Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: wrap60

CyberArk EPM-DEF Dumps

Page: 1 / 6
Total 60 questions

CyberArk Defender - EPM Questions and Answers

Question 1

What are the predefined application groups?

Options:

A.

Developer group, Administrator group

B.

Run as Administrator, Run as Developer, Block

C.

Elevate, Allow, Block, Developer Applications

D.

Block Only

Question 2

An EPM Administrator would like to notify end users whenever the Elevate policy is granting users elevation for their applications. Where should the EPM Administrator go to enable the end-user dialog?

Options:

A.

End-user UI in the left panel of the console

B.

Advanced, Agent Configurations

C.

Default Policies

D.

End-User UI within the policy

Question 3

An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?

Options:

A.

Privilege Threat Protection under Policies.

B.

Authorized Applications under Application Groups.

C.

Protect Against Ransomware under Default Policies.

D.

Threat Protection under Agent Configurations.

Question 4

How does EPM help streamline security compliance and reporting?

Options:

A.

Use of automated distribution of reports to the security team

B.

Provides reports in standard formats such as PDF, Word and Excel

C.

Print reports

D.

Create custom reports

Question 5

An end user is reporting that an application that needs administrative rights is crashing when selecting a certain option menu item. The Application is part of an advanced elevate policy and is working correctly except when using that menu item.

What could be the EPM cause of the error?

Options:

A.

The Users defined in the advanced policy do not include the end user running the application.

B.

The Advanced: Time options are not set correctly to include the time that the user is running the application at.

C.

The Elevate Child Processes option is not enabled.

D.

The Specify permissions to be set for selected Services on End-user Computers is set to Allow Start/Stop

Question 6

On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?

Options:

A.

Privilege Escalation, Privilege Management, Application Management

B.

Privilege Management, Application Control, Threat analysis

C.

Privilege Management, Threat Protection, Application Escalation Control

D.

Privilege Management, Privilege Threat Protection, Local Privileged Accounts Management

Question 7

What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?

Options:

A.

A separate set

B.

a VDI advanced policy

C.

a separate license

D.

A separate computer group

Question 8

Where would an EPM admin configure an application policy that depends on a script returning true for an end user's machine being connected to an open (no password protection) Wi-Fi?

Options:

A.

Advanced Policy - Application Control - Check Wi-Fi security

B.

Advanced Policy - Options: Conditional enforcement - Apply Policy according to Script execution result

C.

Default policies - Check if network access is secure

D.

Advanced Policy - Access - Specify permissions to be set for Wi-Fi network security

Question 9

Which EPM reporting tool provides a comprehensive view of threat detection activity?

Options:

A.

Threat Detection Dashboard

B.

Detected Threats

C.

Threat Detection Events

D.

McAfee ePO Reports

Page: 1 / 6
Total 60 questions