Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CyberArk EPM-DEF - CyberArk Defender - EPM

Page: 1 / 2
Total 60 questions

A company is looking to manage their Windows Servers and Desktops with CyberArk EPM. Management would like to define different default policies between the Windows Servers and Windows Desktops.

What should the EPM Administrator do?

A.

In the Default Policies, exclude either the Windows Servers or the Windows Desktops.

B.

Create Advanced Policies to apply different policies between Windows Servers and Windows Desktops.

C.

CyberArk does not recommend installing EPM Agents on Windows Servers.

D.

Create a separate Set for Windows Servers and Windows Desktops.

What are the policy targeting options available for a policy upon creation?

A.

AD Users and Groups, Computers in AD Security Groups, Servers

B.

Computers in this set, Computers in AD Security Groups, Users and Groups

C.

OS Computers, EPM Sets, AD Users

D.

EPM Sets, Computers in AD Security Groups, AD Users and AD Security Groups

After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in.

What is a possible cause?

A.

Secure Token on macOS endpoint is not enabled.

B.

EPM agent is not able to connect to the EPM server.

C.

After installation, Full Disk Access for the macOS agent to support EPM policies was not approved.

D.

Endpoint password policy is too restrictive.

An end user is reporting that an application that needs administrative rights is crashing when selecting a certain option menu item. The Application is part of an advanced elevate policy and is working correctly except when using that menu item.

What could be the EPM cause of the error?

A.

The Users defined in the advanced policy do not include the end user running the application.

B.

The Advanced: Time options are not set correctly to include the time that the user is running the application at.

C.

The Elevate Child Processes option is not enabled.

D.

The Specify permissions to be set for selected Services on End-user Computers is set to Allow Start/Stop

Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option?

A.

Yes, when Audit Video recording started, when Audit Video recording stopped, and when Audit Recording video reached size limit.

B.

Yes, when Audit Video recording started, when not enough disk space to start the video recording, and when video recording is initializing.

C.

Yes, when Audit Video recording started, when Audit Video recording is uploaded to the EPM server, and when audit recording cannot be initialized.

D.

No, Audit Video is only available without the possibility of having End-User dialog pop-ups.

How does a Trusted Source policy affect an application?

A.

Applications will be allowed to run and will only elevate if required.

B.

Applications will be allowed to run and will inherit the process token from the EPM agent.

C.

Applications will be allowed to run always in elevated mode.

D.

Application from the defined trusted sources must be configured on a per application basis, in order to define run and elevation parameters.

For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?

A.

The username should match to an existing account.

B.

The username should have a strong password associated.

C.

The username should not match to an existing account.

D.

The username should match the built-in local Administrator.

Select the default threat intelligence source that requires additional licensing.

A.

VirusTotal

B.

Palo Alto WildFire

C.

CyberArk Application Risk Analysis Service

D.

NSRL

How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?

A.

It compares known ransomware signatures retrieved from virus databases.

B.

It sandboxes the suspected ransomware and applies heuristics.

C.

It monitors for any unauthorized access to specified files.

D.

It performs a lookup of file signatures against VirusTotal's database.

Match the Trusted Source to its correct definition: