Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?
A. Password change
B. Password reconciliation
C. Session suspension
D. Session termination
Which file would you modify to configure your Vault Server to forward Activity Logs to a SIEM or SYSLOG server?
A. dbparm.ini
B. PARagent.ini
C. ENEConf.ini
D. padre.ini
How does the Vault administrator apply a new license file?
A. Upload the license.xml file to the system Safe and restart the PrivateArk Server service.
B. Upload the license.xml file to the system Safe.
C. Upload the license.xml file to the Vault Internal Safe and restart the PrivateArk Server service.
D. Upload the license.xml file to the Vault Internal Safe.
The DR module allows an integration with Enterprise Backup software.
A. TRUE
B. FALSE
Multiple PVWA servers can be load balanced.
A. TRUE
B. FALSE
A Logon Account can be specified in the Master Policy
A. TRUE
B. FALSE
If a user is a member of more than one group that has authorizations on a safe, by default that user is granted __________________.
A. the vault will not allow this situation to occur.
B. only those permissions that exist on the group added to the safe first.
C. only those permissions that exist in all groups to which the user belongs.
D. the cumulative permissions of all the groups to which that user belongs
After the Vault Server is installed, the Microsoft Windows Firewall is now commandeered by the Vault Can the administrator change these firewall rules?
A. Yes, but the administrator can only modify the firewall rules by editing the dbparm.ini file and the restarting the vault
B. Yes, the administrator can still modify Firewall rules via the Windows Firewall interface
C. No, the Vault does not permit any changes to the Firewall due to security requirements
D. Yes, but the administrator can only modify the firewall rules by editing the FirewallRuIes mi file and the restarting the vault
Which report shows the accounts that are accessible to each user?
A. Activity Report
B. Entitlement Report
C. Privileged Accounts Compliance Status Report
D. Applications Inventory Report
What values are acceptable in the address field on the Accounts Details?
A. It must be a fully qualified domain name (FQDN)
B. It must be an IP address
C. It must be NetBIOS name
D. Any name that is resolvable on the CPM server is acceptable
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAU302 exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.