Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sixtybuddy

EPM-DEF CyberArk Defender - EPM Questions and Answers

Questions 4

CyberArk EPM's Ransomware Protection comes with file types to be protected out of the box. If an EPM Administrator would like to remove a file type from Ransomware Protection, where can this be done?

Options:

A.

Policy Scope within Protect Against Ransomware

B.

Authorized Applications (Ransomware Protection) within Application Groups

C.

Set Security Permissions within Advanced Policies

D.

Protected Files within Agent Configurations

Buy Now
Questions 5

What can you manage by using User Policies?

Options:

A.

Just-In-Time endpoint access and elevation, access to removable drives, and Services access.

B.

Access to Windows Services only.

C.

Filesystem and registry access, access to removable drives, and Services access.

D.

Just-In-Time endpoint access and elevation, access to removable drives, filesystem and registry access, Services access, and User account control monitoring.

Buy Now
Questions 6

Which threat intelligence source requires the suspect file to be sent externally?

Options:

A.

NSRL

B.

Palo Alto Wildfire

C.

VirusTotal

D.

CyberArk Application Risk Analysis Service (ARA)

Buy Now
Questions 7

An end user is reporting that an application that needs administrative rights is crashing when selecting a certain option menu item. The Application is part of an advanced elevate policy and is working correctly except when using that menu item.

What could be the EPM cause of the error?

Options:

A.

The Users defined in the advanced policy do not include the end user running the application.

B.

The Advanced: Time options are not set correctly to include the time that the user is running the application at.

C.

The Elevate Child Processes option is not enabled.

D.

The Specify permissions to be set for selected Services on End-user Computers is set to Allow Start/Stop

Buy Now
Questions 8

How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?

Options:

A.

It compares known ransomware signatures retrieved from virus databases.

B.

It sandboxes the suspected ransomware and applies heuristics.

C.

It monitors for any unauthorized access to specified files.

D.

It performs a lookup of file signatures against VirusTotal's database.

Buy Now
Questions 9

A Helpdesk technician needs to provide remote assistance to a user whose laptop cannot connect to the Internet to pull EPM policies. What CyberArk EPM feature should the Helpdesk technician use to allow the user elevation capabilities?

Options:

A.

Offline Policy Authorization Generator

B.

Elevate Trusted Application If Necessary

C.

Just In Time Access and Elevation

D.

Loosely Connected Devices Credential Management

Buy Now
Exam Code: EPM-DEF
Exam Name: CyberArk Defender - EPM
Last Update: Apr 19, 2024
Questions: 60

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80