Free EPM-DEF Exam Braindumps (page: 4)

Page 3 of 16

An EPM Administrator would like to include a particular file extension to be monitored and protected under Ransomware Protection.
What setting should the EPM Administrator configure to add the extension?

  1. Authorized Applications (Ransomware Protection)
  2. Files to be Ignored Always
  3. Anti-tampering Protection
  4. Default Policies

Answer(s): A


Reference:

https://docs.cyberark.com/Product-
Doc/OnlineHelp/EPM/Latest/en/Content/EPM/Server%20User%20Guide/PrivMgmnt-Ransomware- NewUI.htm



When deploying EPM and in the Privilege Management phase what is the purpose of Discovery?

  1. To identify all non-administrative events
  2. To identify all administrative level events
  3. To identify both administrative and non-administrative level events
  4. To identify non-administrative threats

Answer(s): C



What are Trusted sources for Windows endpoints used for?

  1. Creating policies that contain trusted sources of applications.
  2. Defining applications that can be used by the developers.
  3. Listing all the approved application to the end users.
  4. Managing groups added by recommendation.

Answer(s): C



CyberArk's Privilege Threat Protection policies are available for which Operating Systems? (Choose two.)

  1. Windows Workstations
  2. Windows Servers
  3. MacOS
  4. Linux

Answer(s): A,B






Post your Comments and Discuss CyberArk EPM-DEF exam with other Community members:

EPM-DEF Exam Discussions & Posts