Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Match the Application Groups policy to their correct description.

If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?

A.

vf_agent.exe

B.

epm_agent.exe

C.

vault_agent.exe

D.

db_agent.exe

When working with credential rotation/loosely connected devices, what additional CyberArk components are required?

A.

PTA

B.

ОРМ

C.

PVWA

D.

DAP

An EPM Administrator would like to notify end users whenever the Elevate policy is granting users elevation for their applications. Where should the EPM Administrator go to enable the end-user dialog?

A.

End-user UI in the left panel of the console

B.

Advanced, Agent Configurations

C.

Default Policies

D.

End-User UI within the policy

CyberArk's Privilege Threat Protection policies are available for which Operating Systems? (Choose two.)

A.

Windows Workstations

B.

Windows Servers

C.

MacOS

D.

Linux

When blocking applications, what is the recommended practice regarding the end-user UI?

A.

Show a block prompt for blocked applications.

B.

Show no prompts for blocked applications.

C.

Hide the CyberArk EPM Agent icon in the system tray.

D.

Enable the Default Deny policy.

What can you manage by using User Policies?

A.

Just-In-Time endpoint access and elevation, access to removable drives, and Services access.

B.

Access to Windows Services only.

C.

Filesystem and registry access, access to removable drives, and Services access.

D.

Just-In-Time endpoint access and elevation, access to removable drives, filesystem and registry access, Services access, and User account control monitoring.

What type of user can be created from the Threat Deception LSASS Credential Lures feature?

A.

It does not create any users

B.

A standard user

C.

A local administrator user

D.

A domain admin user

What is required to configure SAML authentication on EPM?

A.

OAuth token

B.

Signed Authentication Request

C.

Encrypted Assertion

D.

Signed SAML Response

An EPM Administrator would like to include a particular file extension to be monitored and protected under Ransomware Protection. What setting should the EPM Administrator configure to add the extension?

A.

Authorized Applications (Ransomware Protection)

B.

Files to be Ignored Always

C.

Anti-tampering Protection

D.

Default Policies