CyberArk CAU201 - CyberArk Defender Exam

Page:    1 / 36   
Total 176 questions

If a user is a member of more than one group that has authorizations on a safe, by default that user is granted____________________.

  • A. the vault will not allow this situation to occur.
  • B. only those permissions that exist on the group added to the safe first.
  • C. only those permissions that exist in all groups to which the user belongs.
  • D. the cumulative permissions of all the groups to which that user belongs.


Answer : B

It is possible to control the hours of the day during which a user may long into the vault.

  • A. TRUE
  • B. FALSE


Answer : A

Reference:
https://isecurenet.net/wp-content/uploads/2016/06/user-sb-cyberark_privileged_threat_analytics-030916-final-en-web.pdf

VAULT authorizations may be granted to ____________________. (Choose all that apply.)

  • A. Vault Users
  • B. Vault Groups
  • C. LDAP Users
  • D. LDAP Groups


Answer : C

What is the purpose of the Interval setting in a CPM policy?

  • A. To control how often the CPM looks for System Initiated CPM work.
  • B. To control how often the CPM looks for User Initiated CPM work.
  • C. To control how long the CPM rests between password changes.
  • D. To control the maximum amount of time the CPM will wait for a password change to complete.


Answer : A

All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the accounts in that safe. The members of the AD group
UnixAdmins need to be able to use the show, copy, and connect buttons on those passwords at any time without confirmation. The members of the AD group
OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an emergency basis, but only with the approval of a member of OperationsManagers. The members of OperationsManagers never need to be able to use the show, copy or connect buttons themselves.
Which safe permissions do you need to grant to OperationsStaff? (Choose all that apply.)

  • A. Use Accounts
  • B. Retrieve Accounts
  • C. List Accounts
  • D. Authorize Password Requests
  • E. Access Safe without Authorization


Answer : A

Page:    1 / 36   
Total 176 questions