1.
What is the purpose of the Allowed Safes parameter in a CPM policy? (select all that apply)
Correct Answer(s)
A. To improve performance by reducing CPM workload.
B. To prevent accidental use of a policy in the wrong safe.
Explanation
The Allowed Safes parameter in a CPM policy serves two purposes. Firstly, it helps to improve performance by reducing the workload on the CPM (Central Policy Manager). By specifying the safes that are allowed for a particular policy, the CPM only needs to focus on those safes, thus optimizing its operations. Secondly, it prevents accidental use of a policy in the wrong safe. By restricting the policy to specific safes, it ensures that users cannot mistakenly apply the policy to safes where it shouldn't be used, maintaining security and preventing potential errors.
2.
VAULT authorizations may be granted to ________________. (select all that apply.)
Correct Answer(s)
A. Vault Users
C. LDAP Users
Explanation
VAULT authorizations can be granted to both Vault Users and LDAP Users. This means that individuals who are registered as Vault Users and users who are authenticated through LDAP can be given permissions and access to the Vault system. However, Vault Groups and LDAP Groups are not mentioned in the answer, so it can be inferred that authorizations cannot be granted to these group entities.
3.
Which of the following statements are NOT true when enabling PSM recording for a target Windows server? (select all that apply)
Correct Answer(s)
A. The PSM software must be installed on the target server.
C. PSMConnect must be added as a local user on the target server.
Explanation
When enabling PSM recording for a target Windows server, the PSM software does not need to be installed on the target server. PSM must be enabled in the Master Policy, either directly or through exception. However, PSMConnect does not need to be added as a local user on the target server. RDP does not need to be enabled on the target server.
4.
Which Built-In group grants access to the ADMINISTRATION page?
Correct Answer
D. Vault Admins
Explanation
The correct answer is Vault Admins. The Vault Admins group grants access to the ADMINISTRATION page, which suggests that this group has administrative privileges and control over the vault system. The other options, PVWAMonitor, PVWAUsers, and Auditors, do not specifically mention access to the ADMINISTRATION page, indicating that they may not have the same level of administrative access as Vault Admins.
5.
As long as you are a member of the Vault Admins group you can grant any permission
on any safe?
Correct Answer
B. False
Explanation
EXPLANATION for Answer: Being in Vault admins group only give you access to safes which are created during installation (safe created during installation process ) - This is clearly mentioned in documents.
6.
You have associated a logon account to one of your UNIX root accounts in the vault.
When attempting to verify the root account’s password the CPM will…
Correct Answer
C. Log in first with the logon account, then run the su command to log in as root using the password in the vault.
Explanation
When attempting to verify the root account's password, the CPM will first log in with the associated logon account. After that, it will use the "su" command to switch to the root account using the password stored in the vault. This ensures that the root account's password is not directly used and is instead accessed securely through the logon account.
7.
Ad-Hoc Access (formerly Secure Connect) provides the following features. (select all that apply)
Correct Answer(s)
A. PSM connections to target devices that are not managed by CyberArk.
B. Session Recording.
C. Real-time live session monitoring.
Explanation
Ad-Hoc Access (formerly Secure Connect) provides PSM connections to target devices that are not managed by CyberArk, allowing users to establish secure connections to these devices. It also offers session recording functionality, allowing users to record and review their sessions for auditing and compliance purposes. Additionally, Ad-Hoc Access provides real-time live session monitoring, enabling administrators to monitor active sessions in real-time for security and troubleshooting purposes.
8.
What is the maximum number of levels of authorizations you can set up in Dual Control?
Correct Answer
B. 2
Explanation
In Dual Control, the maximum number of levels of authorizations that can be set up is 2. This means that for any action or decision, there can be a maximum of two levels of approval required. Once the first level approves, the request can then be forwarded to the second level for final approval. This system ensures that important actions or decisions are reviewed and approved by multiple individuals, adding an extra layer of security and accountability.
9.
Do you want UNLIMITED access to a quiz that simulates CyberArk's CAU302: Defender + Sentry certification exam, and has over 200 questions that will help you PASS the certification exam?
Correct Answer
A. Yes
Explanation
To have UNLIMITED access to the MOST comprehensive and trustworthy quiz in preparation of CyberArk's CAU302: Defender + Sentry exam, please click here.
10.
I have been working with CyberArk products ____________________.
Explanation
The given correct answer is "between 3 years and 4 years". This indicates that the person has been working with CyberArk products for a period of time ranging from 3 to 4 years.