Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

EPM-DEF Sample Questions Answers

Questions 4

What are the policy targeting options available for a policy upon creation?

Options:

A.

AD Users and Groups, Computers in AD Security Groups, Servers

B.

Computers in this set, Computers in AD Security Groups, Users and Groups

C.

OS Computers, EPM Sets, AD Users

D.

EPM Sets, Computers in AD Security Groups, AD Users and AD Security Groups

Buy Now
Questions 5

An EPM Administrator would like to enable a Threat Protection policy, however, the policy protects an application that is not installed on all endpoints.

What should the EPM Administrator do?

Options:

A.

Enable the Threat Protection policy and configure the Policy Targets.

B.

Do not enable the Threat Protection policy.

C.

Enable the Threat Protection policy only in Detect mode.

D.

Split up the endpoints in to separate Sets and enable Threat Protection for only one of the Sets.

Buy Now
Questions 6

A company is looking to manage their Windows Servers and Desktops with CyberArk EPM. Management would like to define different default policies between the Windows Servers and Windows Desktops.

What should the EPM Administrator do?

Options:

A.

In the Default Policies, exclude either the Windows Servers or the Windows Desktops.

B.

Create Advanced Policies to apply different policies between Windows Servers and Windows Desktops.

C.

CyberArk does not recommend installing EPM Agents on Windows Servers.

D.

Create a separate Set for Windows Servers and Windows Desktops.

Buy Now
Questions 7

An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?

Options:

A.

Privilege Threat Protection under Policies.

B.

Authorized Applications under Application Groups.

C.

Protect Against Ransomware under Default Policies.

D.

Threat Protection under Agent Configurations.

Buy Now
Questions 8

An application has been identified by the LSASS Credentials Harvesting Module.

What is the recommended approach to excluding the application?

Options:

A.

In Agent Configurations, add the application to the Threat Protection Exclusions

B.

Add the application to the Files to be Ignored Always in Agent Configurations.

C.

Exclude the application within the LSASS Credentials Harvesting module.

D.

Add the application to an Advanced Policy or Application Group with an Elevate policy action.

Buy Now
Questions 9

What is required to configure SAML authentication on EPM?

Options:

A.

OAuth token

B.

Signed Authentication Request

C.

Encrypted Assertion

D.

Signed SAML Response

Buy Now
Exam Code: EPM-DEF
Exam Name: CyberArk Defender - EPM
Last Update: Apr 27, 2024
Questions: 60
$64  $159.99
$48  $119.99
$40  $99.99
buy now EPM-DEF