Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CyberArk CAU302 - CyberArk Defender + Sentry

Page: 5 / 7
Total 237 questions

Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?

A.

Accounts Discovery

B.

Auto Detection

C.

Onboarding RestAPI functions

D.

PTA Rules

When working with the CyberArk Cluster, the Virtual IP is used by:

A.

The CyberArk components to communicate with the Vault Cluster over the public network.

B.

The Vault nodes for exchanging keep alive messages over the public network.

C.

The CyberArk components to communicate with the Vault Cluster over the private network.

D.

The Vault nodes for exchanging keep alive messages over the public network.

What values are acceptable in the address field on the Accounts Details.

A.

It must be a fully qualified domain name (FQDN)

B.

It must be an IP address

C.

It must be NetBIOS name

D.

Any name that is resolvable on the CPM server is acceptable

What is the proper way to allow the Vault to resolve host names?

A.

Define a DNS server.

B.

Define a WINS server.

C.

Define the local hosts file.

D.

The Vault cannot resolve host names due to security standards.

Which service should NOT be running on the DR Vault when the primary production Vault is up?

A.

PrivateArk Database

B.

PrivateArk Server

C.

CyberArk Vault Disaster Recovery Service

D.

CyberArk Logical Container

Which file does the Vault administrator need to edit in order to configure the integration of the Vault with the radius server?

A.

radius.ini

B.

PARagent.ini

C.

ENEConf.ini

D.

dbparm.ini

A vault admin received an email notification that a password verification process has failed Which service sent the message?

A.

The PrivateArk Server Service on the Vault.

B.

The CyberArk Password Manager service on the Components Server.

C.

The CyberArk Event Notification Engine Service on the Vault

D.

The CyberArk Privileged Session Manager service on the Vault.

Any user can monitor live sessions in real time when initiating RDP connection via Secure Connect through PSM.

A.

True

B.

False

The Vault administrator can change the Vault license by uploading the new license to the system Safe.

A.

True

B.

False

If a transparent user belongs two different directory mappings, how does the system determine which user template to use?

A.

The system will use the template for the mapping listed first.

B.

The system will use the template for the mapping listed last.

C.

The system will grant all of the vault authorizations from the two templates.

D.

The system will grant only the vault authorizations that are listed in both templates.