Select the default threat intelligence source that requires additional licensing.
An EPM Administrator would like to notify end users whenever the Elevate policy is granting users elevation for their applications. Where should the EPM Administrator go to enable the end-user dialog?
An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?
Which threat intelligence source requires the suspect file to be sent externally?
If Privilege Management is not working on an endpoint, what is the most likely cause that can be verified in the EPM Agent Log Files?
A particular user in company ABC requires the ability to run any application with administrative privileges every day that they log in to their systems for a total duration of 5 working days.
What is the correct solution that an EPM admin can implement?
When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)
Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option?
A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?
For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?
When enabling Threat Protection policies, what should an EPM Administrator consider? (Choose two.)
What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection, without whitelisting the application launch?
An end user is experiencing performance issues on their device after the EPM Agent had been installed on their machine. What should the EPM Administrator do first to help resolve the issue?