CyberArk Defender + Sentry

Here you have the best CyberArk CAU302 practice exam questions

  • You have 141 total questions to study from
  • Each page has 5 questions, making a total of 29 pages
  • You can navigate through the pages using the buttons at the bottom
  • This questions were last updated on November 21, 2024
Question 1 of 141

The vault does not support Role Based Access Control

    Correct Answer: B

    The statement 'The vault does not support Role Based Access Control' is false. Modern vault systems typically support Role Based Access Control (RBAC) to manage access to sensitive data and resources efficiently and securely.

Question 2 of 141

The Remote Desktop Services role must be properly licensed by Microsoft.

    Correct Answer: A

    The Remote Desktop Services role must be properly licensed by Microsoft to ensure legal compliance and access to all features.

Question 3 of 141

One can create exceptions to the Master Policy based on ____________.

    Correct Answer: B

    Exceptions to the Master Policy can be based on Platforms as different platforms may have varying requirements or exceptions that need to be addressed. Safes, accounts, and policies may be components or subsets within platforms, but the primary factor for creating exceptions would logically be the platforms themselves.

Question 4 of 141

Which of the following statements are NOT true when enabling PSM recording for a target Windows server?

    Correct Answer: A

    The PSM software does not need to be installed on the target server for PSM recording. PSM (Privileged Session Management) typically connects to the target server remotely through RDP, so the PSM software itself is installed on a separate, dedicated server, not on the target server.

Question 5 of 141

It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe.

    Correct Answer: A

    It is possible to disable the Show and Copy buttons without removing the Retrieve permission on a safe. This can typically be configured through settings such as the Master Policy in certain systems.