Which of the following is CyberArk's Recommended FIRST roll out strategy?
Which setting in the agent configuration controls how often the agent sends events to the EPM Server?
Select the default threat intelligence source that requires additional licensing.
Which of the following application options can be used when defining trusted sources?
When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)
An EPM Administrator would like to include a particular file extension to be monitored and protected under Ransomware Protection. What setting should the EPM Administrator configure to add the extension?
For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?
CyberArk's Privilege Threat Protection policies are available for which Operating Systems? (Choose two.)
After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in.
What is a possible cause?