CAU302 Real Questions To Pass CyberArk Defender + Sentry

CyberArk when brings out CAU302 product, introduces a Defender – Sentry (Combined) certification along with that Defender + Sentry product. CAU302 exam is a combined exam of Level 2: Defender and Level 3: Sentry exams. PassQuestion provides CAU302 Real Questions to help you pass CyberArk Defender + Sentry certification exam easily. You can practice in the following sample test to check its quality.

CAU302 Real Questions To Pass CyberArk Defender + Sentry

1. The vault does not support Role Based Access Control.

 
 

2. The Remote Desktop Services role must be properly licensed by Microsoft.

 
 

3. One can create exceptions to the Master Policy based on ____________.

 
 
 
 

4. Which of the following statements are NOT true when enabling PSM recording for a target Windows server?

 
 
 
 

5. It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.

 
 

6. During LDAP/S integration you should specify the Fully Qualified Domain Name (FQDN) of the Domain Controller.

 
 

7. Which of the following options is not set in the Master Policy?

 
 
 
 

8. When on-boarding accounts using Accounts Feed, which of the following is true?

 
 
 
 

9. The Vault Internal safe contains the configuration for an LDAP integration.

 
 

10. PSM captures a record of each command that was issued in SQL Plus.

 
 

11. What is the purpose of the Allowed Safes parameter in a CPM policy? Select all that apply.

 
 
 
 

12. The Vault Internal safe contains all of the configuration for the vault.

 
 

13. One time passwords reduce the risk of Pass the Hash vulnerabilities in Windows.

 
 

14. What are the operating system prerequisites for installing CPM?

 
 
 
 

15. The vault provides a tamper-proof audit trail.

 
 

16. It is possible to restrict the time of day, or day of week that a verify process can occur.

 
 

17. When managing SSH keys, CPM automatically pushes the Private Key to all systems that use it.

 
 

18. It is possible to restrict the time of day, or day of week that a change process can occur.

 
 

19. Which one of the built-in Vault users is not automatically added to the safe when it is first created in PWA?

 
 
 
 

20. What conditions must be met in order to log into the vault as the Master user? Select all that apply.

 
 
 
 

21. To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers need to be configured to communicate with the Primary Vault and Satellite Vaults.

What file needs to be changed on the PVWA to enable this setup?

 
 
 
 

22. Auto-Detection can be configured to leverage LDAP/S.

 
 

23. Vault admins must manually add the auditors group to newly created safes so auditors will have sufficient access to run reports.

 
 

24. When a group is granted the ‘Authorize Account Requests’ permission on a safe Dual Control requests must be approved by:

 
 
 
 

25. When creating an onboarding rule, it will be executed upon.

 
 
 

26. You are successfully managing passwords in the alpha.cyberark com domain; however when you attempt to manage a password in the beta.cyberark.com domain, you receive the ‘network path not found* error.

What should you check first?

 
 
 
 

27. Which service should NOT be running on the DR Vault when the primary production Vault is up?

 
 
 
 

28. Which of the following statements are NOT true when enabling PSM recording for a target Windows server? Choose all that apply

 
 
 
 

29. What is the primary purpose of Exclusive Accounts?

 
 
 
 

30. Which of the following are prerequisites for installing PVWA Check all that Apply

 
 
 
 

31. To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers must to be configured to communicate with the Primary Vault and Satellite Vaults.

Which file needs to be changed on the PVWA to enable this setup?

 
 
 
 

32. PSM captures a record of each command that was issues in SQL Plus.

 
 

33. In Accounts Discovery, you can configure a Windows discovery to scan______________.

 
 
 
 

34. One of your users is receiving the error message “ITATS006E Station is suspended for User jsmith” when attempting to sign in to the pvwa.

Which utility would you use to correct this problem?

 
 
 
 

35. Which of the following is NOT a use case for installing multiple CPMS?

 
 
 
 

36. Which service should NOT be running on the DR Vault when the primary Production Vault is up?

 
 
 
 

37. Where does the Vault administrator configure in Password Vault Web Access (PVWA) the Fully Qualified Domain Name (FQDN) of the domain controller during LDAP/S integration?

 
 
 
 

38. What is the purpose of the password Change process?

 
 
 
 

39. Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.

 
 
 
 

40. Which utilities could you use to change debugging levels on the vault without having to restart the vault Select all that apply.

 
 
 
 

41. What is the purpose of the CyberArk Event Notification Engine service.

 
 
 
 

42. The Vault does not support dual factor authentication.

 
 

43. Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?

 
 

44. A safe was recently created by a user who is a member of the LDAP Vault Administrators group.

Which of the following users does not have access to the newly created safe by default?

 
 
 
 

45. Which file is used to configure the ENE service?

 
 
 
 
 

46. All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe The members of the AD group UnixAdmms need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation The members of the AD group OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of OperationsManagers The members of OperationsManagers never need to be able to use the show, copy or connect buttons themselves.

