Free EPM-DEF Exam Braindumps (page: 6)

Page 5 of 16

What type of user can be created from the Threat Deception LSASS Credential Lures feature?

  1. It does not create any users
  2. A standard user
  3. A local administrator user
  4. A domain admin user

Answer(s): B



What is a valid step to investigate an EPM agent that is unable to connect to the EPM server?

  1. On the end point, open a browser session to the URL of the EPM server.
  2. Ping the endpoint from the EPM server.
  3. Ping the server from the endpoint.
  4. Restart the end point

Answer(s): C



Which programming interface enables you to perform activities on EPM objects via a REST Web Service?

  1. EPM Web Services SDK
  2. Application Password SDK
  3. Mac Credential Provider SDK
  4. Java password SDK

Answer(s): A



What are the policy targeting options available for a policy upon creation?

  1. AD Users and Groups, Computers in AD Security Groups, Servers
  2. Computers in this set, Computers in AD Security Groups, Users and Groups
  3. OS Computers, EPM Sets, AD Users
  4. EPM Sets, Computers in AD Security Groups, AD Users and AD Security Groups

Answer(s): D






Post your Comments and Discuss CyberArk EPM-DEF exam with other Community members:

EPM-DEF Exam Discussions & Posts