Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CyberArk CAU302 Practice Exam with Questions & Answers | Set: 5

Questions 41

Which IP port and Protocol are used by the CyberArk Secure Proprietary Protocol?

Options:
A.

TCP/1858

B.

TCP/636

C.

UDP/1812

D.

TCP/22

CyberArk CAU302 Premium Access
Questions 42

The Vault Internal safe contains the configuration for an LDAP integration

Options:
A.

TRUE

B.

FALSE

Questions 43

An SMTP integration allows you to forward audit records to a monitoring solution.

Options:
A.

TRUE

B.

FALSE

Questions 44

If a password is changed manually on a server, bypassing the CPM, how would you configure the account so

that the CPM could resume management automatically?

Options:
A.

Configure the Provider to change the password to match the Vault’s Password

B.

Associate a reconcile account and configure the platform to reconcile automatically

C.

Associate a logon account and configure the platform to reconcile automatically

D.

Run the correct auto detection process to rediscover the password

Questions 45

CyberArk creates exceptions for Data Execution Prevention (DEP) on selected executable files. This is done as part of installing which of the following components?

Options:
A.

PSM

B.

CPM

C.

PVWA

D.

AAM Credential Provider (previously known as AIM Credential Provider)

Questions 46

What is the purpose of EVD?

Options:
A.

To extract vault metadata into an open database platform.

B.

To allow editing of vault metadata.

C.

To create a backup of the MySQL database.

D.

To extract audit data from the vault.

Questions 47

What is the proper way to allow the Vault to resolve host names?

Options:
A.

Define a DNS server

B.

Define a WINS server

C.

Defining the local hosts file

D.

The Vault cannot resolve host names due to security standards

Questions 48

When working with the CyberArk Cluster, the Virtual IP is used by:

Options:
A.

The CyberArk components to communicate with the Vault Cluster over the public network.

B.

The Vault nodes for exchanging keep alive messages over the public network.

C.

The CyberArk components to communicate with the Vault Cluster over the private network.

D.

The Vault nodes for exchanging keep alive messages over the public network.

Questions 49

Can ITALOG records be forwarded to the monitoring solution via Security Information and Event Management (SIEM) integration?

Options:
A.

Yes

B.

No

Questions 50

The vault supports a number of dual factor authentication methods.

Options:
A.

TRUE

B.

FALSE