Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

CyberArk Defender - EPM

Last Update 18 hours ago Total Questions : 60

The CyberArk Defender - EPM content is now fully updated, with all current exam questions added 18 hours ago. Deciding to include EPM-DEF practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our EPM-DEF exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these EPM-DEF sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any CyberArk Defender - EPM practice test comfortably within the allotted time.

Question # 4

On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?

A.

Privilege Escalation, Privilege Management, Application Management

B.

Privilege Management, Application Control, Threat analysis

C.

Privilege Management, Threat Protection, Application Escalation Control

D.

Privilege Management, Privilege Threat Protection, Local Privileged Accounts Management

Question # 5

An EPM Administrator would like to include a particular file extension to be monitored and protected under Ransomware Protection. What setting should the EPM Administrator configure to add the extension?

A.

Authorized Applications (Ransomware Protection)

B.

Files to be Ignored Always

C.

Anti-tampering Protection

D.

Default Policies

Question # 6

Which of the following application options can be used when defining trusted sources?

A.

Publisher, Product, Size, URL

B.

Publisher, Name, Size, URI

C.

Product, URL, Machine, Package

D.

Product, Publisher, User/Group, Installation Package

Question # 7

What are the policy targeting options available for a policy upon creation?

A.

AD Users and Groups, Computers in AD Security Groups, Servers

B.

Computers in this set, Computers in AD Security Groups, Users and Groups

C.

OS Computers, EPM Sets, AD Users

D.

EPM Sets, Computers in AD Security Groups, AD Users and AD Security Groups

Question # 8

In EPM, creation of which user type is required to use SAML?

A.

Local CyberArk EPM User

B.

AD User

C.

SQL User

D.

Azure AD User

Question # 9

After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in.

What is a possible cause?

A.

Secure Token on macOS endpoint is not enabled.

B.

EPM agent is not able to connect to the EPM server.

C.

After installation, Full Disk Access for the macOS agent to support EPM policies was not approved.

D.

Endpoint password policy is too restrictive.

Question # 10

An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?

A.

Elevate Application Group

B.

Developer Applications Application Group

C.

Elevate Trusted Applications If Necessary Advanced Policy

D.

Elevate MacOS Policy

Go to page: