無料で使えるCAU201サンプル問題で100%カバー率のリアル試験問題(更新された179問あります) [Q63-Q87]

Share

無料で使えるCAU201サンプル問題で100%カバー率のリアル試験問題(更新された179問あります)

今すぐダウンロード!リアルCyberArk CAU201試験問題集テストエンジン試験問題


CyberArk Defender認定試験は、CyberArk Privileged Access Security(PAS)Suite、CyberArk Endpoint Privilege Manager(EPM)、CyberArk Privilege Cloudを含むCyberArkソリューションの経験を持つセキュリティプロフェッショナルを対象としています。この試験は、候補者がこれらのソリューションを効果的に構成、実装、管理する能力をテストすることを中心に、特権アカウントセキュリティ、脅威検知と対応、コンプライアンスと監査要件などのトピックもカバーしています。

 

質問 # 63
For each listed prerequisite, identify if it is mandatory or not mandatory to run the PSM Health Check.

正解:

解説:


質問 # 64
The primary purpose of exclusive accounts is to ensure non-repudiation (Individual accountability).

  • A. TRUE
  • B. FALS

正解:A


質問 # 65
Which utilities could you use to change debugging levels on the vault without having to restart the vault.
Select all that apply.

  • A. PrivateArk Server Central Administration
  • B. Edit DBParm.ini in a text editor.
  • C. Setup.exe
  • D. PAR Agent

正解:A、D

解説:
Explanation
PAR-Private Ark Remote Control Agent allows you to perform several Vault admin tasks (without restarting the Vault) and view machine statistics.


質問 # 66
Match the log file name with the CyberArk Component that generates the log.

正解:

解説:


質問 # 67
Which built-in report from the reports page in PVWA displays the number of days until a password is due to expire?

  • A. Activity Log
  • B. Privileged Accounts Inventory
  • C. Privileged Accounts Compliance Status
  • D. Privileged Accounts CPM Status

正解:C


質問 # 68
Time of day or day of week restrictions on when password verifications can occur configured in ____________________.

  • A. The Platform settings
  • B. The Master Policy
  • C. The Safe settings
  • D. The Account Details

正解:A


質問 # 69
Assuming a safe has been configured to be accessible during certain hours of the day, a Vault Admin may still access that safe outside of those hours.

  • A. FALSE
  • B. TRUE

正解:A

解説:
Explanation/Reference: https://www.freshers360.com/wp-content/uploads/2019/05/Privileged-Account-Security- Implementation-Guide.pdf


質問 # 70
What is the purpose of the Immediate Interval setting in a CPM policy?

  • A. To control how often the CPM rests between password changes.
  • B. To control how often the CPM looks for System Initiated CPM work.
  • C. To control how often the CPM looks for User Initiated CPM work.
  • D. To Control the maximum amount of time the CPM will wait for a password change to complete.

正解:C

解説:
Explanation
When the Master Policy enforces check-in/check-out exclusive access, passwords are changed when the user clicks the Release button and releases the account. This is based on the ImmediateInterval parameter in the applied platform. If the user forgets to release the account, it is automatically released and changed by the CPM after a predetermined number of minutes, defined in the MinValidityPeriod parameter specified in the platform


質問 # 71
Which report provides a list of accounts stored in the vault.

  • A. Activity Log
  • B. Entitlement Report
  • C. Privileged Accounts Inventory
  • D. Privileged Accounts Compliance Status

正解:C

解説:
Explanation/Reference: https://techinsight.com.vn/language/en/privileged-account-security-solution-part-2/


質問 # 72
Time of day or day of week restrictions on when password verifications can occur configured in
____________________.

  • A. The Platform settings
  • B. The Master Policy
  • C. The Safe settings
  • D. The Account Details

正解:A

解説:
Explanation/Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Verifying-
Passwords.htm


質問 # 73
In order to connect to a target device through PSM, the account credentials used for the connection must be stored in the vault?

  • A. False. Because if credentials are not stored in the vault, the PSM will prompt for credentials.
  • B. False. Becauseif credentials are not stored in the vault, the PSM will log into the target device as PSM Connect.
  • C. True.
  • D. False. Because the user can also enter credentials manually using Secure Connect.

正解:B


質問 # 74
The password upload utility must run from the CPM server

  • A. FALSE
  • B. TRUE

正解:A

解説:
Explanation/Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Password- Upload-Utility.htm


質問 # 75
Which utilities could you use to change debugging levels on the vault without having to restart the vault. Select all that apply.

