Weekend Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CyberArk EPM-DEF CyberArk Defender - EPM Exam Practice Test

Page: 1 / 6
Total 60 questions

CyberArk Defender - EPM Questions and Answers

Question 1

What are valid policy options for JIT and elevation policies?

Options:

A.

Grant temporary access for all users, Policy name, Restart administrative processes in admin approval mode, Collect audit information

B.

Grant temporary access for, Policy name, Terminate administrative processes when the policy expires, Collect audit information

C.

Grant administrative access, Policy name, Log off to apply policy, Collect policy violation information

D.

Terminate administrative services, Grant policy access for, Policy name, Collect audit reports

Question 2

Which policy can be used to improve endpoint performance for applications commonly used for software development?

Options:

A.

Developer Applications

B.

Trusted Application

C.

Trusted Source

D.

Software Updater

Question 3

How does EPM help streamline security compliance and reporting?

Options:

A.

Use of automated distribution of reports to the security team

B.

Provides reports in standard formats such as PDF, Word and Excel

C.

Print reports

D.

Create custom reports

Question 4

Which setting in the agent configuration controls how often the agent sends events to the EPM Server?

Options:

A.

Event Queue Flush Period

B.

Heartbeat Timeout

C.

Condition Timeout

D.

Policy Update Rate

Question 5

What is required to configure SAML authentication on EPM?

Options:

A.

OAuth token

B.

Signed Authentication Request

C.

Encrypted Assertion

D.

Signed SAML Response

Question 6

What are Trusted sources for Windows endpoints used for?

Options:

A.

Creating policies that contain trusted sources of applications.

B.

Defining applications that can be used by the developers.

C.

Listing all the approved application to the end users.

D.

Managing groups added by recommendation.

Question 7

When blocking applications, what is the recommended practice regarding the end-user UI?

Options:

A.

Show a block prompt for blocked applications.

B.

Show no prompts for blocked applications.

C.

Hide the CyberArk EPM Agent icon in the system tray.

D.

Enable the Default Deny policy.

Question 8

After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in.

What is a possible cause?

Options:

A.

Secure Token on macOS endpoint is not enabled.

B.

EPM agent is not able to connect to the EPM server.

C.

After installation, Full Disk Access for the macOS agent to support EPM policies was not approved.

D.

Endpoint password policy is too restrictive.

Question 9

What are the policy targeting options available for a policy upon creation?

Options:

A.

AD Users and Groups, Computers in AD Security Groups, Servers

B.

Computers in this set, Computers in AD Security Groups, Users and Groups

C.

OS Computers, EPM Sets, AD Users

D.

EPM Sets, Computers in AD Security Groups, AD Users and AD Security Groups

Page: 1 / 6
Total 60 questions