What are the policy targeting options available for a policy upon creation?
A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?
Select the default threat intelligence source that requires additional licensing.
What are valid policy options for JIT and elevation policies?
Where would an EPM admin configure an application policy that depends on a script returning true for an end user's machine being connected to an open (no password protection) Wi-Fi?
When deploying EPM and in the Privilege Management phase what is the purpose of Discovery?
Which programming interface enables you to perform activities on EPM objects via a REST Web Service?
An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?