CAU305 CyberArk CDE Recertification Exam
OVERVIEW
For those who want recognition for their technical expertise, the CyberArk
Certification Program offers a variety of options to pursue. Each level
demonstrates expertise in cyber security as well as in the innovative and
industry-leading CyberArk Privileged Access Security Solution.
25% - of cyber security positions go unfilled for 6 months
70% - of organizations say the cyber security skills gap has impacted business
1.8 million - person shortage of cyber security professionals by 2022
TRAINING OPTIONS
Students can choose from a variety of learning options, including virtual
classroom, live face-to-face, or self-paced classes. Our courses provide
extensive hands-on exercises leveraging data centers around the globe.
CERTIFICATION OPTIONS
The CyberArk Certification Program offers a variety of options to those who want
recognition for their technical expertise.
The CyberArk Certification Program, hosted and proctored by Pearson VUE*, offers
multi-level industry certifications covering privileged account security.
Cyberark offers certifications designed for various roles and experience, each
introducing progressively more advanced and challenging material and exams. You
can work up to the level that best aligns with your responsibilities and career
ambitions.
LEVEL ONE: TRUSTEE
The holder of this certificate has proven their basic knowledge of the use
of privileged access in cyber security as well as an understanding of the
CyberArk solutions.
LEVEL TWO: DEFENDER
The holder of this certification has proven their theoretical and hands on
expertise in the daily maintenance and operation tasks of the Privileged Access
Security Solution
LEVEL THREE: SENTRY
The holder of Sentry certification has proven their skills, both theoretical and
hands on, with the deployment and configuration of the CyberArk solution.
LEVEL FOUR: GUARDIAN
Holders of this certification have proven their advanced skills with the various
CyberArk solutions and their ability to combine organizational architecture with
privileged access security strategy.
QUESTION 1
Which type of automatic remediation can be performed by the PTA in case of a
suspected credential theft security event?
A. Password change
B. Password reconciliation
C. Session suspension
D. Session termination
Correct Answer: A
QUESTION 2
dbparm.ini is the main configuration file for the Vault.
A. True
B. False
Correct Answer: A
QUESTION 3
When working with the CyberArk High Availability Cluster, which services are
running on the passive node?
A. Cluster Vault Manager and PrivateArk Database
B. Cluster Vault Manager, PrivateArk Database and Remote Control Agent
C. Cluster Vault Manager
D. Cluster Vault Manager and Remote Control Agent
Correct Answer: C
QUESTION 4
When a DR Vault Server becomes an active vault, it will automatically revert
back to DR mode once the Primary Vault comes back online.
A. True, this is the default behavior.
B. False, the Vault administrator must manually set the DR Vault to DR mode by
setting "FailoverMode=no" in the padr.ini file.
C. True, if the AllowFailback setting is set to "yes" in the padr.ini file.
D. False, the Vault administrator must manually set the DR Vault to DR mode by
setting "FailoverMode=no" in the dbparm.ini file.
Correct Answer: A
QUESTION 5
Which onboarding method is used to integrate CyberArk with the accounts
provisioning process?
A. Accounts Discovery
B. Auto Detection
C. Onboarding RestAPI functions
D. PTA rules
Correct Answer: B
Actualkey CyberArk CDE
CAU305 Exam pdf,
Certkingdom CyberArk CDE CAU305 PDF

Best CyberArk CDE CAU305 Certification, CyberArk CDE CAU305 Training at certkingdom.com
Comments
Post a Comment