Pass the CyberArk Defender EPM-DEF Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

An EPM Administrator is looking to enable the Threat Deception feature, under what section should the EPM Administrator go to enable this feature?

Options:

A.

Threat Protection Inbox


B.

Policies


C.

Threat Intelligence


D.

Policy Audit


Expert Solution
Questions # 2:

An end user is reporting that an application that needs administrative rights is crashing when selecting a certain option menu item. The Application is part of an advanced elevate policy and is working correctly except when using that menu item.

What could be the EPM cause of the error?

Options:

A.

The Users defined in the advanced policy do not include the end user running the application.


B.

The Advanced: Time options are not set correctly to include the time that the user is running the application at.


C.

The Elevate Child Processes option is not enabled.


D.

The Specify permissions to be set for selected Services on End-user Computers is set to Allow Start/Stop


Expert Solution
Questions # 3:

What are Trusted sources for Windows endpoints used for?

Options:

A.

Creating policies that contain trusted sources of applications.


B.

Defining applications that can be used by the developers.


C.

Listing all the approved application to the end users.


D.

Managing groups added by recommendation.


Expert Solution
Questions # 4:

When working with credential rotation at the EPM level, what is the minimum time period that can be set between connections?

Options:

A.

1 hour


B.

5 hours


C.

24 hours


D.

72 hours


Expert Solution
Questions # 5:

What are valid policy options for JIT and elevation policies?

Options:

A.

Grant temporary access for all users, Policy name, Restart administrative processes in admin approval mode, Collect audit information


B.

Grant temporary access for, Policy name, Terminate administrative processes when the policy expires, Collect audit information


C.

Grant administrative access, Policy name, Log off to apply policy, Collect policy violation information


D.

Terminate administrative services, Grant policy access for, Policy name, Collect audit reports


Expert Solution
Questions # 6:

What EPM component is responsible for communicating password changes in credential rotation?

Options:

A.

EPM Agent


B.

EPM Server


C.

EPM API


D.

EPM Discovery


Expert Solution
Questions # 7:

Before enabling Ransomware Protection, what should the EPM Administrator do first?

Options:

A.

Enable the Privilege Management Inbox in Elevate mode.


B.

Enable the Control Applications Downloaded From The Internet feature in Restrict mode.


C.

Review the Authorized Applications (Ransomware Protection) group and update if necessary.


D.

Enable Threat Protection and Threat Intelligence modules.


Expert Solution
Questions # 8:

Which of the following application options can be used when defining trusted sources?

Options:

A.

Publisher, Product, Size, URL


B.

Publisher, Name, Size, URI


C.

Product, URL, Machine, Package


D.

Product, Publisher, User/Group, Installation Package


Expert Solution
Questions # 9:

An EPM Administrator would like to notify end users whenever the Elevate policy is granting users elevation for their applications. Where should the EPM Administrator go to enable the end-user dialog?

Options:

A.

End-user UI in the left panel of the console


B.

Advanced, Agent Configurations


C.

Default Policies


D.

End-User UI within the policy


Expert Solution
Questions # 10:

When deploying EPM and in the Privilege Management phase what is the purpose of Discovery?

Options:

A.

To identify all non-administrative events


B.

To identify all administrative level events


C.

To identify both administrative and non-administrative level events


D.

To identify non-administrative threats


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions