Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

CAU302 CyberArk Defender + Sentry Questions and Answers

Questions 4

When managing SSH keys, the Central Policy Manager (CPM) stores the private key .

Options:

A.

in the Vault

B.

on the target server

C.

in the Vault and on the target server

D.

nowhere because the private key can always be generated from the public key

Buy Now
Questions 5

Where do you configure in PVWA the fully-qualified domain name (FQDN) of your target email server during SMTP integration?

Options:

A.

PVWA > Platform Management > Notification Settings

B.

PVWA > Options > Notification Settings

C.

PVWA > Administration > Notification Settings

D.

PVWA > LDAP Integartion > Notification Settings

Buy Now
Questions 6

During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault. For which purpose are these credentials used?

Options:

A.

The credentials will be used later by the CPM to retrieve passwords from the Vault.

B.

The credentials are used by the installer to register the CPM in the CyberArk database.

C.

The credentials are used by the installer to authenticate to the Vault and create the Central Policy Manager (CPM) environment (Safes, users, etc.).

D.

The credentials will be used later by the CPM to update passwords in the Vault.

Buy Now
Questions 7

As long as you are a member of the Vault Admins group, you can grant any permission on any safe that you have access to.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 8

What is the purpose of the PrivateArk Database service?

Options:

A.

Maintains Vault metadata.

B.

Communicates with components.

C.

Sends email alerts from the vault ID.

D.

Executes password changes

Buy Now
Questions 9

Customers who have the 'Access Safe without confirmation' safe permission on a safe where accounts are configured for Dual control, still need to request approval to use the account.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 10

Which service is optional on the Vault?

Options:

A.

PrivateArk Server

B.

PrivateArk Remote Control Agent

C.

PrivateArk Database

D.

CyberArk Hardened Windows Firewall

Buy Now
Questions 11

Which report shows the accounts that are accessible to each user?

Options:

A.

Activity Report

B.

Entitlement Report

C.

Privileged Accounts Compliance Status Report

D.

Applications Inventory Report

Buy Now
Questions 12

What is the purpose of the password Change process?

Options:

A.

To test that CyberArk is storing accurate credentials for accounts

B.

To change the password of an account according to organizationally defined password rules

C.

To allow CyberArk to manage unknown or lost credentials

D.

To generate a new complex password

Buy Now
Questions 13

The Vault administrator can change the Vault license by uploading the new license to the system Safe.

Options:

A.

True

B.

False

Buy Now
Questions 14

It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 15

A Logon Account can be specified in the platform settings

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 16

Which service should NOT be running on the DR Vault when the primary production Vault is up?

Options:

A.

PrivateArk Database

B.

PrivateArk Server

C.

CyberArk Vault Disaster Recovery Service

D.

CyberArk Logical Container

Buy Now
Questions 17

Which file would you modify to configure your Vault Server to forward Activity Logs to a SIEM or SYSLOG server?

Options:

A.

dbparm.ini

B.

PARagent.ini

C.

ENEConf.ini

D.

padre.ini

Buy Now
Questions 18

A SIEM integration allows you to forward ITALOG records to a monitoring solution.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 19

PTA can automatically suspend sessions in case of suspicious activities detected in a privileged session, only if the session is made via the CyberArk PSM.

Options:

A.

True

B.

False, the PTA can suspend sessions whether the session is made via the PSM or not

Buy Now
Questions 20

Which Master Policy?

Options:

A.

Password Expiration Time

B.

Enabling and Disabling of the Connection Through the PSM

C.

Password Complexity

D.

The use of "One-Time-Passwords"

Buy Now
Questions 21

It is possible to leverage DNA to provide discovery functions that are not available with auto-detection.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 22

Any user can monitor live sessions in real time when users initiate RDP connection via Secure Connect through PSM?

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 23

A logon account can be specified in the platform settings.

Options:

A.

True

B.

False

Buy Now
Questions 24

For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure access a password without approval

Options:

A.

Create an exception to the Master Policy to exclude the group from the workflow process.

B.

Edit the master policy rule and modify the advanced 'Access safe without approval' rule to include the group.

C.

On the safe in which the account is stored grant the group the 'Access safe without audit' authorization.

D.

On the safe in which the account is stored grant the group the 'Access safe without confirmation' authorization

Buy Now
Questions 25

PSM requires the Remote Desktop Session Host role service.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 26

During the process of installing the CPM, you will be asked to provide the credentials for an administrate user in the Vault. What are these credentials used for?

Options:

A.

The credentials will be used later by the CPM to retrieve passwords from the Vault

B.

The credentials are by the installer to register the CPM in the CyberArk database

C.

The credentials are used by the installer to authenticate to the Vault and create the CPM environment (safes, users, etc.)

D.

The credentials will be used later by the CPM to update passwords in the Vault

Buy Now
Questions 27

You are successfully managing passwords in the alpha.cyberark com domain; however when you attempt to manage a password in the beta.cyberark.com domain, you receive the 'network path not found* error What should you check first?

Options:

A.

That the username and password are correct.

B.

That the CPM can successfully resolve addresses in the beta cyberark com domain

C.

That the end user has the correct permissions on the safe

D.

That an appropriate trust relationship exists between alphaxyberark.com and beta.cyberark.com

Buy Now
Questions 28

What are the chief benefits of PSM? Choose all that apply

Options:

A.

Privileged Session Isolation

B.

Automatic Password Management

C.

Privileged Session Recording

D.

A & C

Buy Now
Questions 29

Which of the following options is not set in the Master Policy?

Options:

A.

Password Expiration Date

B.

Dual Control

C.

Password Complexity

D.

Require Access Reason

Buy Now
Questions 30

Which Built-in group grants access to the ADMINISTRATION page?

Options:

A.

PVWAMonitor

B.

PVWAUsers

C.

Auditors

D.

Vault Admins

Buy Now
Questions 31

The following applications are pre-configured to work with PSM. but first need to be installed on the PSM server.

Options:

A.

SQL Plus

B.

Putty

C.

RDP

D.

WinSCP

E.

Toad

F.

VMWare vSphere Client

G.

Microsoft SQL Management Studio

Buy Now
Questions 32

Which user(s) can access all passwords in the vault

Options:

A.

Administrator

B.

Any member of Vault Admins

C.

Any member of Auditors

D.

Master

Buy Now
Questions 33

Vault admins must manually add the auditors group to newly created safes so auditors will have sufficient access to run reports.D18912E1457D5D1DDCBD40AB3BF70D5D

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 34

An SMTP integration allows you to forward audit records from the vault to the SIEM.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 35

Time of day of week restrictions on when password changes can occur are configured in ________________.

Options:

A.

The Master Policy

B.

The Platform settings

C.

The Safe settings

D.

The Account Details

Buy Now
Questions 36

What are the operating system prerequisites for installing CPM? Select all that apply.

Options:

A.

NET 3.51 Framework Feature

B.

Web Services Role

C.

Remote Desktop Services Role

D.

Windows 2008 R2 or higher

Buy Now
Questions 37

Which of the following logs contain information about errors related to PTA?

Options:

A.

ITAlog.log

B.

diamond.log

C.

pm_error.log

D.

WebApplication.log

Buy Now
Questions 38

Which credentials does CyberArk use when managing a target account?

Options:

A.

Those of the service account for the CyberArk Password Manager serviceD18912E1457D5D1DDCBD40AB3BF70D5D

B.

A Domain Administrator account created for this purpose

C.

The credentials of the target account

D.

An account assigned by the Master Policy

Buy Now
Questions 39

According to the default web options settings, which group grants access to the reports page?

Options:

A.

PVWAMonitor

B.

PVWAUsers

C.

Auditors

D.

Vault administrators

Buy Now
Questions 40

When the PSM Gateway (also known as the HTML5 ( End Point in order to launch connections via the PSM

Options:

A.

True

B.

False, when the PSM Gateway is implemented, the user only requires a browser in order launch a connection via the PSM

Buy Now
Questions 41

Using the SSH Key Manager it is possible to allow CPM to manage SSH Keys similarly to passwords.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 42

Which file is used to configure the ENE service?

Options:

A.

ENE.ini

B.

ENEConfig.ini

C.

dbparm.ini

D.

paragent.ini

Buy Now
Questions 43

What is the purpose of the CyberArk Event Notification Engine service.

Options:

A.

sends email messages from the vault.

B.

sends email messages from the CPM.

C.

processes audit reports.

D.

make vault data available to components

Buy Now
Questions 44

The DR module allows an integration with Enterprise Backup software

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 45

In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault.

Options:

A.

True.

B.

False. Because the user can also enter credentials manually using Ad-Hoc Access.

C.

False. Because if credentials are not stored in the vault, the PSM will log into the target device as PSMConnect.

D.

False. Because if credentials are not stored in the vault, the PSM will prompt for credentials.

Buy Now
Questions 46

In order to grant a permission to a user, and administrator MUST possess that permission.

Options:

A.

True

B.

False

Buy Now
Questions 47

Which one of the following reports is NOT generated by using the PVWA?

Options:

A.

Accounts Inventory

B.

Application Inventory

C.

Active/Non-Active Users

D.

Compliance Status

Buy Now
Questions 48

In an SMTP integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SMTP server addresses).

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 49

The Vault Internal safe contains all of the configuration for the vault.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 50

To support a fault tolerant and high-availability architecture, the Password Vault Web Access (PVWA) servers need to be configured to communicate with the Primary Vault and Satellite Vaults. What file needs to be changed on the PVWA to enable this setup?

Options:

A.

Vault.ini

B.

dbparm.ini

C.

pvwa.ini

D.

Satellite.ini

Buy Now
Questions 51

Which of the following statements are NOT true when enabling PSM recording for a target Windows server? Choose all that apply

Options:

A.

The PSM software must be installed on the target server

B.

