Which file is used to open up a non-standard Firewall port to the Vault?
A. dbparm.ini
B. PARagent.ini
C. passparm.ini
D. Vault.ini
If a password is changed manually on a server, bypassing the CPM, how would you configure the account so that the CPM could resume management automatically?
A. Configure the Provider to change the password to match the Vault's Password
B. Associate a reconcile account and configure the platform to reconcile automatically
C. Associate a logon account and configure the platform to reconcile automatically
D. Run the correct auto detection process to rediscover the password
Any user can monitor live sessions in real time when initiating RDP connection via Secure Connect through PSM.
A. True
B. False
When planning to load balance at least 2 PSM Servers in an "in-domain" deployment, is it required to move the PSMConnect and PSMAdminConnect users to the domain level?
A. Yes. but only the PSMConnect user must be moved to the domain.
B. No. this is the customers decision and will work with local or domain based users.
C. Yes, both PSMConnect and PSMAdminConnect users should be moved to the domain
D. No. both accounts must be left as local accounts.
Ad-Hoc Access (formerly Secure Connect) provides the following features. (Choose all that apply.)
A. PSM connections to target devices that are not managed by CyberArk
B. Session Recording
C. Real-time live session monitoring
D. PSM connections from a terminal without the need to login to the PVWA
The vault provides a tamper-proof audit trail.
A. TRUE
B. FALSE
Which report could show all audit data in the vault?
A. Privileged Account Compliance Status Report
B. Activity Log
C. Privileged Account Inventory Report
D. Application Inventory Report
When working with the CyberArk Cluster, the Virtual IP is used by:
A. The CyberArk components to communicate with the Vault Cluster over the public network.
B. The Vault nodes for exchanging keep alive messages over the public network.
C. The CyberArk components to communicate with the Vault Cluster over the private network.
D. The Vault nodes for exchanging keep alive messages over the public network.
Which type of automatic remediation can be performed by the PTA in case of a Suspecious Password Change security event?
A. Password Change
B. Password Reconcilation
C. Session Suspension
D. Session Terminiation
Where does the Vault administrator configure in Password Vault Web Access (PVWA) the Fully Qualified Domain Name (FQDN) of the target email server during Simple Mail Transfer Protocol (SMTP) integration?
A. PVWA > Platform Management > Notification Settings
B. PVWA > Options > Notification Settings
C. PVWA > Administration > Notification Settings
D. PVWA > LDAP Integration > Notification Settings
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAU302 exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.