The Application Inventory report is related to AIM.
A. TRUE
B. FALSE
All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe The members of the AD group UnixAdmms need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation The members of the AD group OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of OperationsManagers The members of OperationsManagers never need to be able to use the show, copy or connect buttons themselves.
Which safe permissions do you need to grant to UnixAdmins? Check all that apply
A. Use Accounts
B. Retrieve Accounts
C. List Accounts
D. Authorize Password Requests
E. Access Safe without Authorization
Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?
A. TRUE
B. FALSE
A safe was recently created by a user who is a member of the LDAP Vault Administrators group. Which of the following users does not have access to the newly created safe by default?
A. Master
B. Administrator
C. Auditor
D. Backup
Which file is used to configure the ENE service?
A. ENE.ini
B. ENEConfig.ini
C. dbparm.ini
D. paragent.ini
What is the purpose of the CyberArk Event Notification Engine service?
A. It sends email messages from the CPM
B. It sends email messages from the Vault.
C. It processes audit report messages
D. It makes vault data available to components.
The Vault does not support dual factor authentication.
A. True
B. False
Which utilities could you use to change debugging levels on the vault without having to restart the vault Select all that apply?
A. PAR Agent
B. PrivateArk Server Central Administration
C. Edit DBParm.ini in a text editor.
D. Setup exe
What is the purpose of the password Change process?
A. To test that CyberArk is storing accurate credentials for accounts
B. To change the password of an account according to organizationally defined password rules
C. To allow CyberArk to manage unknown or lost credentials
D. To generate a new complex password
Which keys are required to be present in order to start the PrivateArk Server Service? Select all that apply.
A. Server Key
B. Recovery Public Key
C. Recovery Private Key
D. Safe Key
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your CAU302 exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.