New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70special

CyberArk EPM-DEF CyberArk Defender - EPM Exam Practice Test

Page: 1 / 6
Total 60 questions

CyberArk Defender - EPM Questions and Answers

Testing Engine

  • Product Type: Testing Engine
$37.5  $124.99

PDF Study Guide

  • Product Type: PDF Study Guide
$33  $109.99
Question 1

Which of the following is CyberArk's Recommended FIRST roll out strategy?

Options:

A.

Implement Application Control

B.

Implement Privilege Management

C.

Implement Threat Detection

D.

Implement Ransomware Protection

Question 2

Which setting in the agent configuration controls how often the agent sends events to the EPM Server?

Options:

A.

Event Queue Flush Period

B.

Heartbeat Timeout

C.

Condition Timeout

D.

Policy Update Rate

Question 3

Select the default threat intelligence source that requires additional licensing.

Options:

A.

VirusTotal

B.

Palo Alto WildFire

C.

CyberArk Application Risk Analysis Service

D.

NSRL

Question 4

Which of the following application options can be used when defining trusted sources?

Options:

A.

Publisher, Product, Size, URL

B.

Publisher, Name, Size, URI

C.

Product, URL, Machine, Package

D.

Product, Publisher, User/Group, Installation Package

Question 5

When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)

Options:

A.

Add trusted software to the Authorized Applications (Ransomware protection) Application Group

B.

Add trusted software to the Allow Application Group

C.

Add additional files, folders, and/or file extensions to be included to Ransomware Protection

D.

Enable Detect privileged unhandled applications under Default Policies

Question 6

An EPM Administrator would like to include a particular file extension to be monitored and protected under Ransomware Protection. What setting should the EPM Administrator configure to add the extension?

Options:

A.

Authorized Applications (Ransomware Protection)

B.

Files to be Ignored Always

C.

Anti-tampering Protection

D.

Default Policies

Question 7

For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?

Options:

A.

The username should match to an existing account.

B.

The username should have a strong password associated.

C.

The username should not match to an existing account.

D.

The username should match the built-in local Administrator.

Question 8

CyberArk's Privilege Threat Protection policies are available for which Operating Systems? (Choose two.)

Options:

A.

Windows Workstations

B.

Windows Servers

C.

MacOS

D.

Linux

Question 9

After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in.

What is a possible cause?

Options:

A.

Secure Token on macOS endpoint is not enabled.

B.

EPM agent is not able to connect to the EPM server.

C.

After installation, Full Disk Access for the macOS agent to support EPM policies was not approved.

D.

Endpoint password policy is too restrictive.

Page: 1 / 6
Total 60 questions