Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CyberArk EPM-DEF - CyberArk Defender - EPM

Page: 2 / 2
Total 60 questions

What can you manage by using User Policies?

A.

Just-In-Time endpoint access and elevation, access to removable drives, and Services access.

B.

Access to Windows Services only.

C.

Filesystem and registry access, access to removable drives, and Services access.

D.

Just-In-Time endpoint access and elevation, access to removable drives, filesystem and registry access, Services access, and User account control monitoring.

What are the predefined application groups?

A.

Developer group, Administrator group

B.

Run as Administrator, Run as Developer, Block

C.

Elevate, Allow, Block, Developer Applications

D.

Block Only

What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?

A.

A separate set

B.

a VDI advanced policy

C.

a separate license

D.

A separate computer group

Where would an EPM admin configure an application policy that depends on a script returning true for an end user's machine being connected to an open (no password protection) Wi-Fi?

A.

Advanced Policy - Application Control - Check Wi-Fi security

B.

Advanced Policy - Options: Conditional enforcement - Apply Policy according to Script execution result

C.

Default policies - Check if network access is secure

D.

Advanced Policy - Access - Specify permissions to be set for Wi-Fi network security

When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)

A.

Add any pre-existing security application to the Files to Be Ignored Always.

B.

Add EPM agent to the other security tools exclusions.

C.

EPM agent should never be run with any other security tools.

D.

Create new advanced policies for each security tool.

If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?

A.

vf_agent.exe

B.

epm_agent.exe

C.

vault_agent.exe

D.

db_agent.exe

For Advanced Policies, what can the target operating system users be set to?

A.

Local or AD users and groups, Azure AD User, Azure AD Group

B.

AD Groups, Azure AD Groups

C.

Local or AD users and groups

D.

Local or AD users, Azure AD Users

Which threat intelligence source requires the suspect file to be sent externally?

A.

NSRL

B.

Palo Alto Wildfire

C.

VirusTotal

D.

CyberArk Application Risk Analysis Service (ARA)