Weekend Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

CyberArk EPM-DEF CyberArk Defender - EPM Exam Practice Test

Demo: 9 questions
Total 60 questions

CyberArk Defender - EPM Questions and Answers

Question 1

When enabling Threat Protection policies, what should an EPM Administrator consider? (Choose two.)

Options:

A.

Some Threat Protection policies are applicable only for Windows Servers as opposed to Workstations.

B.

Certain Threat Protection policies apply for specific applications not found on all machines

C.

Threat Protection policies requires an additional agent to be installed.

D.

Threat Protection features are not available in all regions.

Question 2

What can you manage by using User Policies?

Options:

A.

Just-In-Time endpoint access and elevation, access to removable drives, and Services access.

B.

Access to Windows Services only.

C.

Filesystem and registry access, access to removable drives, and Services access.

D.

Just-In-Time endpoint access and elevation, access to removable drives, filesystem and registry access, Services access, and User account control monitoring.

Question 3

Which programming interface enables you to perform activities on EPM objects via a REST Web Service?

Options:

A.

EPM Web Services SDK

B.

Application Password SDK

C.

Mac Credential Provider SDK

D.

Java password SDK

Question 4

For Advanced Policies, what can the target operating system users be set to?

Options:

A.

Local or AD users and groups, Azure AD User, Azure AD Group

B.

AD Groups, Azure AD Groups

C.

Local or AD users and groups

D.

Local or AD users, Azure AD Users

Question 5

A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?

Options:

A.

Policy creation date

B.

Target use group

C.

Creator of the policy

D.

The policy's Set name

Question 6

An application has been identified by the LSASS Credentials Harvesting Module.

What is the recommended approach to excluding the application?

Options:

A.

In Agent Configurations, add the application to the Threat Protection Exclusions

B.

Add the application to the Files to be Ignored Always in Agent Configurations.

C.

Exclude the application within the LSASS Credentials Harvesting module.

D.

Add the application to an Advanced Policy or Application Group with an Elevate policy action.

Question 7

Which policy can be used to improve endpoint performance for applications commonly used for software development?

Options:

A.

Developer Applications

B.

Trusted Application

C.

Trusted Source

D.

Software Updater

Question 8

An end user is experiencing performance issues on their device after the EPM Agent had been installed on their machine. What should the EPM Administrator do first to help resolve the issue?

Options:

A.

Verify any 3rd party security solutions have been added to EPM's Files To Be Ignored Always configuration and CyberArk EPM has also been excluded from the 3rd party security solutions.

B.

Enable the Default Policy's Privilege Management Control, Unhandled Privileged Applications in Elevate mode.

C.

Rerun the agent installation on the user's machine to repair the installation.

D.

Uninstall or disable any anti-virus software prohibiting the EPM Agent functionalities.

Question 9

How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?

Options:

A.

It compares known ransomware signatures retrieved from virus databases.

B.

It sandboxes the suspected ransomware and applies heuristics.

C.

It monitors for any unauthorized access to specified files.

D.

It performs a lookup of file signatures against VirusTotal's database.

Demo: 9 questions
Total 60 questions