Pass the CyberArk Defender EPM-DEF Questions and answers with CertsForce

Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions
Questions # 11:

When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)

Options:

A.

Add trusted software to the Authorized Applications (Ransomware protection) Application Group


B.

Add trusted software to the Allow Application Group


C.

Add additional files, folders, and/or file extensions to be included to Ransomware Protection


D.

Enable Detect privileged unhandled applications under Default Policies


Expert Solution
Questions # 12:

When blocking applications, what is the recommended practice regarding the end-user UI?

Options:

A.

Show a block prompt for blocked applications.


B.

Show no prompts for blocked applications.


C.

Hide the CyberArk EPM Agent icon in the system tray.


D.

Enable the Default Deny policy.


Expert Solution
Questions # 13:

A particular user in company ABC requires the ability to run any application with administrative privileges every day that they log in to their systems for a total duration of 5 working days.

What is the correct solution that an EPM admin can implement?

Options:

A.

An EPM admin can generate a JIT access and elevation policy with temporary access timeframe set to 120 hours


B.

An EPM admin can generate a JIT access and elevation policy with temporary access timeframe set to 120 hours and Terminate administrative processes when the policy expires option unchecked


C.

An EPM admin can create an authorization token for each application needed by running: EPMOPAGtool.exe -command gentoken -targetUser -filehash -timeLimit 120 -action run


D.

An EPM admin can create a secure token for the end user's computer and instruct the end user to open an administrative command prompt and run the command vfagent.exe -UseToken


Expert Solution
Questions # 14:

What are the predefined application groups?

Options:

A.

Developer group, Administrator group


B.

Run as Administrator, Run as Developer, Block


C.

Elevate, Allow, Block, Developer Applications


D.

Block Only


Expert Solution
Questions # 15:

For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?

Options:

A.

The username should match to an existing account.


B.

The username should have a strong password associated.


C.

The username should not match to an existing account.


D.

The username should match the built-in local Administrator.


Expert Solution
Questions # 16:

If Privilege Management is not working on an endpoint, what is the most likely cause that can be verified in the EPM Agent Log Files?

Options:

A.

Behavior of the elevation prompt for administrators in Admin Approval Mode is set to “Prompt for Consent for non-Windows binaries”.


B.

Agent version is incompatible.


C.

UAC policy Admin Approval for the Built-in Administrator Account is set to “Disabled”.


D.

UAC policy Run all administrators in Admin Approval Mode is set to “Enabled”.


Expert Solution
Questions # 17:

Match the Application Groups policy to their correct description.

Question # 17


Expert Solution
Questions # 18:

Which programming interface enables you to perform activities on EPM objects via a REST Web Service?

Options:

A.

EPM Web Services SDK


B.

Application Password SDK


C.

Mac Credential Provider SDK


D.

Java password SDK


Expert Solution
Viewing page 2 out of 2 pages
Viewing questions 11-20 out of questions