Weekend Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

Free CyberArk EPM-DEF Practice Exam with Questions & Answers

Questions 1

Where can you view CyberArk EPM Credential Lures events?

Options:
A.

Application Catalog

B.

Threat Protection Inbox

C.

Events Management

D.

Policy Audit

CyberArk EPM-DEF Premium Access
Questions 2

An EPM Administrator would like to notify end users whenever the Elevate policy is granting users elevation for their applications. Where should the EPM Administrator go to enable the end-user dialog?

Options:
A.

End-user UI in the left panel of the console

B.

Advanced, Agent Configurations

C.

Default Policies

D.

End-User UI within the policy

Questions 3

After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in.

What is a possible cause?

Options:
A.

Secure Token on macOS endpoint is not enabled.

B.

EPM agent is not able to connect to the EPM server.

C.

After installation, Full Disk Access for the macOS agent to support EPM policies was not approved.

D.

Endpoint password policy is too restrictive.

Questions 4

An EPM Administrator is looking to enable the Threat Deception feature, under what section should the EPM Administrator go to enable this feature?

Options:
A.

Threat Protection Inbox

B.

Policies

C.

Threat Intelligence

D.

Policy Audit

Questions 5

Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option?

Options:
A.

Yes, when Audit Video recording started, when Audit Video recording stopped, and when Audit Recording video reached size limit.

B.

Yes, when Audit Video recording started, when not enough disk space to start the video recording, and when video recording is initializing.

C.

Yes, when Audit Video recording started, when Audit Video recording is uploaded to the EPM server, and when audit recording cannot be initialized.

D.

No, Audit Video is only available without the possibility of having End-User dialog pop-ups.

Questions 6

When blocking applications, what is the recommended practice regarding the end-user UI?

Options:
A.

Show a block prompt for blocked applications.

B.

Show no prompts for blocked applications.

C.

Hide the CyberArk EPM Agent icon in the system tray.

D.

Enable the Default Deny policy.

Questions 7

Match the Trusted Source to its correct definition:

EPM-DEF Question 7

Options:
Questions 8

For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?

Options:
A.

The username should match to an existing account.

B.

The username should have a strong password associated.

C.

The username should not match to an existing account.

D.

The username should match the built-in local Administrator.

Questions 9

What are valid policy options for JIT and elevation policies?

Options:
A.

Grant temporary access for all users, Policy name, Restart administrative processes in admin approval mode, Collect audit information

B.

Grant temporary access for, Policy name, Terminate administrative processes when the policy expires, Collect audit information

C.

Grant administrative access, Policy name, Log off to apply policy, Collect policy violation information

D.

Terminate administrative services, Grant policy access for, Policy name, Collect audit reports

Questions 10

When enabling Threat Protection policies, what should an EPM Administrator consider? (Choose two.)

Options:
A.

Some Threat Protection policies are applicable only for Windows Servers as opposed to Workstations.

B.

Certain Threat Protection policies apply for specific applications not found on all machines

C.

Threat Protection policies requires an additional agent to be installed.

D.

Threat Protection features are not available in all regions.