Summer Sale 60% Special Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best60

CyberArk CAU302 CyberArk Defender + Sentry Exam Practice Test

Page: 1 / 24
Total 237 questions

CyberArk Defender + Sentry Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$48  $119.99

PDF Study Guide

  • Product Type: PDF Study Guide
$42  $104.99
Question 1

An Auditor needs to login to the PSM in order to live monitor an active session. Which User ID is used to establish the RDP connection to the PSM server?

Options:

A.

PSMConnect

B.

PSMMaster

C.

PSMGwUser

D.

PSMAdminConnect

Question 2

What is the purpose of a password group?

Options:

A.

To ensure that a particular collection of accounts all have the same password

B.

To ensure a particular set of accounts all change at the same time

C.

To connect the CPM to a target system

D.

To allow more than one account to work together as part of a password management process

Question 3

When Dual Control is enabled a user must first submit a request in the Password Vault Web Access (PVWA) and receive approval before being able to launch a secure connection via PSM for Windows (previously known as RDP Proxy).

Options:

A.

True

B.

False, a user can submit the request after the connection has already been initiated via the PSM for Windows.

Question 4

PSM generates recordings on the Vault server in real time.

Options:

A.

True

B.

False

Question 5

Multiple PVWA servers can be load balanced.

Options:

A.

TRUE

B.

FALSE

Question 6

Which file is used to configure new firewall rules on the Vault?

Options:

A.

firewall.ini

B.

paragent.ini

C.

dbparm.ini

D.

padr.ini

Question 7

It is possible to control the hours of the day during which a safe may be used.

Options:

A.

TRUE

B.

FALSE

Question 8

The DR module allows an integration with Enterprise Backup software

Options:

A.

TRUE

B.

FALSE

Question 9

It is impossible to override Master Policy settings for a Platform

Options:

A.

TRUE

B.

FALSE

Question 10

The vault does not support Role Based Access Control

Options:

A.

TRUE

B.

FALSE

Question 11

A Reconcile Account can be specified in the Master Policy.

Options:

A.

TRUE

B.

FALSE

Question 12

What is the primary purpose of Dual Control?

Options:

A.

Reduced risk of credential theft

B.

More frequent password changes

C.

Non-repudiation (individual accountability)

D.

To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorization

Question 13

When managing SSH keys. CPM automatically pushes the Public Key to the target system.

Options:

A.

TRUE

B.

FALSE

Question 14

CyberArk creates exceptions for Data Execution Prevention (DEP) on selected executable files. This is done as part of installing which of the following components?

Options:

A.

PSM

B.

CPM

C.

PVWA

D.

AAM Credential Provider (previously known as AIM Credential Provider)

Question 15

One of your users is receiving the error message “ITATS006E Station is suspended for User jsmith” when

attempting to sign in to the pvwa. Which utility would you use to correct this problem?

Options:

A.

createcredfile.exe

B.

cavaultmanager.exe

C.

PrivateArk

D.

PVWA

Question 16

An SMTP integration allows you to forward audit records from the vault to the SIEM.

Options:

A.

TRUE

B.

FALSE

Question 17

The ACME Company has been a CyberArk customer for many years. ACME Management has asked you to perform a “Health Check" review of the CyberArk deployment. During your analysis you discover that the PSM Component server is fully functional. The RDP SSL certificate is self-signed and the CyberArk Privileged Session Management Service is running under the Local Service. SSL 3.0 is enabled in the Registry.

Options:

A.

The PSM Component Server is configured as defined in PAS Installation Guide.

B.

The PSM Component Server has been installed correctly but PSM Hardening procedures have not been followed and must be rebuilt.

C.

The PSM Component Server has been installed correctly but PSM Hardening procedures have not been followed. Hardening procedures must be applied manually to the existing configuration.

D.

The PSM Component Server has been installed correctly but PVWA Hardening procedures have not been followed. Hardening procedures can be applied via the Installation Automation script or manually to the existing configuration.

Question 18

Time of day of week restrictions on when password changes can occur are configured in ________________.

Options:

A.

The Master Policy

B.

The Platform settings

C.

The Safe settings

D.

The Account Details

Question 19

Which of the following options is not set in the Master Policy?

Options:

A.

Password Expiration Date

B.

Dual Control

C.

Password Complexity

D.

