CyberArk
EPM-DEF
Q1:
What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?
○
A
A separate set○
B
a VDI advanced policy○
C
a separate license○
D
A separate computer group
CyberArk
EPM-DEF
Q2:
What unauthorized change can CyberArk EPM Ransomware Protection prevent?
○
A
Windows Registry Keys○
B
Website Data○
C
Local Administrator Passwords○
D
Certificates in the Certificate Store
CyberArk
EPM-DEF
Q3:
When working with credential rotation at the EPM level, what is the minimum time period that can be set between connections?
○
A
1 hour○
B
5 hours○
C
24 hours○
D
72 hours
CyberArk
EPM-DEF
Q4:
When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)
☐
A
Add trusted software to the Authorized Applications (Ransomware protection) Application Group☐
B
Add trusted software to the Allow Application Group☐
C
Add additional files, folders, and/or file extensions to be included to Ransomware Protection☐
D
Enable Detect privileged unhandled applications under Default Policies
CyberArk
EPM-DEF
Q5:
Select the default threat intelligence source that requires additional licensing.
○
A
VirusTotal○
B
Palo Alto WildFire○
C
CyberArk Application Risk Analysis Service○
D
NSRL