Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free Access CyberArk EPM-DEF New Release

Page: 2 / 2
Total 60 questions

CyberArk Defender - EPM Questions and Answers

Question 5

What are valid policy options for JIT and elevation policies?

Options:

A.

Grant temporary access for all users, Policy name, Restart administrative processes in admin approval mode, Collect audit information

B.

Grant temporary access for, Policy name, Terminate administrative processes when the policy expires, Collect audit information

C.

Grant administrative access, Policy name, Log off to apply policy, Collect policy violation information

D.

Terminate administrative services, Grant policy access for, Policy name, Collect audit reports

Question 6

Where would an EPM admin configure an application policy that depends on a script returning true for an end user's machine being connected to an open (no password protection) Wi-Fi?

Options:

A.

Advanced Policy - Application Control - Check Wi-Fi security

B.

Advanced Policy - Options: Conditional enforcement - Apply Policy according to Script execution result

C.

Default policies - Check if network access is secure

D.

Advanced Policy - Access - Specify permissions to be set for Wi-Fi network security

Question 7

When deploying EPM and in the Privilege Management phase what is the purpose of Discovery?

Options:

A.

To identify all non-administrative events

B.

To identify all administrative level events

C.

To identify both administrative and non-administrative level events

D.

To identify non-administrative threats

Question 8

Which programming interface enables you to perform activities on EPM objects via a REST Web Service?

Options:

A.

EPM Web Services SDK

B.

Application Password SDK

C.

Mac Credential Provider SDK

D.

Java password SDK

Page: 2 / 2
Total 60 questions