Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CyberArk CAU305 - CyberArk CDE Recertification

Page: 2 / 2
Total 65 questions

Which onboarding method is used to integrate CyberArk with the accounts provisioning process?

A.

Accounts Discovery

B.

Auto Detection

C.

Onboarding RestAPI functions

D.

PTA rules

Which is the purpose of the interval setting in a Central Policy Manager (CPM) policy?

A.

To control how often the CPM looks for system-initiated CPM work.

B.

To control how often the CPM looks for user-initiated CPM work.

C.

To control how long the CPM rests between password changes.

D.

To control the maximum amount of time the CPM will wait for a password change to complete.

Which user is automatically added to all Safes and cannot be removed?

A.

Auditor

B.

Administrator

C.

Master

D.

Operator

In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?

A.

AAM Credential Provider (previously known as AIM Credential Provider)

B.

ExportVaultData utility

C.

PAReplicate utility

D.

Central Policy Manager

Which of the following components can be used to create a tape backup of the Vault?

A.

Disaster Recovery

B.

Distributed Vaults

C.

Replicate

D.

High Availability

Any user can monitor live sessions in real time when initiating RDP connection via Secure Connect through PSM.

A.

True

B.

False

When working with the CyberArk Disaster Recovery (DR) solution, which services should be running on the DR Vault?

A.

CyberArk Vault Disaster Recovery (DR), PrivateArk Database

B.

CyberArk Vault Disaster Recovery

C.

CyberArk Vault Disaster Recovery, PrivateArk Database, PrivateArk Server

D.

CyberArk Vault Disaster Recovery, PrivateArk Database, CyberArk Event Notification Engine

A Simple Mail Transfer Protocol (SMTP) integration is critical for monitoring Vault activity and facilitating workflow processes, such as Dual Control.

A.

True

B.

False

What is the purpose of EVD?

A.

To extract vault metadata into an open database platform.

B.

To allow editing of vault metadata.

C.

To create a backup of the MySQL database.

D.

To extract audit data from the vault.