Which CyberArk components products can be used to discover Windows Services or Scheduled Tasks that use privileged accounts? Select all that apply.
A. Discovery and Audit (DNA)
B. Auto Detection (AD)
C. Export Vault Data (EVD)
D. On Demand Privileges manager (OPM)
E. Accounts Discovery
The Password upload utility can be used to create safes.
A. TRUE
B. FALSE
Which of the following statements are NOT true when enabling PSM recording for a target Windows server? Choose all that apply.
A. The PSM software must be installed on the target server.
B. PSM must be enabled in the Master Policy (either directly, or through exception).
C. PSMConnect must be added as a local user on the target server.
D. RDP must be enabled on the target server.
As long as you are a member of the Vault Admins group you can grant any permission on any safe.
A. TRUE
B. FALSE
In accordance with best practice, SSH access is denied for root accounts on UNIXLINUX system.
What is the BEST way to allow CPM to manage root accounts?
A. Create a privileged account on the target server. Allow this account the ability to SSH directly from the CPM machine. Configure this account of the target server's root account.
B. Create a non-privileged account on the target server. Allow this account the ability to SSH directly from the CPM machine. Configure this account as the Logon account of the target server's root account.
C. Configure the Unix system to allow SSH logins.
D. Configure the CPM to allow SSH logins.
What is the maximum number of levels of authorizations you can set up in Dual Control?
A. 1
B. 2
C. 3
D. 4
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?
A. Configure the Provider to change the password to match the Vault's Password
B. Associate a reconcile account and configure the platform to reconcile automatically.
C. Associate a logon account and configure the platform to reconcile automatically.
D. Run the correct auto detection process to rediscover the password.
It is possible to restrict the time of day, or day of week that a verify process can occur.
A. TRUE
B. FALSE
Which of the Following can be configured in the Master Policy? Choose all that apply.
A. Dual Control
B. One Time Passwords
C. Exclusive Passwords
D. Password Reconciliation
E. Ticketing Integration
F. Required Properties
G. Custom Connection Components
H. Password Aging Rules
You have associated a logon account to one of your UNIX root accounts in the vault. When attempting to change the root account's password the CPM will...
A. Log in to the system as root, then change root's password.
B. Log in to the system as the logon account, then change root's password
C. Log in to the system as the logon account, run the su command to log in as root, and then change root's password.
D. None of these.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAU201 exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.