An EPM Administrator is looking to enable the Threat Deception feature, under what section should the EPM Administrator go to enable this feature?
An EPM Administrator is looking to enable the Threat Deception feature, under what section should the EPM Administrator go to enable this feature?A . Threat Protection Inbox B. Policies C. Threat Intelligence D. Policy AuditView AnswerAnswer: B
Before enabling Ransomware Protection, what should the EPM Administrator do first?
Before enabling Ransomware Protection, what should the EPM Administrator do first?A . Enable the Privilege Management Inbox in Elevate mode. B. Enable the Control Applications Downloaded From The Internet feature in Restrict mode. C. Review the Authorized Applications (Ransomware Protection) group and update if necessary. D. Enable Threat Protection and...
Which policy can be used to improve endpoint performance for applications commonly used for software development?
Which policy can be used to improve endpoint performance for applications commonly used for software development?A . Developer Applications B. Trusted Application C. Trusted Source D. Software UpdaterView AnswerAnswer: A
What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?
What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?A . A separate set B. a VDI advanced policy C. a separate license D. A separate computer groupView AnswerAnswer: A
What should the EPM Administrator do?
A company is looking to manage their Windows Servers and Desktops with CyberArk EPM. Management would like to define different default policies between the Windows Servers and Windows Desktops. What should the EPM Administrator do?A . In the Default Policies, exclude either the Windows Servers or the Windows Desktops. B....
An EPM Administrator would like to notify end users whenever the Elevate policy is granting users elevation for their applications. Where should the EPM Administrator go to enable the end-user dialog?
An EPM Administrator would like to notify end users whenever the Elevate policy is granting users elevation for their applications. Where should the EPM Administrator go to enable the end-user dialog?A . End-user UI in the left panel of the console B. Advanced, Agent Configurations C. Default Policies D. End-User...
In EPM, creation of which user type is required to use SAML?
In EPM, creation of which user type is required to use SAML?A . Local CyberArk EPM User B. AD User C. SQL User D. Azure AD UserView AnswerAnswer: D
If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?
If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?A . vf_agent.exe B. epm_agent.exe C. vault_agent.exe D. db_agent.exeView AnswerAnswer: B
Which of the following application options can be used when defining trusted sources?
Which of the following application options can be used when defining trusted sources?A . Publisher, Product, Size, URL B. Publisher, Name, Size, URI C. Product, URL, Machine, Package D. Product, Publisher, User/Group, Installation PackageView AnswerAnswer: B
What unauthorized change can CyberArk EPM Ransomware Protection prevent?
What unauthorized change can CyberArk EPM Ransomware Protection prevent?A . Windows Registry Keys B. Website Data C. Local Administrator Passwords D. Certificates in the Certificate StoreView AnswerAnswer: D