Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

CAU302 Sample Questions Answers

Questions 4

A SIEM integration allows you to forward audit records to a monitoring solution.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 5

A vault admin received an email notification that a password verification process has failed Which service sent the message?

Options:

A.

The PrivateArk Server Service on the Vault.

B.

The CyberArk Password Manager service on the Components Server.

C.

The CyberArk Event Notification Engine Service on the Vault

D.

The CyberArk Privileged Session Manager service on the Vault.

Buy Now
Questions 6

Multiple Vault Servers can be load balanced.

Options:

A.

True

B.

False

Buy Now
Questions 7

What is the primary purpose of Dual Control?

Options:

A.

Reduced risk of credential theft

B.

More frequent password changes

C.

Non-repudiation (individual accountability)

D.

To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorization

Buy Now
Questions 8

Which service is optional on the Vault?

Options:

A.

PrivateArk Server

B.

PrivateArk Remote Control Agent

C.

PrivateArk Database

D.

CyberArk Hardened Windows Firewall

Buy Now
Questions 9

When on-boarding accounts using Accounts Feed. Which of the following is true"?

Options:

A.

You must specify an existing Safe where the account will be stored when it is on-boarded to the Vault.

B.

You can specify the name of a new safe that will be created where the account will be stored when it is on-boarded to the Vault.

C.

You can specify the name of a new Platform that will be created and associated with the account.

D.

Any account that is on-boarded can be automatically reconciled regardless of the platform it is associated with

Buy Now
Questions 10

The vault does not support Role Based Access Control

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 11

Match the log file name with the CyberArk Component that generates the log.

Options:

Buy Now
Questions 12

A safe was recently created by a user who is a member of the LDAP Vault Administrators group. Which of the

following users does not have access to the newly created safe by default?

Options:

A.

Master

B.

Administrator

C.

Auditor

D.

Backup

Buy Now
Questions 13

How does the Vault administrator apply a new license file?

Options:

A.

Upload the license.xml file to the system Safe and restart the PrivateArk Server service.

B.

Upload the license.xml file to the system Safe.

C.

Upload the license.xml file to the Vault Internal Safe and restart the PrivateArk Server service.

D.

Upload the license.xml file to the Vault Internal Safe.

Buy Now
Questions 14

Which is the purpose of the interval setting in a Central Policy Manager (CPM) policy?

Options:

A.

To control how often the CPM looks for system-initiated CPM work

B.

To control how often the CPM looks for user-initiated CPM work

C.

To control how long the CPM rests between password changes

D.

To control the maximum amount of time the CPM will wait for a password change to complete

Buy Now
Questions 15

Which of the following are secure options for storing the contents of the Operator CD. while still allowing the contents to be accessible upon a planned Vault restart? Choose alt that apply

Options:

A.

Store the CD in a physical safe and mount the CD every time vault maintenance is performed.

B.

Copy the contents of the CD to the System Safe on the vault

C.

Copy the contents of the CD to a folder on the vault server and secure it with NTFS permissions.

D.

Store the server key in a Hardware Security Module.

E.

Store the server key in the Provider cache

Buy Now
Questions 16

In a Disaster Recovery (DR) environment, which of the following should NEVER be configured for automatic failover due to the possibility of split-brain phenomenon?

Options:

A.

Password Vault Web Access (PVWA)

B.

PSM

C.

CPM

D.

PTA

Buy Now
Questions 17

When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSM

Options:

A.

True

B.

False, when the PSM Gateway is implemented, the user only requires a browser in order launch a connection via the PSM

Buy Now
Questions 18

tsparm.ini is the main configuration file for the vault.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

When working with the CyberArk Cluster, which service is considered Optional (i.e., failure of the service does

not mandate a failover)?

Options:

A.

PrivateArk Server

B.

PrivateArk Database

C.

Event Notification Engine

D.

Logic Container

Buy Now
Questions 20

Where do you configure in PVWA the fully-qualified domain name (FQDN) of your target email server during SMTP integration?

Options:

A.

PVWA > Platform Management > Notification Settings

B.

