New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A Helpdesk technician needs to provide remote assistance to a user whose laptop cannot connect to the Internet to pull EPM policies. What CyberArk EPM feature should the Helpdesk technician use to allow the user elevation capabilities?

A.

Offline Policy Authorization Generator

B.

Elevate Trusted Application If Necessary

C.

Just In Time Access and Elevation

D.

Loosely Connected Devices Credential Management

If Privilege Management is not working on an endpoint, what is the most likely cause that can be verified in the EPM Agent Log Files?

A.

Behavior of the elevation prompt for administrators in Admin Approval Mode is set to “Prompt for Consent for non-Windows binaries”.

B.

Agent version is incompatible.

C.

UAC policy Admin Approval for the Built-in Administrator Account is set to “Disabled”.

D.

UAC policy Run all administrators in Admin Approval Mode is set to “Enabled”.

On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?

A.

Privilege Escalation, Privilege Management, Application Management

B.

Privilege Management, Application Control, Threat analysis

C.

Privilege Management, Threat Protection, Application Escalation Control

D.

Privilege Management, Privilege Threat Protection, Local Privileged Accounts Management

Which of the following application options can be used when defining trusted sources?

A.

Publisher, Product, Size, URL

B.

Publisher, Name, Size, URI

C.

Product, URL, Machine, Package

D.

Product, Publisher, User/Group, Installation Package

How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?

A.

It compares known ransomware signatures retrieved from virus databases.

B.

It sandboxes the suspected ransomware and applies heuristics.

C.

It monitors for any unauthorized access to specified files.

D.

It performs a lookup of file signatures against VirusTotal's database.

When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)

A.

Add any pre-existing security application to the Files to Be Ignored Always.

B.

Add EPM agent to the other security tools exclusions.

C.

EPM agent should never be run with any other security tools.

D.

Create new advanced policies for each security tool.

Select the default threat intelligence source that requires additional licensing.

A.

VirusTotal

B.

Palo Alto WildFire

C.

CyberArk Application Risk Analysis Service

D.

NSRL

What are valid policy options for JIT and elevation policies?

A.

Grant temporary access for all users, Policy name, Restart administrative processes in admin approval mode, Collect audit information

B.

Grant temporary access for, Policy name, Terminate administrative processes when the policy expires, Collect audit information

C.

Grant administrative access, Policy name, Log off to apply policy, Collect policy violation information

D.

Terminate administrative services, Grant policy access for, Policy name, Collect audit reports