CyberArk EPM-DEF CyberArk Defender – EPM Online Training
CyberArk EPM-DEF Online Training
The questions for EPM-DEF were last updated at Nov 22,2024.
- Exam Code: EPM-DEF
- Exam Name: CyberArk Defender - EPM
- Certification Provider: CyberArk
- Latest update: Nov 22,2024
Before enabling Ransomware Protection, what should the EPM Administrator do first?
- A . Enable the Privilege Management Inbox in Elevate mode.
- B . Enable the Control Applications Downloaded From The Internet feature in Restrict mode.
- C . Review the Authorized Applications (Ransomware Protection) group and update if necessary.
- D . Enable Threat Protection and Threat Intelligence modules.
What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?
- A . A separate set
- B . a VDI advanced policy
- C . a separate license
- D . A separate computer group
If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?
- A . vf_agent.exe
- B . epm_agent.exe
- C . vault_agent.exe
- D . db_agent.exe
What unauthorized change can CyberArk EPM Ransomware Protection prevent?
- A . Windows Registry Keys
- B . Website Data
- C . Local Administrator Passwords
- D . Certificates in the Certificate Store
How does CyberArk EPM’s Ransomware Protection feature monitor for Ransomware Attacks?
- A . It compares known ransomware signatures retrieved from virus databases.
- B . It sandboxes the suspected ransomware and applies heuristics.
- C . It monitors for any unauthorized access to specified files.
- D . It performs a lookup of file signatures against VirusTotal’s database.
On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?
- A . Privilege Escalation, Privilege Management, Application Management
- B . Privilege Management, Application Control, Threat analysis
- C . Privilege Management, Threat Protection, Application Escalation Control
- D . Privilege Management, Privilege Threat Protection, Local Privileged Accounts Management
An EPM Administrator would like to notify end users whenever the Elevate policy is granting users elevation for their applications. Where should the EPM Administrator go to enable the end-user dialog?
- A . End-user UI in the left panel of the console
- B . Advanced, Agent Configurations
- C . Default Policies
- D . End-User UI within the policy
Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option?
- A . Yes, when Audit Video recording started, when Audit Video recording stopped, and when Audit Recording video reached size limit.
- B . Yes, when Audit Video recording started, when not enough disk space to start the video recording, and when video recording is initializing.
- C . Yes, when Audit Video recording started, when Audit Video recording is uploaded to the EPM server, and when audit recording cannot be initialized.
- D . No, Audit Video is only available without the possibility of having End-User dialog pop-ups.
An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?
- A . Privilege Threat Protection under Policies.
- B . Authorized Applications under Application Groups.
- C . Protect Against Ransomware under Default Policies.
- D . Threat Protection under Agent Configurations.
When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
- A . Add any pre-existing security application to the Files to Be Ignored Always.
- B . Add EPM agent to the other security tools exclusions.
- C . EPM agent should never be run with any other security tools.
- D . Create new advanced policies for each security tool.