QUESTION 1
If a user is a member of more than one group that has authorizations on a safe, by default that user is
granted____________________.
A. the vault will not allow this situation to occur.
B. only those permissions that exist on the group added to the safe first.
C. only those permissions that exist in all groups to which the user belongs.
D. the cumulative permissions of all the groups to which that user belongs.
Answer: B
Section: (none)
Explanation
Explanation/Reference:
QUESTION 2
It is possible to control the hours of the day during which a user may long into the vault.
A. TRUE
B. FALSE
Answer: A
Section: (none)
Explanation
Explanation/Reference:
Reference: https://isecurenet.net/wp-content/uploads/2016/06/user-sb-cyberark_privileged_threat_analytics-
030916-final-en-web.pdf
QUESTION 3
VAULT authorizations may be granted to ____________________.
Select all that apply.
A. Vault Users
B. Vault Groups
C. LDAP Users
D. LDAP Groups
Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 4
What is the purpose of the Interval setting in a CPM policy?
A. To control how often the CPM looks for System Initiated CPM work.
B. To control how often the CPM looks for User Initiated CPM work.
C. To control how long the CPM rests between password changes.
D. To control the maximum amount of time the CPM will wait for a password change to complete.
Answer: C
Section: (none)
Explanation
Explanation/Reference:
QUESTION 5
All of your Unix root passwords are stored in the safe UnixRoot. Dual control is enabled for some of the
accounts in that safe. The members of the AD group UnixAdmins need to be able to use the show, copy, and
connect buttons on those passwords at any time without confirmation. The members of the AD group
OperationsStaff need to be able to use the show, copy and connect buttons on those passwords on an
emergency basis, but only with the approval of a member of OperationsManagers. The members of
OperationsManagers never need to be able to use the show, copy or connect buttons themselves.
Which safe permissions do you need to grant to OperationsStaff? Check all that apply.
A. Use Accounts
B. Retrieve Accounts
C. List Accounts
D. Authorize Password Requests
E. Access Safe without Authorization
Answer: A
Section: (none)
Explanation
Explanation/Reference:
Click here to
view complete Q&A of CyberArk Defender CAU201 exam
Certkingdom Review,
Certkingdom PDF Torrents
Best CyberArk Defender CAU201 Certification, CyberArk Defender CAU201 Training at certkingdom.com