When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)A . Add any pre-existing security application to the Files to Be Ignored Always. B. Add EPM agent to the other security tools exclusions. C. EPM agent should never be run...
What CyberArk EPM feature should the Helpdesk technician use to allow the user elevation capabilities?
A Helpdesk technician needs to provide remote assistance to a user whose laptop cannot connect to the Internet to pull EPM policies. What CyberArk EPM feature should the Helpdesk technician use to allow the user elevation capabilities?A . Offline Policy Authorization Generator B. Elevate Trusted Application If Necessary C. Just...
What should the EPM Administrator do?
An EPM Administrator would like to enable a Threat Protection policy, however, the policy protects an application that is not installed on all endpoints. What should the EPM Administrator do?A . Enable the Threat Protection policy and configure the Policy Targets. B. Do not enable the Threat Protection policy. C....
On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?
On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?A . Privilege Escalation, Privilege Management, Application Management B. Privilege Management, Application Control, Threat analysis C. Privilege Management, Threat Protection, Application Escalation Control D. Privilege Management, Privilege Threat Protection, Local...
How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?
How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?A . It compares known ransomware signatures retrieved from virus databases. B. It sandboxes the suspected ransomware and applies heuristics. C. It monitors for any unauthorized access to specified files. D. It performs a lookup of file signatures against VirusTotal's...
What is a possible cause?
After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in. What is a possible cause?A . Secure Token on macOS endpoint is not enabled. B. EPM agent is not able to...
Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option?
Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option?A . Yes, when Audit Video recording started, when Audit Video recording stopped, and when Audit Recording video reached size limit. B. Yes, when Audit Video recording started, when not enough disk space to start the...
An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?
An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?A . Privilege Threat Protection under Policies. B. Authorized Applications under Application Groups. C. Protect Against Ransomware under Default Policies. D. Threat Protection under Agent Configurations.View AnswerAnswer: D
What should the EPM Administrator do?
An EPM Administrator would like to enable CyberArk EPM's Ransomware Protection in Restrict mode. What should the EPM Administrator do?A . Set Block unhandled applications to On. B. Set Protect Against Ransomware to Restrict. C. Set Protect Against Ransomware to Restrict and Set Block unhandled applications to On. D. Set...
What unauthorized change can CyberArk EPM Ransomware Protection prevent?
What unauthorized change can CyberArk EPM Ransomware Protection prevent?A . Windows Registry Keys B. Website Data C. Local Administrator Passwords D. Certificates in the Certificate StoreView AnswerAnswer: A