PVWA > Options > Notification Settings

C.

PVWA > Administration > Notification Settings

D.

PVWA > LDAP Integartion > Notification Settings

Buy Now
Questions 21

When working with the CyberArk Cluster, the Virtual IP is used by:

Options:

A.

The CyberArk components to communicate with the Vault Cluster over the public network.

B.

The Vault nodes for exchanging keep alive messages over the public network.

C.

The CyberArk components to communicate with the Vault Cluster over the private network.

D.

The Vault nodes for exchanging keep alive messages over the public network.

Buy Now
Questions 22

As long as you are a member of the Vault Admins group, you can grant any permission on any safe that you have access to.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 23

Which Built-in group grants access to the ADMINISTRATION page?

Options:

A.

PVWAMonitor

B.

PVWAUsers

C.

Auditors

D.

Vault Admins

Buy Now
Questions 24

It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 25

In Accounts Discovery, you can configure a Windows discovery to scan______________.

Options:

A.

as many OUs as you wish

B.

up to three OUs.

C.

only one OU.

D.

a number of OUs determined by the OUstoScan setting under the Accounts Feed section in the Administration tab

Buy Now
Questions 26

Which Master Policy Setting(s) must be active in order to have an account checked-out by one user for a predetermined amount of time?

Options:

A.

Require dual control password access Approval

B.

Enforce check-in/check-out exclusive access

C.

Enforce one-time password access

D.

Enforce check-in/check-out exclusive access & Enforce one-time password access

Buy Now
Questions 27

What is the purpose of the CyberArk Event Notification Engine service.

Options:

A.

sends email messages from the vault.

B.

sends email messages from the CPM.

C.

processes audit reports.

D.

make vault data available to components

Buy Now
Questions 28

CyberArk implements license limits by controlling the number and types of users that can be provisioned in the Vault.

Options:

A.

True

B.

False

Buy Now
Questions 29

In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?

Options:

A.

AAM Credential Provider (previously known as AIM Credential Provider)

B.

ExportVaultData utility

C.

PAReplicate utility

D.

Central Policy Manager

Buy Now
Questions 30

When managing SSH keys. CPM automatically pushes the Public Key to the target system.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 31

One time passwords reduce the risk of Pass the Hash vulnerabilities in Windows

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 32

Which file is used to configure new firewall rules on the Vault?

Options:

A.

firewall.ini

B.

PARagent.ini

C.

dbparm.ini

D.

padr.ini

Buy Now
Questions 33

During the process of installing the CPM, you will be asked to provide the credentials for an administrate user in the Vault. What are these credentials used for?

Options:

A.

The credentials will be used later by the CPM to retrieve passwords from the Vault

B.

The credentials are by the installer to register the CPM in the CyberArk database

C.

The credentials are used by the installer to authenticate to the Vault and create the CPM environment (safes, users, etc.)

D.

The credentials will be used later by the CPM to update passwords in the Vault

Buy Now
Questions 34

If a password is changed manually on a server, bypassing the CPM, how would you configure the account so

that the CPM could resume management automatically?

Options:

A.

Configure the Provider to change the password to match the Vault’s Password

B.

Associate a reconcile account and configure the platform to reconcile automatically

C.

Associate a logon account and configure the platform to reconcile automatically

D.

Run the correct auto detection process to rediscover the password

Buy Now
Questions 35

Multiple PSM Servers can be load balanced.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 36

Which one of the built-in Vault users is not automatically added to the safe when it is first created in PVWA?

Options:

A.

Master

B.

Administrator

C.

Auditor

D.

Operator

Buy Now
Questions 37

Which file is used to integrate the Vault with your Radius server?

Options:

A.

radius.ini

B.

paragent ini

C.

ENEConf.ini

D.

dbparm.ini

Buy Now
Questions 38

One of your users is receiving the error message “ITATS006E Station is suspended for User jsmith” when

attempting to sign in to the pvwa. Which utility would you use to correct this problem?

Options:

A.

createcredfile.exe

B.

cavaultmanager.exe

C.

