Labour Day Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

CyberArk Defender - EPM Question and Answers

CyberArk Defender - EPM

Last Update Apr 25, 2024
Total Questions : 60

We are offering FREE EPM-DEF CyberArk exam questions. All you do is to just go and sign up. Give your details, prepare EPM-DEF free exam questions and then go for complete pool of CyberArk Defender - EPM test questions that will help you more.

EPM-DEF pdf

EPM-DEF PDF

$35  $99.99
EPM-DEF Engine

EPM-DEF Testing Engine

$42  $119.99
EPM-DEF PDF + Engine

EPM-DEF PDF + Testing Engine

$56  $159.99
Questions 1

When blocking applications, what is the recommended practice regarding the end-user UI?

Options:

A.  

Show a block prompt for blocked applications.

B.  

Show no prompts for blocked applications.

C.  

Hide the CyberArk EPM Agent icon in the system tray.

D.  

Enable the Default Deny policy.

Discussion 0
Questions 2

Where would an EPM admin configure an application policy that depends on a script returning true for an end user's machine being connected to an open (no password protection) Wi-Fi?

Options:

A.  

Advanced Policy - Application Control - Check Wi-Fi security

B.  

Advanced Policy - Options: Conditional enforcement - Apply Policy according to Script execution result

C.  

Default policies - Check if network access is secure

D.  

Advanced Policy - Access - Specify permissions to be set for Wi-Fi network security

Discussion 0
Questions 3

What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?

Options:

A.  

A separate set

B.  

a VDI advanced policy

C.  

a separate license

D.  

A separate computer group

Discussion 0
Questions 4

In EPM, creation of which user type is required to use SAML?

Options:

A.  

Local CyberArk EPM User

B.  

AD User

C.  

SQL User

D.  

Azure AD User

Discussion 0
Questions 5

An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?

Options:

A.  

Elevate Application Group

B.  

Developer Applications Application Group

C.  

Elevate Trusted Applications If Necessary Advanced Policy

D.  

Elevate MacOS Policy

Discussion 0
Questions 6

If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?

Options:

A.  

vf_agent.exe

B.  

epm_agent.exe

C.  

vault_agent.exe

D.  

db_agent.exe

Discussion 0
Questions 7

How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?

Options:

A.  

It compares known ransomware signatures retrieved from virus databases.

B.  

It sandboxes the suspected ransomware and applies heuristics.

C.  

It monitors for any unauthorized access to specified files.

D.  

It performs a lookup of file signatures against VirusTotal's database.

Discussion 0
Questions 8

On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?

Options:

A.  

Privilege Escalation, Privilege Management, Application Management

B.  

Privilege Management, Application Control, Threat analysis

C.  

Privilege Management, Threat Protection, Application Escalation Control

D.  

Privilege Management, Privilege Threat Protection, Local Privileged Accounts Management

Discussion 0
Questions 9

What unauthorized change can CyberArk EPM Ransomware Protection prevent?

Options:

A.  

Windows Registry Keys

B.  

Website Data

C.  

Local Administrator Passwords

D.  

Certificates in the Certificate Store

Discussion 0