Key

B.

The Recovery Public Key

C.

The Recovery Private key

D.

Its own unique key.

Buy Now
Questions 27

The Password upload utility can be used to create safes.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 28

Which of the following is NOT a use case for installing multiple CPMS?

Options:

A.

A single CPM cannot accommodate the total number of accounts managed

B.

Accounts are managed in multiple sites or VLANs protected by firewall

C.

Reduce network traffic across WAN links

D.

Provide load balancing capabilities when managing passwords on target devices

Buy Now
Questions 29

The following applications are pre-configured to work with PSM. but first need to be installed on the PSM server.

Options:

A.

SQL Plus

B.

Putty

C.

RDP

D.

WinSCP

E.

Toad

F.

VMWare vSphere Client

G.

Microsoft SQL Management Studio

Buy Now
Questions 30

CyberArk implements license limits by controlling the number and types of users that can be provisioned in the Vault.

Options:

A.

True

B.

False

Buy Now
Questions 31

Which file is used to configure new firewall rules on the Vault?

Options:

A.

firewall.ini

B.

paragent.ini

C.

dbparm.ini

D.

padr.ini

Buy Now
Questions 32

The password upload utility must run from the CPM server.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 33

During the process of installing the CPM, you will be asked to provide the credentials for an administrate user in the Vault. What are these credentials used for?

Options:

A.

The credentials will be used later by the CPM to retrieve passwords from the Vault

B.

The credentials are by the installer to register the CPM in the CyberArk database

C.

The credentials are used by the installer to authenticate to the Vault and create the CPM environment (safes, users, etc.)

D.

The credentials will be used later by the CPM to update passwords in the Vault

Buy Now
Questions 34

The Application Inventory report is related to AIM.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

tsparm.ini is the main configuration file for the vault.

Options:

A.

TRUE

B.

FALSE

Buy Now
Exam Code: CAU302
Exam Name: CyberArk Defender + Sentry
Last Update: Nov 24, 2024
Questions: 237
CAU302 pdf

CAU302 PDF

$25.5  $84.99
CAU302 Engine

CAU302 Testing Engine

$30  $99.99
CAU302 PDF + Engine

CAU302 PDF + Testing Engine

$40.5  $134.99