Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CyberArk CAU302 - CyberArk Defender + Sentry

Page: 4 / 7
Total 237 questions

An auditor initiates a LIVE monitoring session to PSM server to view an ongoing LIVE session. When the

auditor’s machine makes an RDP connection the PSM server, which user will be used?

A.

PSMAdminConnect

B.

Shadowuser

C.

PSMConnect

D.

Credentials Stored in the Vault for the Target Machine

Match the log file name with the CyberArk Component that generates the log.

According to the default web options settings, which group grants access to the reports page?

A.

PVWAMonitor

B.

PVWAUsers

C.

Auditors

D.

Vault administrators

In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault.

A.

True.

B.

False. Because the user can also enter credentials manually using Ad-Hoc Access.

C.

False. Because if credentials are not stored in the vault, the PSM will log into the target device as PSMConnect.

D.

False. Because if credentials are not stored in the vault, the PSM will prompt for credentials.

The PSM requires the Remote Desktop Web Access role service.

A.

True

B.

False

When managing SSH keys. CPM automatically pushes the Public Key to the target system.

A.

TRUE

B.

FALSE

If a password is changed manually on a server, bypassing the CPM, how would you configure the account so

that the CPM could resume management automatically?

A.

Configure the Provider to change the password to match the Vault’s Password

B.

Associate a reconcile account and configure the platform to reconcile automatically

C.

Associate a logon account and configure the platform to reconcile automatically

D.

Run the correct auto detection process to rediscover the password

tsparm.ini is the main configuration file for the vault.

A.

TRUE

B.

FALSE

It is possible to restrict the time of day. or day of week that a change process can occur

A.

TRUE

B.

FALSE

Which report shows the accounts that are accessible to each user?

A.

Activity Report

B.

Entitlement Report

C.

Privileged Accounts Compliance Status Report

D.

Applications Inventory Report