Free EPM-DEF Exam Braindumps (page: 5)

Page 4 of 16

Which threat intelligence source requires the suspect file to be sent externally?

  1. NSRL
  2. Palo Alto Wildfire
  3. VirusTotal
  4. CyberArk Application Risk Analysis Service (ARA)

Answer(s): C



What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection, without whitelisting the application launch?

  1. Trusted Sources
  2. Authorized Applications (Ransomware Protection)
  3. Threat Intelligence
  4. Policy Recommendations

Answer(s): B



An EPM Administrator would like to exclude an application from all Threat Protection modules.
Where should the EPM Administrator make this change?

  1. Privilege Threat Protection under Policies.
  2. Authorized Applications under Application Groups.
  3. Protect Against Ransomware under Default Policies.
  4. Threat Protection under Agent Configurations.

Answer(s): B



Which EPM reporting tool provides a comprehensive view of threat detection activity?

  1. Threat Detection Dashboard
  2. Detected Threats
  3. Threat Detection Events
  4. McAfee ePO Reports

Answer(s): A


Reference:

https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM- onprem/Latest/en/Content/EPM/Server%20User%20Guide/Reporting%20Capabilities.htm#:~:text=The%20Threat%20Detection%20Dashboard%20provides,select%20Reports%20%3E%20Threat%20Detection%20Dashboard






Post your Comments and Discuss CyberArk EPM-DEF exam with other Community members:

EPM-DEF Exam Discussions & Posts