Which safe permissions do you need to grant to UnixAdmins? Check all that apply

 
 
 
 
 

47. The Application Inventory report is related to AIM.

 
 

48. When managing SSH keys, the CPM stores the Public Key ________________.

 
 
 
 

49. The ACME Company has been a CyberArk customer for many years. ACME Management has asked you to perform a “Health Check" review of the CyberArk deployment. During your analysis you discover that the PSM Component server is fully functional. The RDP SSL certificate is self-signed and the CyberArk Privileged Session Management Service is running under the Local Service. SSL 3.0 is enabled in the Registry.

 
 
 
 

50. All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of OperationsManagers. The members of OperationsManagers never need to be able to use the show, copy or connect buttons themselves.

Which safe permissions do you need to grant to OperationsManagers? (Choose all that apply.)

 
 
 
 
 

51. tsparm.ini is the main configuration file for the vault.

 
 

52. What is the proper way to allow the Vault to resolve host names?

 
 
 
 

53. Which one of the following reports is NOT generated by using the PVWA?

 
 
 
 

54. When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?

 
 
 
 

55. Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests?

 
 
 
 

56. Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)

 
 
 
 

57. Name two ways of viewing the ITAlog:

 
 
 
 

58. Which utility can be used to copy a server key to an HSM?

 
 
 
 

59. What is the name of the Platform parameter that controls how long a password will stay valid when One Time Passwords are enabled via the Master Policy?

 
 
 
 

60. Which combination of safe member permissions will allow End Users to log in to a remote machine transparently but NOT show or copy the password?

 
 
 
 

61. A SIEM integration allows you to forward ITALOG records to a monitoring solution.

 
 

62. You have associated a logon account to one of your UNIX root accounts in the vault When attempting to verify the root account’s password the CPM will…

 
 
 
 

63. Which of the following sends out Simple Network Management Protocol (SNMP) traps?

 
 
 
 

64. The Vault Internal safe contains all of the configuration for the vault.

 
 

65. What is the purpose of a password group?

 
 
 
 

66. Which credentials does CyberArk use when managing a target account?

 
 
 
 

67. What is the proper way to allow the Vault to resolve host names?

 
 
 
 

68. Time of day of week restrictions on when password changes can occur are configured in ________________.

 
 
 
 

69. In a Disaster Recovery (DR) environment, which of the following should NEVER be configured for automatic failover due to the possibility of split-brain phenomenon?

 
 
 
 

70. A SIEM integration allows you to forward audit records to a monitoring solution.

 
 

71. A Reconcile Account can be specified in the Master Policy.

 
 

72. What is the chief benefit of PSM?

 
 
 
 

73. Which of the Following can be configured in the Master Policy? Choose all that apply

 
 
 
 
 
 
 
 

74. What is the primary purpose of Dual Control?

 
 
 
 

75. It is possible to restrict the time of day. or day of week that a verify process can occur

 
 

76. The Vault supports multiple instances of the following components Choose all that Apply

 
 
 
 

77. A user has successfully conducted a short PSM session and logged off. However, the user cannot access the Monitoring tab to view the recordings.

What is the issue?

 
 
 
 

78. Which is the purpose of the HeadStartInterval setting in a platform?

 
 
 
 

79. The Vault server requires WINS services to work properly.

 
 

80. When managing SSH keys. CPM automatically pushes the Public Key to the target system.

 
 

81. What is the purpose of the Interval setting in a CPM policy?

 
 
 
 

82. Multiple PVWA servers provide automatic load balancing.

 
 

83. Is it possible to modify the CyberArk Vault Audit Log?

 
 
 
 

84. Which of the following logs contain information about errors related to PTA?

 
 
 
 

85. PSM captures a record of each command that was executed in Unix.

 
 

86. The System safe allows access to the Vault configuration files.

 
 

87. Which of these accounts onboarding methods is considered proactive?

 
 
 
 

88. Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?

 
 
 
 

89. A logon account can be specified in the platform settings.

 
 

90. When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSM

 
 

91. What is the purpose of the password verify process?

 
 
 
 

92. Accounts Discovery allows secure connections to domain controllers.

 
 

93. Access Control to passwords is implemented by ________________.

 
 
 
 

94. It is possible to control the hours of the day during which a safe may be used.

 
 

95. In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?

 
 
 
 

96. Which Master Policy?

 
 
 
 

97. One can create exceptions to the Master Policy based on_________.

 
 
 
 

98. It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.

 
 

99. In accordance with best practice. SSH access is denied for root accounts on UNIX/LINUX systems.

What is the BEST way to allow CPM to manage root accounts?

 
 
 
 

100. According to the default web options settings, which group grants access to the reports page?

 
 
 
 

CyberArk CDE Recertification CAU305 Exam Questions
CyberArk Defender CAU201 Practice Test Questions

Leave a Reply

Your email address will not be published. Required fields are marked *