CAU305 Dumps CAU305 Braindumps CAU305 Real Questions CAU305 Practice Test CAU305 Actual Questions CyberArk CAU305 CyberArk CDE Recertification https://killexams.com/pass4sure/exam-detail/CAU305 Question: 130 Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event? A. Password change B. Password reconciliation C. Session suspension D. Session termination Answer: A,C,D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PTA/SecurityÂConfiguration.htm Question: 131 dbparm.ini is the main configuration file for the Vault. A. True B. False Answer: A,B Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASREF/DBParm.ini.htm Question: 132 When working with the CyberArk High Availability Cluster, which services are running on the passive node? A. Cluster Vault Manager and PrivateArk Database B. Cluster Vault Manager, PrivateArk Database and Remote Control Agent C. Cluster Vault Manager D. Cluster Vault Manager and Remote Control Agent Answer: A,C,D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ManagingÂthe-CyberArk- Digital-Cluster-Vault-Server.htm Question: 133 When a DR Vault Server becomes an active vault, it will automatically revert back to DR mode once the Primary Vault comes back online. A. True, this is the default behavior. B. False, the Vault administrator must manually set the DR Vault to DR mode by setting "FailoverMode=no" in the padr.ini file. C. True, if the AllowFailback setting is set to "yes" in the padr.ini file. D. False, the Vault administrator must manually set the DR Vault to DR mode by setting "FailoverMode=no" in the dbparm.ini file. Answer: A,C,D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.3/en/Content/PASIMP/InitiatingÂDR-Failback-to- Production-Vault.htm Question: 134 Which onboarding method is used to integrate CyberArk with the accounts provisioning process? A. Accounts Discovery B. Auto Detection C. Onboarding RestAPI functions D. PTA rules Answer: A,B,C,D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Provisioning-Accounts- Automatically.htm Question: 135 Which file is used to open up a non-standard firewall port to the Vault? A. dbparm.ini B. PARagent.ini C. passparm.ini D. Vault.ini Answer: A Question: 136 When using multiple Central Policy Managers (CPM), which one of the following Safes is shared by all CPMs? A. PasswordManager B. PasswordManager_Pending C. PasswordManager_workspace D. PasswordManager_ADIntemal Answer: A Explanation: Reference: https://www.niap-ccevs.org/MMO/Product/st_vid11006-agd4.pdf (558) Question: 136 What are the functions of the Remote Control Agent service? (Choose three.) A. Allows remote monitoring the Vault B. Sends SNMP traps from the Vault C. Maintains audit data D. Allows CyberArk services to be managed (start/stop/status) remotely Answer: A,B,C,D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Privileged-Account- Security-Remote- Administration.htm#:~:text=The%20CyberArk%20Vault%20Remote%20Control,and%20the%20Disaster%20Recovery%20Server Question: 137 In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults? A. AAM Credential Provider (previously known as AIM Credential Provider) B. ExportVaultData utility C. PAReplicate utility D. Central Policy Manager Answer: D Question: 138 When managing SSH keys, the Central Policy Manager (CPM) stores the private key __________. A. in the Vault B. on the target server C. in the Vault and on the target server D. nowhere because the private key can always be generated from the public key Answer: A,C,D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/SSHKM/Managing %20SSH%20Keys.htm Question: 139 The PSM requires the Remote Desktop Web Access role service. A. True B. False Answer: A,B Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Before-Installing- PSM.htm Question: 140 Access control to passwords is implemented by __________. A. Vault authorizations B. Safe authorizations C. Master Policy D. platform settings Answer: A,B,C,D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ObjectÂLevel-Access- Control.htm Question: 141 During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault. For which purpose are these credentials used? A. The credentials will be used later by the CPM to retrieve passwords from the Vault. B. The credentials are used by the installer to register the CPM in the CyberArk database. C. The credentials are used by the installer to authenticate to the Vault and create the Central Policy Manager (CPM) environment (Safes, users. etc.). D. The credentials will be used later by the CPM to update passwords in the Vault. Answer: C Question: 142 What is the purpose of the password verify process? A. To test that CyberArk is storing accurate credentials for accounts. B. To change the password of an account according to organizationally defined password rules. C. To allow CyberArk to manage unknown or lost credentials. D. To generate a new complex password. Answer: A,C,D Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/VerifyingÂ- Passwords.htm#:~:text=The%20CPM%20can%20verify%20password,manually%20by%20an%20authorized%20user Question: 143 For a Safe with object level access control enabled the Vault administrator is able to turn off object level access control when it no longer needed on the Safe. A. True B. False Answer: A,B Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ObjectÂLevel-Access- Control.htm 6$03/( 48(67,216 7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV .LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP $FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP ([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP 3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV *XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV 8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV 7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\ 'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU .LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG