What is the proper way to allow the Vault to resolve host names?
A. Define a DNS server
B. Define a WINS server
C. Defining the local hosts file
D. The Vault cannot resolve host names due to security standards
Which credentials does CyberArk use when managing a target account?
A. Those of the service account for the CyberArk Password Manager serviceD18912E1457D5D1DDCBD40AB3BF70D5D
B. A Domain Administrator account created for this purpose
C. The credentials of the target account
D. An account assigned by the Master Policy
Which of the following sends out Simple Network Management Protocol (SNMP) traps?
A. PrivateArk Remote Control Agent
B. PrivateArk Server
C. CyberArk Event Notification Engine
D. CyberArk SNMP agent
The Vault Internal safe contains all of the configuration for the vault.
A. TRUE
B. FALSE
What is the purpose of a password group?
A. To ensure that a particular collection of accounts all have the same password
B. To ensure a particular set of accounts all change at the same time
C. To connect the CPM to a target system
D. To allow more than one account to work together as part of a password management process
A SIEM integration allows you to forward ITALOG records to a monitoring solution.
A. TRUE
B. FALSE
You have associated a logon account to one of your UNIX root accounts in the vault. When attempting to verify the root account's password the CPM will...?
A. Ignore the logon account and attempt to log in as root.
B. Prompt the end user with a dialog box asking for the login account to use.
C. Log in first with the logon account, then run the su command to log in as root using the password in the vault
D. None of these.
Which combination of safe member permissions will allow End Users to log in to a remote machine transparently but NOT show or copy the password?
A. Use Accounts, Retrieve Accounts, List Accounts
B. Use Accounts, List Accounts
C. Use Accounts
D. List Accounts, Retrieve Accounts
What is the name of the Platform parameter that controls how long a password will stay valid when One Time Passwords are enabled via the Master Policy?
A. MinValidityPeriod
B. Interval
C. Immediatelnterval
D. Timeout
Name two ways of viewing the ITAlog:
A. Log into the vault locally and navigate to the Server folder under the PrivateArk install location.
B. Log into the PVWA and go to the Reports tab.
C. Access the System Safe from the PrivateArk client.
D. Go to the Thirdpary log directory on the CPM
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAU302 exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.