What is the purpose of the password Reconcile process?
A. To test that CyberArk is storing accurate credentials for accounts.
B. To change the password of an account according to organizationally defined password rules.
C. To allow CyberArk to manage unknown or lost credentials.
D. To generate a new complex password.
An auditor initiates a LIVE monitoring session to PSM server to view an ongoing LIVE session. When the auditor's machine makes an RDP connection the PSM server, which user will be used?
A. PSMAdminConnect
B. Shadowuser
C. PSMConnect
D. Credentials Stored in the Vault for the Target Machine
If a transparent user belongs two different directory mappings, how does the system determine, which user template to use?
A. The system will use the template for the mapping listed first.
B. The system will use the template for the mapping listed last.
C. The system will grant all of the vault authorizations from the two templates.
D. The system will grant only the vault authorizations that are listed in both templates.
Which file is used to configure new firewall rules on the Vault?
A. firewall.ini
B. PARagent.ini
C. dbparm.ini
D. padr.ini
What is the purpose of the Allowed Safes parameter in a CPM policy? Select all that apply.
A. To improve performance by reducing CPU workload.
B. To prevent accidental use of a policy in the wrong safe.
C. To allow users to access only the passwords they should be able to access.
D. To enforce Least Privilege in CyberArk.
What are the functions of the Remote Control Agent service? (Choose all that apply.)
A. Allows remote monitoring of the Vault
B. Sends SNMP traps from the Vault
C. Maintains audit data
D. Allows CyberArk Services to be managed (start/stop/status) remotely
According to the default web options settings, which group grants access to the reports page?
A. PVWAMonitor
B. PVWAUsers
C. Auditors
D. Vault administrators
What is the purpose of EVD?
A. To extract vault metadata into an open database platform.
B. To allow editing of vault metadata.
C. To create a backup of the MySQL database.
D. To extract audit data from the vault.
In accordance with best practice. SSH access is denied for root accounts on UNIX/LINUX systems. What is the BEST way to allow CPM to manage root accounts.
A. Create a privileged account on the target server Allow this account the ability to SSH directly from the CPM machine Configure this account as the Reconcile account of the target server's root account.
B. Create a non-privileged account on the target server Allow this account the ability to SSH directly from the CPM machine. Configure this account as the Logon account of the target server's root account
C. Configure the Unix system to allow SSH logins.
D. Configure the CPM to allow SSH logins
One can create exceptions to the Master Policy based on_________.
A. Safes
B. Platforms
C. Policies
D. Accounts
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAU302 exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.