CAU305 Demo and Sample
Note: Answers are below each question.
Samples are taken from full version.
Latest CAU305 Exam Questions and Practice Tests 2024 - Killexams.com
CAU305 Dumps CAU305 Braindumps CAU305 Real Questions CAU305 Practice Test
CAU305 Actual Questions
CyberArk
CAU305
CyberArk CDE Recertification
https://killexams.com/pass4sure/exam-detail/CAU305
Which type of automatic remediation can be performed by the PTA in case of a suspected credential theft security event?
Password change
Password reconciliation
Session suspension
Session termination
Answer: A,C,D
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PTA/SecurityÂConfiguration.htm
Question: 131
dbparm.ini is the main configuration file for the Vault.
True
False
Answer: A,B
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASREF/DBParm.ini.htm
Question: 132
When working with the CyberArk High Availability Cluster, which services are running on the passive node?
Cluster Vault Manager and PrivateArk Database
Cluster Vault Manager, PrivateArk Database and Remote Control Agent
Cluster Vault Manager
Cluster Vault Manager and Remote Control Agent
Answer: A,C,D
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ManagingÂthe-CyberArk- Digital-Cluster-Vault-Server.htm
Question: 133
When a DR Vault Server becomes an active vault, it will automatically revert back to DR mode once the Primary Vault comes back online.
True, this is the default behavior.
False, the Vault administrator must manually set the DR Vault to DR mode by setting "FailoverMode=no" in the padr.ini file.
True, if the AllowFailback setting is set to "yes" in the padr.ini file.
False, the Vault administrator must manually set the DR Vault to DR mode by setting "FailoverMode=no" in the dbparm.ini file.
Answer: A,C,D
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/11.3/en/Content/PASIMP/InitiatingÂDR-Failback-to- Production-Vault.htm
Question: 134
Which onboarding method is used to integrate CyberArk with the accounts provisioning process?
Accounts Discovery
Auto Detection
Onboarding RestAPI functions
PTA rules
Answer: A,B,C,D
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Provisioning-Accounts- Automatically.htm
Question: 135
Which file is used to open up a non-standard firewall port to the Vault?
dbparm.ini
PARagent.ini
passparm.ini
Vault.ini
Answer: A Question: 136
When using multiple Central Policy Managers (CPM), which one of the following Safes is shared by all CPMs?
PasswordManager
PasswordManager_Pending
PasswordManager_workspace
PasswordManager_ADIntemal
Answer: A
Explanation:
Reference: https://www.niap-ccevs.org/MMO/Product/st_vid11006-agd4.pdf (558)
What are the functions of the Remote Control Agent service? (Choose three.)
Allows remote monitoring the Vault
Sends SNMP traps from the Vault
Maintains audit data
Allows CyberArk services to be managed (start/stop/status) remotely
Answer: A,B,C,D
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Privileged-Account- Security-Remote- Administration.htm#:~:text=The%20CyberArk%20Vault%20Remote%20Control,and%20the%20Disaster%20Recovery%20Server
Question: 137
In a Distributed Vaults environment, which of the following components will NOT be communicating with the Satellite Vaults?
AAM Credential Provider (previously known as AIM Credential Provider)
ExportVaultData utility
PAReplicate utility
Central Policy Manager
Answer: D Question: 138
When managing SSH keys, the Central Policy Manager (CPM) stores the private key .
in the Vault
on the target server
in the Vault and on the target server
nowhere because the private key can always be generated from the public key
Answer: A,C,D
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/SSHKM/Managing
%20SSH%20Keys.htm
Question: 139
The PSM requires the Remote Desktop Web Access role service.
True
False
Answer: A,B
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PAS%20INST/Before-Installing- PSM.htm
Question: 140
Access control to passwords is implemented by .
Vault authorizations
Safe authorizations
Master Policy
platform settings
Answer: A,B,C,D
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ObjectÂLevel-Access- Control.htm
Question: 141
During the process of installing the Central Policy Manager (CPM), the Vault administrator will be asked to provide the credentials for an administrative user in the Vault.
For which purpose are these credentials used?
The credentials will be used later by the CPM to retrieve passwords from the Vault.
The credentials are used by the installer to register the CPM in the CyberArk database.
The credentials are used by the installer to authenticate to the Vault and create the Central Policy Manager (CPM) environment (Safes, users. etc.).
The credentials will be used later by the CPM to update passwords in the Vault.
Answer: C Question: 142
What is the purpose of the password verify process?
To test that CyberArk is storing accurate credentials for accounts.
To change the password of an account according to organizationally defined password rules.
To allow CyberArk to manage unknown or lost credentials.
To generate a new complex password.
Answer: A,C,D
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/VerifyingÂ- Passwords.htm#:~:text=The%20CPM%20can%20verify%20password,manually%20by%20an%20authorized%20user
For a Safe with object level access control enabled the Vault administrator is able to turn off object level access control when it no longer needed on the Safe.
True
False
Answer: A,B
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/ObjectÂLevel-Access- Control.htm
6$03/( 48(67,216
7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV
.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP
$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP
([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP
3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV
*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV
8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV
7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\
'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU
.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG
View Practice Questions »