Require Access Reason

Question 20

The Vault Internal safe contains the configuration for an LDAP integration

Options:

A.

TRUE

B.

FALSE

Question 21

Users complain they are unsuccessful attempting to authenticate to the PVWA web site. After entering their

credentials, they receive a “Timeout has expired”. You test the URL using multiple browsers and receive the

same error. The CyberArk.WebApplication.log shows the “ITACM012S Timeout has expired” log entry.

What is the next troubleshooting step you should take?

Options:

A.

Run an IISRESET on the PVWA server

B.

Check the CyberArk.WebConsole.log for errors

C.

Check network firewall rules to ensure the PVWA can communicate to the Vault over tcp_1858

D.

Check the health of the Vault Server and ensure all services are running

Question 22

What is the purpose of EVD?

Options:

A.

To extract vault metadata into an open database platform.

B.

To allow editing of vault metadata.

C.

To create a backup of the MySQL database.

D.

To extract audit data from the vault.

Question 23

What is the PRIMARY reason for installing more than 1 active CPM?

Options:

A.

Installing CPMs in multiple sites prevents complex firewall rules to manage devices at remote sites.

B.

Multiple instances create fault tolerance.

C.

Multiple instances increase response time.

D.

Having additional CPMs increases the maximum number of devices CyberArk can manage

Question 24

Which file would you modify to configure your Vault Server to forward Activity Logs to a SIEM or SYSLOG server?

Options:

A.

dbparm.ini

B.

PARagent.ini

C.

ENEConf.ini

D.

padre.ini

Question 25

Which combination of safe member permissions will allow End Users to log in to a remote machine

transparently but NOT show or copy the password?

Options:

A.

Use Accounts, Retrieve Accounts, List Accounts

B.

Use Accounts, List Accounts

C.

Use Accounts

D.

List Accounts, Retrieve Accounts

Question 26

When planning to load balance at least 2 PSM Servers in an "in-domain" deployment, is it required to move the PSMConnect and PSMAdminConnect users to the domain level?

Options:

A.

Yes. but only the PSMConnect user must be moved to the domain.

B.

No. this is the customers decision and will work with local or domain based users.

C.

Yes, both PSMConnect and PSMAdminConnect users should be moved to the domain

D.

No. both accounts must be left as local accounts.

Question 27

The Vault does not support dual factor authentication.

Options:

A.

True

B.

False

Question 28

Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?

Options:

A.

Password change

B.

Password reconciliation

C.

Session suspension

D.

Session termination

Question 29

Which file is used to configure the ENE service?

Options:

A.

ENE.ini

B.

ENEConfig.ini

C.

dbparm.ini

D.

paragent.ini

Question 30

After the Vault server is installed, the Microsoft Windows firewall is now commandeered by the Vault. Can the administrator change these firewall rules?

Options:

A.

Yes, but the administrator can only modify the firewall rules by editing the dbparm.ini file and the restarting the Vault.

B.

Yes, the administrator can still modify firewall rules via the Windows firewall interface.

C.

No, the Vault does not permit any changes to the firewall due to security requirements.

D.

Yes, but the administrator can only modify the firewall rules by editing the FirewallRules.ini file and the restarting the Vault.

Question 31

What is the process to remove object level access control from a Safe?

Options:

A.

Uncheck the 'Enable Object Level Access Control' on the Safe Details page in the PVWA.

B.

Uncheck the 'Enable Object Level Access Control' box in the Safe Properties in PrivateArk.

C.

This cannot be done.

D.

Remove all ACLs from the Safe.

Question 32

Which file does the Vault administrator need to edit in order to configure the integration of the Vault with the radius server?

Options:

A.

radius.ini

B.

PARagent.ini

C.

ENEConf.ini

D.

dbparm.ini

Question 33

A logon account can be specified in the platform settings.

Options:

A.

True

B.

False

Question 34

When working with the CyberArk Cluster, which service is considered Optional (i.e., failure of the service does

not mandate a failover)?

Options:

A.

PrivateArk Server

B.

PrivateArk Database

C.

Event Notification Engine

D.

Logic Container

Question 35

Which file is used to integrate the Vault with the RADIUS server?

Options:

A.

radius.ini

B.

PARagent.ini

C.

ENEConf.ini

D.

dbparm.ini

Page: 1 / 24
Total 237 questions