An EPM Administrator would like to enable CyberArk EPM's Ransomware Protection in Restrict mode. What should the EPM Administrator do?
Answer : C
Where would an EPM admin configure an application policy that depends on a script returning true for an end user's machine being connected to an open (no password protection) Wi-Fi?
Answer : B
An EPM Administrator would like to enable a Threat Protection policy, however, the policy protects an application that is not installed on all endpoints.
What should the EPM Administrator do?
Answer : D
Which policy can be used to improve endpoint performance for applications commonly used for software development?
Answer : B
What are the predefined application groups?
Answer : C
In EPM, creation of which user type is required to use SAML?
Answer : D
For Advanced Policies, what can the target operating system users be set to?
Answer : C
A particular user in company ABC requires the ability to run any application with administrative privileges every day that they log in to their systems for a total duration of 5 working days.
What is the correct solution that an EPM admin can implement?
Answer : B
After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in.
What is a possible cause?
Answer : A
If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?
Answer : B
A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?
Answer : B
An application has been identified by the LSASS Credentials Harvesting Module.
What is the recommended approach to excluding the application?
Answer : A
What are valid policy options for JIT and elevation policies?
Answer : C
How does a Trusted Source policy affect an application?
Answer : D
On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us