Exam2pass
0 items Sign In or Register
  • Home
  • IT Exams
  • Guarantee
  • FAQs
  • Reviews
  • Contact Us
  • Demo
Exam2pass > CyberArk > CyberArk Certifications > EPM-DEF > EPM-DEF Online Practice Questions and Answers

EPM-DEF Online Practice Questions and Answers

Questions 4

A Helpdesk technician needs to provide remote assistance to a user whose laptop cannot connect to the Internet to pull EPM policies. What CyberArk EPM feature should the Helpdesk technician use to allow the user elevation capabilities?

A. Offline Policy Authorization Generator

B. Elevate Trusted Application If Necessary

C. Just In Time Access and Elevation

D. Loosely Connected Devices Credential Management

Buy Now

Correct Answer: C

Questions 5

Which setting in the agent configuration controls how often the agent sends events to the EPM Server?

A. Event Queue Flush Period

B. Heartbeat Timeout

C. Condition Timeout

D. Policy Update Rate

Buy Now

Correct Answer: A

Questions 6

A company is looking to manage their Windows Servers and Desktops with CyberArk EPM. Management would like to define different default policies between the Windows Servers and Windows Desktops.

What should the EPM Administrator do?

A. In the Default Policies, exclude either the Windows Servers or the Windows Desktops.

B. Create Advanced Policies to apply different policies between Windows Servers and Windows Desktops.

C. CyberArk does not recommend installing EPM Agents on Windows Servers.

D. Create a separate Set for Windows Servers and Windows Desktops.

Buy Now

Correct Answer: B

Questions 7

An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?

A. Privilege Threat Protection under Policies.

B. Authorized Applications under Application Groups.

C. Protect Against Ransomware under Default Policies.

D. Threat Protection under Agent Configurations.

Buy Now

Correct Answer: B

Questions 8

CyberArk EPM's Ransomware Protection comes with file types to be protected out of the box. If an EPM Administrator would like to remove a file type from Ransomware Protection, where can this be done?

A. Policy Scope within Protect Against Ransomware

B. Authorized Applications (Ransomware Protection) within Application Groups

C. Set Security Permissions within Advanced Policies

D. Protected Files within Agent Configurations

Buy Now

Correct Answer: D

Questions 9

An EPM Administrator would like to enable a Threat Protection policy, however, the policy protects an application that is not installed on all endpoints.

What should the EPM Administrator do?

A. Enable the Threat Protection policy and configure the Policy Targets.

B. Do not enable the Threat Protection policy.

C. Enable the Threat Protection policy only in Detect mode.

D. Split up the endpoints in to separate Sets and enable Threat Protection for only one of the Sets.

Buy Now

Correct Answer: D

Questions 10

Which of the following application options can be used when defining trusted sources?

A. Publisher, Product, Size, URL

B. Publisher, Name, Size, URI

C. Product, URL, Machine, Package

D. Product, Publisher, User/Group, Installation Package

Buy Now

Correct Answer: D

Questions 11

Where can you view CyberArk EPM Credential Lures events?

A. Application Catalog

B. Threat Protection Inbox

C. Events Management

D. Policy Audit

Buy Now

Correct Answer: B

Questions 12

A particular user in company ABC requires the ability to run any application with administrative privileges every day that they log in to their systems for a total duration of 5 working days.

What is the correct solution that an EPM admin can implement?

A. An EPM admin can generate a JIT access and elevation policy with temporary access timeframe set to 120 hours

B. An EPM admin can generate a JIT access and elevation policy with temporary access timeframe set to 120 hours and Terminate administrative processes when the policy expires option unchecked

C. An EPM admin can create an authorization token for each application needed by running: EPMOPAGtool.exe -command gentoken -targetUser -filehash -timeLimit 120 -action run

D. An EPM admin can create a secure token for the end user's computer and instruct the end user to open an administrative command prompt and run the command vfagent.exe - UseToken

Buy Now

Correct Answer: B

Questions 13

What is a valid step to investigate an EPM agent that is unable to connect to the EPM server?

A. On the end point, open a browser session to the URL of the EPM server.

B. Ping the endpoint from the EPM server.

C. Ping the server from the endpoint.

D. Restart the end point

Buy Now

Correct Answer: C

Exam Code: EPM-DEF
Exam Name: CyberArk Defender - EPM
Last Update:
Questions: 60

PDF (Q&A)

$45.99
ADD TO CART

VCE

$49.99
ADD TO CART

PDF + VCE

$59.99
ADD TO CART

Exam2Pass----The Most Reliable Exam Preparation Assistance

There are tens of thousands of certification exam dumps provided on the internet. And how to choose the most reliable one among them is the first problem one certification candidate should face. Exam2Pass provide a shot cut to pass the exam and get the certification. If you need help on any questions or any Exam2Pass exam PDF and VCE simulators, customer support team is ready to help at any time when required.

Home | Guarantee & Policy |  Privacy & Policy |  Terms & Conditions |  How to buy |  FAQs |  About Us |  Contact Us |  Demo |  Reviews

2025 Copyright @ exam2pass.com All trademarks are the property of their respective vendors. We are not associated with any of them.