PrivateArk

D.

PVWA

Buy Now
Questions 39

The Remote Desktop Services role installed on PSM must be properly licensed by Microsoft.

Options:

A.

No, this is not necessary

B.

Yes, this is a must and needs to be scoped and purchased prior to project implementation

C.

Yes, RDS is included as part of Microsoft Operating System License

D.

No, RDS licenses are only required when using the RemoteApp feature

Buy Now
Questions 40

What conditions must be met in order to log into the vault as the Master user? Select all that apply

Options:

A.

Logon must be originated from the console of the Vault server or an EmergencyStation defined in DBParm.ini

B.

User must provide the correct master password

C.

Logon requires the Recovery Private Key to be accessible to the vault

D.

Logon must satisfy a challange response request

Buy Now
Questions 41

When using multiple Central Policy Managers (CPM), which one of the following Safes is shared by all CPMs?

Options:

A.

PasswordManagerSharedSafe

B.

PasswordManager_Pending

C.

PasswordManager_workspace

D.

PasswordManager_ADInternal

Buy Now
Questions 42

A logon account can be specified in the platform settings.

Options:

A.

True

B.

False

Buy Now
Questions 43

One can create exceptions to the Master Policy based on_________.

Options:

A.

Safes

B.

Platforms

C.

Policies

D.

Accounts

Buy Now
Questions 44

CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 45

When the PSM Gateway (also known as the HTML5 Gateway) is implemented, users must have an RDP client, such as MSTSC, installed on their endpoint in order to launch connections via the PSM.

Options:

A.

True

B.

False. When the PSM Gateway is implemented, the user only requires a browser in order launch a connection via the PSM.

Buy Now
Questions 46

A Reconcile Account can be specified in the Master Policy.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 47

Which of the following sends out Simple Network Management Protocol (SNMP) traps?

Options:

A.

PrivateArk Remote Control Agent

B.

PrivateArk Server

C.

CyberArk Event Notification Engine

D.

CyberArk SNMP agent

Buy Now
Questions 48

Users complain they are unsuccessful attempting to authenticate to the PVWA web site. After entering their

credentials, they receive a “Timeout has expired”. You test the URL using multiple browsers and receive the

same error. The CyberArk.WebApplication.log shows the “ITACM012S Timeout has expired” log entry.

What is the next troubleshooting step you should take?

Options:

A.

Run an IISRESET on the PVWA server

B.

Check the CyberArk.WebConsole.log for errors

C.

Check network firewall rules to ensure the PVWA can communicate to the Vault over tcp_1858

D.

Check the health of the Vault Server and ensure all services are running

Buy Now
Questions 49

What is the primary purpose of Exclusive Accounts?

Options:

A.

Reduced risk of credential theft

B.

More frequent password changes

C.

Non-repudiation (individual accountability)

D.

To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorization

Buy Now
Questions 50

An SNMP integration allows you to forward audit records from the vault to the SIEM.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 51

Can you forward audit records to your monitoring solution via SIEM integration?

Options:

A.

Yes

B.

No

Buy Now
Questions 52

What is the purpose of EVD?

Options:

A.

To extract vault metadata into an open database platform.

B.

To allow editing of vault metadata.

C.

To create a backup of the MySQL database.

D.

To extract audit data from the vault.

Buy Now
Questions 53

Which of the following Privileged Session Management solutions provide a detailed audit log of session activities?

Options:

A.

PSM (i.e., launching connections by clicking on the “Connect” button in the PVWA)

B.

PSM for Windows (previously known as RDP Proxy)

C.

PSM for SSH (previously known as PSM SSH Proxy)

D.

All of the above

Buy Now
Questions 54

When accessing the Vault via PVWA, is it possible, is it possible to configure multiple Dual Authentication Methods?

Options:

A.

Yes, all authentication methods will be configured to use the Vault integrated authentication flow.

B.

No, dual authentication methods are not supported.

C.

Yes, authentication methods will be configured to use the combination of IIS and Vault integrated authentication flow.

D.

