CAU305 Dumps CAU305 Braindumps CAU305 Real Questions CAU305 Practice Test

CAU305 Actual Questions


killexams.com CyberArk CAU305


CyberArk CDE Recertification


https://killexams.com/pass4sure/exam-detail/CAU305

Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?


  1. Password change

  2. Password reconciliation

  3. Session suspension

  4. Session termination


Answer: A,C,D


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PTA/SecurityÂConfiguration.htm


Question: 131


dbparm.ini is the main configuration file for the Vault.


  1. True

  2. False


Answer: A,B


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASREF/DBParm.ini.htm


Question: 132


When working with the CyberArk High Availability Cluster, which services are running on the passive node?


  1. Cluster Vault Manager and PrivateArk Database

  2. Cluster Vault Manager, PrivateArk Database and Remote Control Agent

  3. Cluster Vault Manager

  4. Cluster Vault Manager and Remote Control Agent


Answer: A,C,D


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ManagingÂthe-CyberArk- Digital-Cluster-Vault-Server.htm


Question: 133


When a DR Vault Server becomes an active vault, it will automatically revert back to DR mode once the Primary Vault comes back online.


  1. True, this is the default behavior.

  2. False, the Vault administrator must manually set the DR Vault to DR mode by setting "FailoverMode=no" in the padr.ini file.

  3. True, if the AllowFailback setting is set to "yes" in the padr.ini file.

  4. False, the Vault administrator must manually set the DR Vault to DR mode by setting "FailoverMode=no" in the dbparm.ini file.


Answer: A,C,D


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.3/en/Content/PASIMP/InitiatingÂDR-Failback-to- Production-Vault.htm


Question: 134


Which onboarding method is used to integrate CyberArk with the accounts provisioning process?


  1. Accounts Discovery

  2. Auto Detection

  3. Onboarding RestAPI functions

  4. PTA rules


Answer: A,B,C,D


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Provisioning-Accounts- Automatically.htm


Question: 135


Which file is used to open up a non-standard firewall port to the Vault?


  1. dbparm.ini

  2. PARagent.ini

  3. passparm.ini

  4. Vault.ini


Answer: A Question: 136

When using multiple Central Policy Managers (CPM), which one of the following Safes is shared by all CPMs?


  1. PasswordManager

  2. PasswordManager_Pending

  3. PasswordManager_workspace

  4. PasswordManager_ADIntemal


Answer: A


Explanation:


Reference: https://www.niap-ccevs.org/MMO/Product/st_vid11006-agd4.pdf (558)

What are the functions of the Remote Control Agent service? (Choose three.)


  1. Allows remote monitoring the Vault

  2. Sends SNMP traps from the Vault

  3. Maintains audit data

  4. Allows CyberArk services to be managed (start/stop/status) remotely


Answer: A,B,C,D


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Privileged-Account- Security-Remote- Administration.htm#:~:text=The%20CyberArk%20Vault%20Remote%20Control,and%20the%20Disaster%20Recovery%20Server


Question: 137


In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?


  1. AAM Credential Provider (previously known as AIM Credential Provider)

  2. ExportVaultData utility

  3. PAReplicate utility

  4. Central Policy Manager


Answer: D Question: 138

When managing SSH keys, the Central Policy Manager (CPM) stores the private key .


  1. in the Vault

  2. on the target server

  3. in the Vault and on the target server

  4. nowhere because the private key can always be generated from the public key


Answer: A,C,D


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/SSHKM/Managing

%20SSH%20Keys.htm


Question: 139


The PSM requires the Remote Desktop Web Access role service.


  1. True

  2. False


Answer: A,B

Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Before-Installing- PSM.htm


Question: 140


Access control to passwords is implemented by .


  1. Vault authorizations

  2. Safe authorizations

  3. Master Policy

  4. platform settings


Answer: A,B,C,D


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ObjectÂLevel-Access- Control.htm


Question: 141


During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault.


For which purpose are these credentials used?


  1. The credentials will be used later by the CPM to retrieve passwords from the Vault.

  2. The credentials are used by the installer to register the CPM in the CyberArk database.

  3. The credentials are used by the installer to authenticate to the Vault and create the Central Policy Manager (CPM) environment (Safes, users. etc.).

  4. The credentials will be used later by the CPM to update passwords in the Vault.


Answer: C Question: 142

What is the purpose of the password verify process?


  1. To test that CyberArk is storing accurate credentials for accounts.

  2. To change the password of an account according to organizationally defined password rules.

  3. To allow CyberArk to manage unknown or lost credentials.

  4. To generate a new complex password.


Answer: A,C,D


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/VerifyingÂ- Passwords.htm#:~:text=The%20CPM%20can%20verify%20password,manually%20by%20an%20authorized%20user

For a Safe with object level access control enabled the Vault administrator is able to turn off object level access control when it no longer needed on the Safe.


  1. True

  2. False


Answer: A,B


Explanation:


Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ObjectÂLevel-Access- Control.htm