Winter Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

EPM-DEF Sample Questions Answers

Questions 4

Select the default threat intelligence source that requires additional licensing.

Options:

A.

VirusTotal

B.

Palo Alto WildFire

C.

CyberArk Application Risk Analysis Service

D.

NSRL

Buy Now
Questions 5

How does a Trusted Source policy affect an application?

Options:

A.

Applications will be allowed to run and will only elevate if required.

B.

Applications will be allowed to run and will inherit the process token from the EPM agent.

C.

Applications will be allowed to run always in elevated mode.

D.

Application from the defined trusted sources must be configured on a per application basis, in order to define run and elevation parameters.

Buy Now
Questions 6

An EPM Administrator would like to notify end users whenever the Elevate policy is granting users elevation for their applications. Where should the EPM Administrator go to enable the end-user dialog?

Options:

A.

End-user UI in the left panel of the console

B.

Advanced, Agent Configurations

C.

Default Policies

D.

End-User UI within the policy

Buy Now
Questions 7

An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?

Options:

A.

Elevate Application Group

B.

Developer Applications Application Group

C.

Elevate Trusted Applications If Necessary Advanced Policy

D.

Elevate MacOS Policy

Buy Now
Questions 8

Which threat intelligence source requires the suspect file to be sent externally?

Options:

A.

NSRL

B.

Palo Alto Wildfire

C.

VirusTotal

D.

CyberArk Application Risk Analysis Service (ARA)

Buy Now
Questions 9

If Privilege Management is not working on an endpoint, what is the most likely cause that can be verified in the EPM Agent Log Files?

Options:

A.

Behavior of the elevation prompt for administrators in Admin Approval Mode is set to “Prompt for Consent for non-Windows binaries”.

B.

Agent version is incompatible.

C.

UAC policy Admin Approval for the Built-in Administrator Account is set to “Disabled”.

D.

UAC policy Run all administrators in Admin Approval Mode is set to “Enabled”.

Buy Now
Questions 10

A particular user in company ABC requires the ability to run any application with administrative privileges every day that they log in to their systems for a total duration of 5 working days.

What is the correct solution that an EPM admin can implement?

Options:

A.

An EPM admin can generate a JIT access and elevation policy with temporary access timeframe set to 120 hours

B.

An EPM admin can generate a JIT access and elevation policy with temporary access timeframe set to 120 hours and Terminate administrative processes when the policy expires option unchecked

C.

An EPM admin can create an authorization token for each application needed by running: EPMOPAGtool.exe -command gentoken -targetUser -filehash -timeLimit 120 -action run

D.

An EPM admin can create a secure token for the end user's computer and instruct the end user to open an administrative command prompt and run the command vfagent.exe -UseToken

Buy Now
Questions 11

For Advanced Policies, what can the target operating system users be set to?

Options:

A.

Local or AD users and groups, Azure AD User, Azure AD Group

B.

AD Groups, Azure AD Groups

C.

Local or AD users and groups

D.

Local or AD users, Azure AD Users

Buy Now
Questions 12

When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)

Options:

A.

Add trusted software to the Authorized Applications (Ransomware protection) Application Group

B.

Add trusted software to the Allow Application Group

C.

Add additional files, folders, and/or file extensions to be included to Ransomware Protection

D.

Enable Detect privileged unhandled applications under Default Policies

Buy Now
Questions 13

Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option?

Options:

A.

Yes, when Audit Video recording started, when Audit Video recording stopped, and when Audit Recording video reached size limit.

B.

Yes, when Audit Video recording started, when not enough disk space to start the video recording, and when video recording is initializing.

C.

Yes, when Audit Video recording started, when Audit Video recording is uploaded to the EPM server, and when audit recording cannot be initialized.

D.

No, Audit Video is only available without the possibility of having End-User dialog pop-ups.

Buy Now
Questions 14

A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?

Options:

A.

Policy creation date

B.

Target use group

C.

Creator of the policy

D.

The policy's Set name

Buy Now
Questions 15

For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?

Options:

A.

The username should match to an existing account.

B.

The username should have a strong password associated.

C.

The username should not match to an existing account.

D.

The username should match the built-in local Administrator.

Buy Now
Questions 16

When enabling Threat Protection policies, what should an EPM Administrator consider? (Choose two.)

Options:

A.

Some Threat Protection policies are applicable only for Windows Servers as opposed to Workstations.

B.

Certain Threat Protection policies apply for specific applications not found on all machines

C.

Threat Protection policies requires an additional agent to be installed.

D.

Threat Protection features are not available in all regions.

Buy Now
Questions 17

What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection, without whitelisting the application launch?

Options:

A.

Trusted Sources

B.

Authorized Applications (Ransomware Protection)

C.

Threat Intelligence

D.

Policy Recommendations

Buy Now
Questions 18

An end user is experiencing performance issues on their device after the EPM Agent had been installed on their machine. What should the EPM Administrator do first to help resolve the issue?

Options:

A.

Verify any 3rd party security solutions have been added to EPM's Files To Be Ignored Always configuration and CyberArk EPM has also been excluded from the 3rd party security solutions.

B.

Enable the Default Policy's Privilege Management Control, Unhandled Privileged Applications in Elevate mode.

C.

Rerun the agent installation on the user's machine to repair the installation.

D.

Uninstall or disable any anti-virus software prohibiting the EPM Agent functionalities.

Buy Now
Exam Code: EPM-DEF
Exam Name: CyberArk Defender - EPM
Last Update: Nov 15, 2024
Questions: 60
$64  $159.99
$48  $119.99
$40  $99.99
buy now EPM-DEF