Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > CyberArk > Defender > EPM-DEF

EPM-DEF CyberArk Defender - EPM Question and Answers

Question # 4

How does EPM help streamline security compliance and reporting?

A.

Use of automated distribution of reports to the security team

B.

Provides reports in standard formats such as PDF, Word and Excel

C.

Print reports

D.

Create custom reports

Full Access
Question # 5

What are the policy targeting options available for a policy upon creation?

A.

AD Users and Groups, Computers in AD Security Groups, Servers

B.

Computers in this set, Computers in AD Security Groups, Users and Groups

C.

OS Computers, EPM Sets, AD Users

D.

EPM Sets, Computers in AD Security Groups, AD Users and AD Security Groups

Full Access
Question # 6

For Advanced Policies, what can the target operating system users be set to?

A.

Local or AD users and groups, Azure AD User, Azure AD Group

B.

AD Groups, Azure AD Groups

C.

Local or AD users and groups

D.

Local or AD users, Azure AD Users

Full Access
Question # 7

An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?

A.

Privilege Threat Protection under Policies.

B.

Authorized Applications under Application Groups.

C.

Protect Against Ransomware under Default Policies.

D.

Threat Protection under Agent Configurations.

Full Access
Question # 8

Which threat intelligence source requires the suspect file to be sent externally?

A.

NSRL

B.

Palo Alto Wildfire

C.

VirusTotal

D.

CyberArk Application Risk Analysis Service (ARA)

Full Access
Question # 9

CyberArk's Privilege Threat Protection policies are available for which Operating Systems? (Choose two.)

A.

Windows Workstations

B.

Windows Servers

C.

MacOS

D.

Linux

Full Access