A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?
What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection, without whitelisting the application launch?
For Advanced Policies, what can the target operating system users be set to?
Which of the following application options can be used when defining trusted sources?
An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?
How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?
When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)
When deploying EPM and in the Privilege Management phase what is the purpose of Discovery?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
CyberArk Free Exams |
---|
![]() |