CyberArk-EPM Dumps CyberArk-EPM Braindumps CyberArk-EPM Real Questions CyberArk-EPM Practice Test CyberArk-EPM Actual Questions CyberArk CyberArk-EPM CyberArk Endpoint Privilege Manager (EPM) solution expert https://killexams.com/pass4sure/exam-detail/CyberArk-EPM Question: 175 Which of the following application options can be used when defining trusted sources? A. Publisher, Product, Size, URL B. Publisher, Name, Size, URI C. Product, URL, Machine, Package D. Product, Publisher, User/Group, Installation Package Answer: B Question: 176 An EPM Administrator is looking to enable the Threat Deception feature, under what section should the EPM Administrator go to enable this feature? A. Threat Protection Inbox B. Policies C. Threat Intelligence D. Policy Audit Answer: B Question: 177 An EPM Administrator would like to enable CyberArk EPM's Ransomware Protection in Restrict mode. What should the EPM Administrator do? A. Set Block unhandled applications to On. B. Set Protect Against Ransomware to Restrict. C. Set Protect Against Ransomware to Restrict and Set Block unhandled applications to On. D. Set Control unhandled applications to Detect. Answer: B Question: 178 An EPM Administrator would like to enable a Threat Protection policy, however, the policy protects an application that is not installed on all endpoints. What should the EPM Administrator do? A. Enable the Threat Protection policy and configure the Policy Targets. B. Do not enable the Threat Protection policy. C. Enable the Threat Protection policy only in Detect mode. D. Split up the endpoints in to separate Sets and enable Threat Protection for only one of the Sets. Answer: A Question: 179 After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in. What is a possible cause? A. Secure Token on macOS endpoint is not enabled. B. EPM agent is not able to connect to the EPM server. C. After installation, Full Disk Access for the macOS agent to support EPM policies was not approved. D. Endpoint password policy is too restrictive. Answer: A Question: 180 In EPM, creation of which user type is required to use SAML? A. Local CyberArk EPM User B. AD User C. SQL User D. Azure AD User Answer: D Question: 181 A company is looking to manage their Windows Servers and Desktops with CyberArk EPM. Management would like to define different default policies between the Windows Servers and Windows Desktops. What should the EPM Administrator do? A. In the Default Policies, exclude either the Windows Servers or the Windows Desktops. B. Create Advanced Policies to apply different policies between Windows Servers and Windows Desktops. C. CyberArk does not recommend installing EPM Agents on Windows Servers. D. Create a separate Set for Windows Servers and Windows Desktops. Answer: D Question: 182 Before enabling Ransomware Protection, what should the EPM Administrator do first? A. Enable the Privilege Management Inbox in Elevate mode. B. Enable the Control Applications Downloaded From The Internet feature in Restrict mode. C. Review the Authorized Applications (Ransomware Protection) group and update if necessary. D. Enable Threat Protection and Threat Intelligence modules. Answer: C Question: 183 What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs? A. A separate set B. a VDI advanced policy C. a separate license D. A separate computer group Answer: A Question: 184 If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line? A. vf_agent.exe B. epm_agent.exe C. vault_agent.exe D. db_agent.exe Answer: B Question: 185 What unauthorized change can CyberArk EPM Ransomware Protection prevent? A. Windows Registry Keys B. Website Data C. Local Administrator Passwords D. Certificates in the Certificate Store Answer: A Question: 186 How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks? A. It compares known ransomware signatures retrieved from virus databases. B. It sandboxes the suspected ransomware and applies heuristics. C. It monitors for any unauthorized access to specified files. D. It performs a lookup of file signatures against VirusTotal's database. Answer: C Question: 187 On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed? A. Privilege Escalation, Privilege Management, Application Management B. Privilege Management, Application Control, Threat analysis C. Privilege Management, Threat Protection, Application Escalation Control D. Privilege Management, Privilege Threat Protection, Local Privileged Accounts Management Answer: D Question: 188 An EPM Administrator would like to notify end users whenever the Elevate policy is granting users elevation for their applications. Where should the EPM Administrator go to enable the end-user dialog? A. End-user UI in the left panel of the console B. Advanced, Agent Configurations C. Default Policies D. End-User UI within the policy Answer: A Explanation: Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM/Latest/en/Content/EndUser/EndUserDialogs.htm Question: 189 Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option? A. Yes, when Audit Video recording started, when Audit Video recording stopped, and when Audit Recording video reached size limit. B. Yes, when Audit Video recording started, when not enough disk space to start the video recording, and when video recording is initializing. C. Yes, when Audit Video recording started, when Audit Video recording is uploaded to the EPM server, and when audit recording cannot be initialized. D. No, Audit Video is only available without the possibility of having End-User dialog pop-ups. Answer: D Question: 190 An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change? A. Privilege Threat Protection under Policies. B. Authorized Applications under Application Groups. C. Protect Against Ransomware under Default Policies. D. Threat Protection under Agent Configurations. Answer: D Question: 191 When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.) A. Add any pre-existing security application to the Files to Be Ignored Always. B. Add EPM agent to the other security tools exclusions. C. EPM agent should never be run with any other security tools. D. Create new advanced policies for each security tool. Answer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