Free EPM-DEF Exam Braindumps (page: 7)

Page 6 of 16

When enabling Threat Protection policies, what should an EPM Administrator consider? (Choose two.)

  1. Some Threat Protection policies are applicable only for Windows Servers as opposed to Workstations.
  2. Certain Threat Protection policies apply for specific applications not found on all machines
  3. Threat Protection policies requires an additional agent to be installed.
  4. Threat Protection features are not available in all regions.

Answer(s): A,B



When working with credential rotation/loosely connected devices, what additional CyberArk components are required?

  1. PTA
  2. PVWA
  3. DAP

Answer(s): C



What can you manage by using User Policies?

  1. Just-In-Time endpoint access and elevation, access to removable drives, and Services access.
  2. Access to Windows Services only.
  3. Filesystem and registry access, access to removable drives, and Services access.
  4. Just-In-Time endpoint access and elevation, access to removable drives, filesystem and registry access, Services access, and User account control monitoring.

Answer(s): D



An end user is experiencing performance issues on their device after the EPM Agent had been installed on their machine.
What should the EPM Administrator do first to help resolve the issue?

  1. Verify any 3rd party security solutions have been added to EPM's Files To Be Ignored Always configuration and CyberArk EPM has also been excluded from the 3rd party security solutions.
  2. Enable the Default Policy's Privilege Management Control, Unhandled Privileged Applications in Elevate mode.
  3. Rerun the agent installation on the user's machine to repair the installation.
  4. Uninstall or disable any anti-virus software prohibiting the EPM Agent functionalities.

Answer(s): D






Post your Comments and Discuss CyberArk EPM-DEF exam with other Community members:

EPM-DEF Exam Discussions & Posts