Yes, all authentication methods will be configured to use the IIS integrated authentication flow.

Buy Now
Questions 55

CyberArk creates exceptions for Data Execution Prevention (DEP) on selected executable files. This is done as part of installing which of the following components?

Options:

A.

PSM

B.

CPM

C.

PVWA

D.

AAM Credential Provider (previously known as AIM Credential Provider)

Buy Now
Questions 56

After the Vault administrator configures syslog integration on the Vault, the Vault will be able to.

Options:

A.

forward ITALOG records to Security Information and Event Management (SIEM).

B.

send out Simple Network Management Protocol (SNMP) traps.

C.

forward audit records to Security Information and Event Management (SIEM).

D.

forward emails to SIEM.

Buy Now
Questions 57

Using the SSH Key Manager it is possible to allow CPM to manage SSH Keys similarly to passwords.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 58

Which type of automatic remediation can be performed by the PTA in case of a Suspecious Password Change security event?

Options:

A.

Password Change

B.

Password Reconcilation

C.

Session Suspension

D.

Session Terminiation

Buy Now
Questions 59

Multiple CPM Servers can be load balanced.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 60

PSM requires the Remote Desktop Session Host role service.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 61

Which Master Policy?

Options:

A.

Password Expiration Time

B.

Enabling and Disabling of the Connection Through the PSM

C.

Password Complexity

D.

The use of "One-Time-Passwords"

Buy Now
Questions 62

When creating an onboarding rule, it will be executed upon.

Options:

A.

All accounts in the pending accounts list.

B.

Any future accounts discovered by a discovery process.

C.

All accounts in the pending accounts list and any future accounts discovered by a discovery process.

Buy Now
Questions 63

When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?

Options:

A.

CyberArk Vault Disaster Recovery (DR), PrivateArk Database

B.

CyberArk Vault Disaster Recovery

C.

CyberArk Vault Disaster Recovery, PrivateArk Database, PrivateArk Server

D.

CyberArk Vault Disaster Recovery, PrivateArk Database, CyberArk Event Notification Engine

Buy Now
Questions 64

After the Vault server is installed, the Microsoft Windows firewall is now commandeered by the Vault. Can the administrator change these firewall rules?

Options:

A.

Yes, but the administrator can only modify the firewall rules by editing the dbparm.ini file and the restarting the Vault.

B.

Yes, the administrator can still modify firewall rules via the Windows firewall interface.

C.

No, the Vault does not permit any changes to the firewall due to security requirements.

D.

Yes, but the administrator can only modify the firewall rules by editing the FirewallRules.ini file and the restarting the Vault.

Buy Now
Questions 65

The Vault administrator can change the Vault license by uploading the new license to the system Safe.

Options:

A.

True

B.

False

Buy Now
Questions 66

When managing SSH keys, the CPM stores the Public Key ________________.

Options:

A.

In the Vault

B.

On the target server

C.

A & B

D.

Nowhere because the public key can always be generated from the private key

Buy Now
Questions 67

Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.

Options:

A.

Server Key

B.

Recovery Public Key

C.

Recovery Private Key

D.

Safe Key

Buy Now
Questions 68

It is possible to restrict the time of day. or day of week that a change process can occur

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 69

Which report could show all audit data in the vault?

Options:

A.

Privileged Account Compliance Status Report

B.

Activity Log

C.

Privileged Account Inventory Report

D.

Application Inventory Report

Buy Now
Questions 70

The following applications are pre-configured to work with PSM. but first need to be installed on the PSM server.

Options:

A.

SQL Plus

B.

Putty

C.

RDP

D.

WinSCP

E.

Toad

F.

VMWare vSphere Client

G.

Microsoft SQL Management Studio

Buy Now
Questions 71

The vault supports a number of dual factor authentication methods.

Options:

A.

TRUE

B.

FALSE

Buy Now
Exam Code: CAU302
Exam Name: CyberArk Defender + Sentry
Last Update: Nov 21, 2024
Questions: 237
$64  $159.99
$48  $119.99
$40  $99.99
buy now CAU302