Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

CAU302 CyberArk Defender + Sentry Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CyberArk CAU302 CyberArk Defender + Sentry certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 4
Total 237 questions

Within the Vault each password is encrypted by

A.

The Server Key

B.

The Recovery Public Key

C.

The Recovery Private key

D.

Its own unique key.

Multiple PVWA servers are always all active

A.

TRUE

B.

FALSE

Users complain they are unsuccessful attempting to authenticate to the PVWA web site. After entering their

credentials, they receive a “Timeout has expired”. You test the URL using multiple browsers and receive the

same error. The CyberArk.WebApplication.log shows the “ITACM012S Timeout has expired” log entry.

What is the next troubleshooting step you should take?

A.

Run an IISRESET on the PVWA server

B.

Check the CyberArk.WebConsole.log for errors

C.

Check network firewall rules to ensure the PVWA can communicate to the Vault over tcp_1858

D.

Check the health of the Vault Server and ensure all services are running

The Accounts Feed contains:

A.

Accounts that were discovered by CyberArk in the last 30 days

B.

Accounts that were discovered by CyberArk that have not yet been onboarded

C.

All accounts added to the vault in the last 30 days

D.

All users added to CyberArk in the last 30 days

What is the PRIMARY reason for installing more than 1 active CPM?

A.

Installing CPMs in multiple sites prevents complex firewall rules to manage devices at remote sites.

B.

Multiple instances create fault tolerance.

C.

Multiple instances increase response time.

D.

Having additional CPMs increases the maximum number of devices CyberArk can manage

CyberArk implements license limits by controlling the number and types of users that can be provisioned in the vault.

A.

TRUE

B.

FALSE

During the process of installing the CPM, you will be asked to provide the credentials for an administrate user in the Vault. What are these credentials used for?

A.

The credentials will be used later by the CPM to retrieve passwords from the Vault

B.

The credentials are by the installer to register the CPM in the CyberArk database

C.

The credentials are used by the installer to authenticate to the Vault and create the CPM environment (safes, users, etc.)

D.

The credentials will be used later by the CPM to update passwords in the Vault

Which one of the following reports is NOT generated by using the PVWA?

A.

Accounts Inventory

B.

Application Inventory

C.

Active/Non-Active Users

D.

Compliance Status

When on-boarding accounts using Accounts Feed. Which of the following is true"?

A.

You must specify an existing Safe where the account will be stored when it is on-boarded to the Vault.

B.

You can specify the name of a new safe that will be created where the account will be stored when it is on-boarded to the Vault.

C.

You can specify the name of a new Platform that will be created and associated with the account.

D.

Any account that is on-boarded can be automatically reconciled regardless of the platform it is associated with

The Vault can only integrate with a single Security Information and Event Management (SIEM) or SYSLOG server.

A.

True

B.

False

What is the purpose of EVD?

A.

To extract vault metadata into an open database platform.

B.

To allow editing of vault metadata.

C.

To create a backup of the MySQL database.

D.

To extract audit data from the vault.

What is the purpose of the password Change process?

A.

To test that CyberArk is storing accurate credentials for accounts

B.

To change the password of an account according to organizationally defined password rules

C.

To allow CyberArk to manage unknown or lost credentials

D.

To generate a new complex password

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the

accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and

connect buttons on those passwords at any time without confirmation. The members of the AD group

OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an

emergency basis, but only with the approval of a member of OperationsManagers. The members of

OperationsManagers never need to be able to use the show, copy or connect buttons themselves.

Which safe permissions do you need to grant to OperationsManagers? (Choose all that apply.)

A.

Use Accounts

B.

Retrieve Accounts

C.

List Accounts

D.

Authorize Password Requests

E.

Access Safe without Authorization

A Logon Account can be specified in the platform settings

A.

TRUE

B.

FALSE

In an SMTP integration it is recommended to use the fully-qualified domain name (FQDN) when specifying the SMTP server addresses).

A.

TRUE

B.

FALSE

CyberArk recommends implementing object level access control on all Safes.

A.

True

B.

False

Which file is used to integrate the Vault with your Radius server?

A.

radius.ini

B.

paragent ini

C.

ENEConf.ini

D.

dbparm.ini

In order to connect to a target device through PSM. the account credentials used for the connection must be stored in the vault?

A.

True

B.

False. Because the user can also enter credentials manually using Secure Connect

C.

False. Because if credentials are not stored in the vault, the PSM will log into the target device as PSMConnect.

D.

False Because if credentials are not stored in the vault, the PSM will prompt for credentials

What are the operating system prerequisites for installing CPM? Select all that apply.

A.

NET 3.51 Framework Feature

B.

Web Services Role

C.

Remote Desktop Services Role

D.

Windows 2008 R2 or higher

The Vault Internal safe contains all of the configuration for the vault.

A.

TRUE

B.

FALSE

Page: 2 / 4
Total 237 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved