Free CAU302 Exam Braindumps (page: 23)

Page 22 of 57

If a transparent user belongs two different directory mappings, how does the system determine which user template to use?

  1. The system will use the template for the mapping listed first.
  2. The system will use the template for the mapping listed last.
  3. The system will grant all of the vault authorizations from the two templates.
  4. The system will grant only the vault authorizations that are listed in both templates.

Answer(s): A



When working with the CyberArk Cluster, the Virtual IP is used by:

  1. The CyberArk components to communicate with the Vault Cluster over the public network.
  2. The Vault nodes for exchanging keep-alive messages over the public network.
  3. The CyberArk components to communicate with the Vault Cluster over the private network.
  4. The Vault nodes for exchanging keep-alive messages over the public network.

Answer(s): A



What is the primary purpose of Dual Control?

  1. Reduced risk of credential theft
  2. More frequent password changes
  3. Non-repudiation (individual accountability)
  4. To force a ‘collusion to commit’ fraud ensuring no single actor may use a password without authorization

Answer(s): D



Which onboarding method would you use to integrate CyberArk with your accounts provisioning process?

  1. Accounts Discovery
  2. Auto Detection
  3. Onboarding RestAPI functions
  4. PTA Rules

Answer(s): B






Post your Comments and Discuss CyberArk CAU302 exam with other Community members:

CAU302 Discussions & Posts