What unauthorized change can CyberArk EPM Ransomware Protection prevent?
What unauthorized change can CyberArk EPM Ransomware Protection prevent?A . Windows Registry Keys B. Website Data C. Local Administrator Passwords D. Certificates in the Certificate StoreView AnswerAnswer: D
Which of the following application options can be used when defining trusted sources?
Which of the following application options can be used when defining trusted sources?A . Publisher, Product, Size, URL B. Publisher, Name, Size, URI C. Product, URL, Machine, Package D. Product, Publisher, User/Group, Installation PackageView AnswerAnswer: D
Before enabling Ransomware Protection, what should the EPM Administrator do first?
Before enabling Ransomware Protection, what should the EPM Administrator do first?A . Enable the Privilege Management Inbox in Elevate mode. B. Enable the Control Applications Downloaded From The Internet feature in Restrict mode. C. Review the Authorized Applications (Ransomware Protection) group and update if necessary. D. Enable Threat Protection and...
What should the EPM Administrator do?
An EPM Administrator would like to enable a Threat Protection policy, however, the policy protects an application that is not installed on all endpoints. What should the EPM Administrator do?A . Enable the Threat Protection policy and configure the Policy Targets. B. Do not enable the Threat Protection policy. C....
What is a possible cause?
After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in. What is a possible cause?A . Secure Token on macOS endpoint is not enabled. B. EPM agent is not able to...
How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?
How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?A . It compares known ransomware signatures retrieved from virus databases. B. It sandboxes the suspected ransomware and applies heuristics. C. It monitors for any unauthorized access to specified files. D. It performs a lookup of file signatures against VirusTotal's...
An EPM Administrator is looking to enable the Threat Deception feature, under what section should the EPM Administrator go to enable this feature?
An EPM Administrator is looking to enable the Threat Deception feature, under what section should the EPM Administrator go to enable this feature?A . Threat Protection Inbox B. Policies C. Threat Intelligence D. Policy AuditView AnswerAnswer: B
On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?
On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?A . Privilege Escalation, Privilege Management, Application Management B. Privilege Management, Application Control, Threat analysis C. Privilege Management, Threat Protection, Application Escalation Control D. Privilege Management, Privilege Threat Protection, Local...
What should the EPM Administrator do?
An EPM Administrator would like to enable CyberArk EPM's Ransomware Protection in Restrict mode. What should the EPM Administrator do?A . Set Block unhandled applications to On. B. Set Protect Against Ransomware to Restrict. C. Set Protect Against Ransomware to Restrict and Set Block unhandled applications to On. D. Set...
What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?
What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?A . A separate set B. a VDI advanced policy C. a separate license D. A separate computer groupView AnswerAnswer: D