Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

EPM-DEF Exam Dumps - CyberArk Defender - EPM

Go to page:
Question # 4

Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option?

A.

Yes, when Audit Video recording started, when Audit Video recording stopped, and when Audit Recording video reached size limit.

B.

Yes, when Audit Video recording started, when not enough disk space to start the video recording, and when video recording is initializing.

C.

Yes, when Audit Video recording started, when Audit Video recording is uploaded to the EPM server, and when audit recording cannot be initialized.

D.

No, Audit Video is only available without the possibility of having End-User dialog pop-ups.

Full Access
Question # 5

An EPM Administrator would like to enable a Threat Protection policy, however, the policy protects an application that is not installed on all endpoints.

What should the EPM Administrator do?

A.

Enable the Threat Protection policy and configure the Policy Targets.

B.

Do not enable the Threat Protection policy.

C.

Enable the Threat Protection policy only in Detect mode.

D.

Split up the endpoints in to separate Sets and enable Threat Protection for only one of the Sets.

Full Access
Question # 6

How does EPM help streamline security compliance and reporting?

A.

Use of automated distribution of reports to the security team

B.

Provides reports in standard formats such as PDF, Word and Excel

C.

Print reports

D.

Create custom reports

Full Access
Question # 7

An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?

A.

Privilege Threat Protection under Policies.

B.

Authorized Applications under Application Groups.

C.

Protect Against Ransomware under Default Policies.

D.

Threat Protection under Agent Configurations.

Full Access
Question # 8

A Helpdesk technician needs to provide remote assistance to a user whose laptop cannot connect to the Internet to pull EPM policies. What CyberArk EPM feature should the Helpdesk technician use to allow the user elevation capabilities?

A.

Offline Policy Authorization Generator

B.

Elevate Trusted Application If Necessary

C.

Just In Time Access and Elevation

D.

Loosely Connected Devices Credential Management

Full Access
Go to page: