When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)
When blocking applications, what is the recommended practice regarding the end-user UI?
A particular user in company ABC requires the ability to run any application with administrative privileges every day that they log in to their systems for a total duration of 5 working days.
What is the correct solution that an EPM admin can implement?
What are the predefined application groups?
For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?
If Privilege Management is not working on an endpoint, what is the most likely cause that can be verified in the EPM Agent Log Files?
Match the Application Groups policy to their correct description.
Which programming interface enables you to perform activities on EPM objects via a REST Web Service?