Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CyberArk CAU302 - CyberArk Defender + Sentry

Page: 2 / 7
Total 237 questions

To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers need to be configured to communicate with the Primary Vault and Satellite Vaults. What file needs to be changed on the PVWA to enable this setup?

A.

Vault.ini

B.

dbparm.ini

C.

pvwa.ini

D.

Satellite.ini

PSM requires the Remote Desktop Session Host role service.

A.

TRUE

B.

FALSE

Ad-Hoc Access (formerly Secure Connect) provides the following features. (Choose all that apply.)

A.

PSM connections to target devices that are not managed by CyberArk

B.

Session Recording

C.

Real-time live session monitoring

D.

PSM connections from a terminal without the need to login to the PVWA

An SNMP integration allows you to forward audit records from the vault to the SIEM.

A.

TRUE

B.

FALSE

The vault does not support Role Based Access Control

A.

TRUE

B.

FALSE

Where does the Vault administrator configure in Password Vault Web Access (PVWA) the Fully Qualified Domain Name (FQDN) of the domain controller during LDAP/S integration?

A.

PVWA > Platform Management > LDAP Integration

B.

PVWA > Administration > LDAP Integration

C.

PVWA > Administration > Options > LDAP Integration

D.

PVWA > LDAP Integration

An Auditor needs to login to the PSM in order to live monitor an active session. Which User ID is used to establish the RDP connection to the PSM server?

A.

PSMConnect

B.

PSMMaster

C.

PSMGwUser

D.

PSMAdminConnect

Which Master Policy?

A.

Password Expiration Time

B.

Enabling and Disabling of the Connection Through the PSM

C.

Password Complexity

D.

The use of "One-Time-Passwords"

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests?

A.

HeadStartInterval

B.

Interval

C.

ImmediateInterval

D.

The CPM does not change the password under this circumstance

What is the purpose of the password verify process?

A.

To test that CyberArk is storing accurate credentials for accounts.

B.

To change the password of an account according to organizationally defined password rules.

C.

To allow CyberArk to manage unknown or lost credentials.

D.

To generate a new complex password.