Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CyberArk EPM-DEF Dumps Questions Answers

Page: 1 / 2
Total 60 questions

CyberArk Defender - EPM Questions and Answers

Question 1

What can you manage by using User Policies?

Options:

A.

Just-In-Time endpoint access and elevation, access to removable drives, and Services access.

B.

Access to Windows Services only.

C.

Filesystem and registry access, access to removable drives, and Services access.

D.

Just-In-Time endpoint access and elevation, access to removable drives, filesystem and registry access, Services access, and User account control monitoring.

Buy Now
Question 2

What are the policy targeting options available for a policy upon creation?

Options:

A.

AD Users and Groups, Computers in AD Security Groups, Servers

B.

Computers in this set, Computers in AD Security Groups, Users and Groups

C.

OS Computers, EPM Sets, AD Users

D.

EPM Sets, Computers in AD Security Groups, AD Users and AD Security Groups

Question 3

A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?

Options:

A.

Policy creation date

B.

Target use group

C.

Creator of the policy

D.

The policy's Set name

Question 4

Select the default threat intelligence source that requires additional licensing.

Options:

A.

VirusTotal

B.

Palo Alto WildFire

C.

CyberArk Application Risk Analysis Service

D.

NSRL

Question 5

What are valid policy options for JIT and elevation policies?

Options:

A.

Grant temporary access for all users, Policy name, Restart administrative processes in admin approval mode, Collect audit information

B.

Grant temporary access for, Policy name, Terminate administrative processes when the policy expires, Collect audit information

C.

Grant administrative access, Policy name, Log off to apply policy, Collect policy violation information

D.

Terminate administrative services, Grant policy access for, Policy name, Collect audit reports

Question 6

Where would an EPM admin configure an application policy that depends on a script returning true for an end user's machine being connected to an open (no password protection) Wi-Fi?

Options:

A.

Advanced Policy - Application Control - Check Wi-Fi security

B.

Advanced Policy - Options: Conditional enforcement - Apply Policy according to Script execution result

C.

Default policies - Check if network access is secure

D.

Advanced Policy - Access - Specify permissions to be set for Wi-Fi network security

Question 7

When deploying EPM and in the Privilege Management phase what is the purpose of Discovery?

Options:

A.

To identify all non-administrative events

B.

To identify all administrative level events

C.

To identify both administrative and non-administrative level events

D.

To identify non-administrative threats

Question 8

Which programming interface enables you to perform activities on EPM objects via a REST Web Service?

Options:

A.

EPM Web Services SDK

B.

Application Password SDK

C.

Mac Credential Provider SDK

D.

Java password SDK

Question 9

An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?

Options:

A.

Elevate Application Group

B.

Developer Applications Application Group

C.

Elevate Trusted Applications If Necessary Advanced Policy

D.

Elevate MacOS Policy

Exam Detail
Vendor: CyberArk
Certification: Defender
Exam Code: EPM-DEF
Last Update: Nov 23, 2024
EPM-DEF Question Answers
Page: 1 / 2
Total 60 questions