In order to connect to a target device through PSM. the account credentials used for the connection must be stored in the vault?
A. True
B. False. Because the user can also enter credentials manually using Secure Connect
C. False. Because if credentials are not stored in the vault, the PSM will log into the target device as PSMConnect.
D. False Because if credentials are not stored in the vault, the PSM will prompt for credentials
When managing SSH keys. CPM automatically pushes the Private Key to all systems that use it.
A. TRUE
B. FALSE
Which Master Policy Setting(s) must be active in order to have an account checked-out by one user for a predetermined amount of time?
A. Require dual control password access Approval
B. Enforce check-in/check-out exclusive access
C. Enforce one-time password access
D. Enforce check-in/check-out exclusive access and Enforce one-time password access
tsparm.ini is the main configuration file for the vault.
A. TRUE
B. FALSE
When working with the CyberArk High Availability Cluster, which services are running on the passive node?
A. Cluster Vault Manager and PrivateArk Database
B. Cluster Vault Manager, PrivateArk Database and Remote Control Agent
C. Cluster Vault Manager
D. Cluster Vault Manager and Remote Control Agent
What are the chief benefits of PSM? Choose all that apply?
A. Privileged Session Isolation
B. Automatic Password Management
C. Privileged Session Recording
D. A and C
What is the name of the Platform parameter that determines the amount of time a person is allowed to use a One Time Password?
A. MinValidityPeriod
B. Interval
C. ImmediateInterval
D. Timeout
Where do you configure in PVWA the fully-qualified domain name (FQDN) of your target email server during SMTP integration?
A. PVWA > Platform Management > Notification Settings
B. PVWA > Options > Notification Settings
C. PVWA > Administration > Notification Settings
D. PVWA > LDAP Integartion > Notification Settings
Which report could show all accounts that are past their expiration dates?
A. Activity log
B. Privileged Account Inventory report
C. Privileged Account Compliance Status report
D. Applications Inventory report
What conditions must be met in order to log into the vault as the Master user? Select all that apply
A. Logon must be originated from the console of the Vault server or an EmergencyStation defined in DBParm.ini
B. User must provide the correct master password
C. Logon requires the Recovery Private Key to be accessible to the vault
D. Logon must satisfy a challange response request
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAU302 exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.