Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free CyberArk EPM-DEF Practice Exam with Questions & Answers | Set: 2

Questions 11

A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?

Options:
A.

Policy creation date

B.

Target use group

C.

Creator of the policy

D.

The policy's Set name

CyberArk EPM-DEF Premium Access
Questions 12

What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection, without whitelisting the application launch?

Options:
A.

Trusted Sources

B.

Authorized Applications (Ransomware Protection)

C.

Threat Intelligence

D.

Policy Recommendations

Questions 13

For Advanced Policies, what can the target operating system users be set to?

Options:
A.

Local or AD users and groups, Azure AD User, Azure AD Group

B.

AD Groups, Azure AD Groups

C.

Local or AD users and groups

D.

Local or AD users, Azure AD Users

Questions 14

Which of the following application options can be used when defining trusted sources?

Options:
A.

Publisher, Product, Size, URL

B.

Publisher, Name, Size, URI

C.

Product, URL, Machine, Package

D.

Product, Publisher, User/Group, Installation Package

Questions 15

An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?

Options:
A.

Privilege Threat Protection under Policies.

B.

Authorized Applications under Application Groups.

C.

Protect Against Ransomware under Default Policies.

D.

Threat Protection under Agent Configurations.

Questions 16

How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?

Options:
A.

It compares known ransomware signatures retrieved from virus databases.

B.

It sandboxes the suspected ransomware and applies heuristics.

C.

It monitors for any unauthorized access to specified files.

D.

It performs a lookup of file signatures against VirusTotal's database.

Questions 17

When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)

Options:
A.

Add trusted software to the Authorized Applications (Ransomware protection) Application Group

B.

Add trusted software to the Allow Application Group

C.

Add additional files, folders, and/or file extensions to be included to Ransomware Protection

D.

Enable Detect privileged unhandled applications under Default Policies

Questions 18

When deploying EPM and in the Privilege Management phase what is the purpose of Discovery?

Options:
A.

To identify all non-administrative events

B.

To identify all administrative level events

C.

To identify both administrative and non-administrative level events

D.

To identify non-administrative threats