PSM must be enabled in the Master Policy {either directly, or through exception).

C.

PSMConnect must be added as a local user on the target server

D.

RDP must be enabled on the target server

Buy Now
Questions 52

What is the name of the Platform parameter that determines the amount of time a person is allowed to use a One Time Password?

Options:

A.

MinValidityPeriod

B.

Interval

C.

ImmediateInterval

D.

Timeout

Buy Now
Questions 53

Which of the following are secure options for storing the contents of the Operator CD. while still allowing the contents to be accessible upon a planned Vault restart? Choose alt that apply

Options:

A.

Store the CD in a physical safe and mount the CD every time vault maintenance is performed.

B.

Copy the contents of the CD to the System Safe on the vault

C.

Copy the contents of the CD to a folder on the vault server and secure it with NTFS permissions.

D.

Store the server key in a Hardware Security Module.

E.

Store the server key in the Provider cache

Buy Now
Questions 54

PSM for SSH (previously known as “PSM SSH Proxy”) supports connections to the following target systems:

Options:

A.

Windows

B.

UNIX

C.

Oracle

D.

All of the above

Buy Now
Questions 55

In a Disaster Recovery (DR) environment, which of the following should NEVER be configured for automatic failover due to the possibility of split-brain phenomenon?

Options:

A.

Password Vault Web Access (PVWA)

B.

PSM

C.

CPM

D.

PTA

Buy Now
Questions 56

The Vault can only integrate with a single Security Information and Event Management (SIEM) or SYSLOG server.

Options:

A.

True

B.

False

Buy Now
Questions 57

If a transparent user belongs two different directory mappings, how does the system determine which user template to use?

Options:

A.

The system will use the template for the mapping listed first.

B.

The system will use the template for the mapping listed last.

C.

The system will grant all of the vault authorizations from the two templates.

D.

The system will grant only the vault authorizations that are listed in both templates.

Buy Now
Questions 58

The vault supports Subnet Based Access Control.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 59

For the hardening process to complete successfully, security products like Antivirus should be installed on the Vault server before running the vault installer

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 60

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe The members of the AD group UnixAdmms need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation The members of the AD group OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of OperationsManagers The members of OperationsManagers never need to be able to use the show, copy or connect buttons themselves.

Which safe permissions do you need to grant to UnixAdmins? Check all that apply

Options:

A.

Use Accounts

B.

Retrieve Accounts

C.

List Accounts

D.

Authorize Password Requests

E.

Access Safe without Authorization

Buy Now
Questions 61

Which parameter controls how often the CPM looks for accounts that need to be changed from recently completed Dual control requests?

Options:

A.

HeadStartInterval

B.

Interval

C.

ImmediateInterval

D.

The CPM does not change the password under this circumstance

Buy Now
Questions 62

Which one of the built-in Vault users is not automatically added to the safe when it is first created in PVWA?

Options:

A.

Master

B.

Administrator

C.

Auditor

D.

Operator

Buy Now
Questions 63

A SIEM integration allows you to forward audit records to a monitoring solution.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 64

An SMTP integration allows you to forward audit records to a monitoring solution.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 65

HA, DR, Replicate are mutually exclusive and cannot be used in the same environment.

Options:

A.

TRUE

B.

FALSE

Buy Now
Questions 66

Which file is used to integrate the Vault with the RADIUS server?

Options:

A.

radius.ini

B.

PARagent.ini

C.

ENEConf.ini

D.

dbparm.ini

Buy Now
Questions 67

Which of the following is considered a prerequiste for installing PSM?

Options:

A.

IIS Web Services Role

B.

HTML5 Gateway

C.

Provider

D.

Remote Desktop Services

Buy Now
Questions 68

What is the process to remove object level access control from a Safe?

Options:

A.

Uncheck the 'Enable Object Level Access Control' on the Safe Details page in the PVWA.

B.

Uncheck the 'Enable Object Level Access Control' box in the Safe Properties in PrivateArk.

C.

This cannot be done.

D.

Remove all ACLs from the Safe.

Buy Now
Questions 69

Which of the following PTA detections are included in the Core PAS offering? (Choose all that apply.)

Options:

A.

Suspected Credential Theft

B.

Over-Pass-The-Hash

C.

Golden Ticket

D.

Unmanaged Privileged Access

Buy Now
Questions 70

Access Control to passwords is implemented by ________________.

Options:

A.

Virtual Authorizations

B.

Safe Authorizations

C.

Master Policy

D.

Platform Settings

Buy Now
Questions 71

What is the primary purpose of One Time Passwords?

Options:

A.

Reduced risk of credential theft

B.

More frequent password changes

C.

Non-repudiation (individual accountability)

D.

To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorization

Buy Now
Exam Code: CAU302
Exam Name: CyberArk Defender + Sentry
Last Update: Apr 30, 2026
Questions: 237

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now CAU302 testing engine

PDF (Q&A)

$43.57  $124.49
buy now CAU302 pdf