  • A. PrivateArk Server Central Administration
  • B. Edit DBParm.ini in a text editor.
  • C. Setup.exe
  • D. PAR Agent

正解:A、D

解説:
PAR-Private Ark Remote Control Agent allows you to perform several Vault admin tasks (without restarting the Vault) and view machine statistics.


質問 # 76
For Digital Vault Cluster in a high availability configuration, how does the cluster determine if a node is down?

  • A. The shared storage array is offline.
  • B. The Digital Vault Cluster does not detect a node failure.
  • C. An alert is generated in the Windows Event log.
  • D. The heartbeat s no longer detected on the private network.

正解:D


質問 # 77
A new HTML5 Gateway has been deployed in your organization.
Where do you configure the PSM to use the HTML5 Gateway?

  • A. Administration > Options > Privileged Session Management > Configured PSM Servers > Add PSM Gateway
  • B. Administration > Options > Privileged Session Management > Add Configured PSM Gateway Servers
  • C. Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details > Add PSM Gateway
  • D. Administration > Options > Privileged Session Management > Configured PSM Servers > Connection Details

正解:C

解説:
Reference:
%7CConfiguration%7C_____10


質問 # 78
Ad-Hoc Access (formerly Secure Connect) provides the following features. Choose all that apply.

  • A. Session Recording.
  • B. PSM connections from a terminal without the need to login to the PVWA.
  • C. Real-time live session monitoring.
  • D. PSM connections to target devices that are not managed by CyberArk.

正解:A、C、D


質問 # 79
You have been asked to secure a set of shared accounts in CyberArk whose passwords will need to be used by end users. The account owner wants to be able to track who was using an account at any given moment.
Which security configuration should you recommend?

  • A. Configure shared account mode on the appropriate safe.
  • B. Configure both one-time passwords and exclusive access for the appropriate platform in Master Policy.
  • C. Configure object level access control on the appropriate safe.
  • D. Configure one-time passwords for the appropriate platform in Master Policy.

正解:C


質問 # 80
A Simple Mail Transfer Protocol (SMTP) integration is critical for monitoring Vault activity and facilitating workflow processes, such as Dual Control.

  • A. False
  • B. True

正解:A


質問 # 81
For an account attached to a platform that requires Dual Control based on a Master Policy exception, how would you configure a group of users to access a password without approval.

  • A. Create an exception to the Master Policy to exclude the group from the workflow process.
  • B. On the safe in which the account is stored grant the group the 'Access safe without audit' authorization.
  • C. On the safe in which the account is stored grant the group the 'Access safe without confirmation' authorization.
  • D. Edit the master policy rule and modify the advanced 'Access safe without approval' rule to include the group.

正解:A

解説:
Explanation/Reference: https://www.reddit.com/r/CyberARk/comments/6270zr/dual_control_on_specific_accounts/


質問 # 82
Which one the following reports is NOT generated by using the PVWA?

  • A. Sales List
  • B. Accounts Inventory
  • C. Application Inventory
  • D. Convince Status

正解:D


質問 # 83
How does the Vault administrator apply a new license file?

  • A. Upload the license.xml file to the Vault Internal Safe
  • B. Upload the license.xml file to the system Safe and restart the PrivateArk Server service
  • C. Upload the license.xml file to the Vault Internal Safe and restart the PrivateArk Server service
  • D. Upload the license.xml file to the system Safe

正解:D


質問 # 84
As long as you are a member of the Vault Admins group, you can grant any permission on any safe that you have access to.

  • A. FALSE
  • B. TRUE

正解:A

解説:
Being in Vault admins group only give you access to safes which are created during installation (safe created in installation process ) -This is clearly mentioned in documents .


質問 # 85
CyberArk implements license limits by controlling the number and types of users that can be provisioned in the
vault.

  • A. FALSE
  • B. TRUE

正解:B

解説:
Explanation/Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/PAS/Latest/en/Content/PASIMP/Managing-the-
CyberArk-License.htm


質問 # 86
Which combination of Safe member permissions will allow end users to log in to a remote machine transparently but NOT show or copy the password?

  • A. List Accounts, Retrieve Accounts
  • B. Use Accounts, List Accounts
  • C. Use Accounts, Retrieve Accounts, List Accounts
  • D. Use Accounts

正解:A


質問 # 87
......

最新CAU201テスト問題集を試そう!更新されたCyberArk試験が合格できます:https://www.goshiken.com/CyberArk/CAU201-mondaishu.html