What can you manage by using User Policies?
A. Just-In-Time endpoint access and elevation, access to removable drives, and Services access.
B. Access to Windows Services only.
C. Filesystem and registry access, access to removable drives, and Services access.
D. Just-In-Time endpoint access and elevation, access to removable drives, filesystem and registry access, Services access, and User account control monitoring.
What unauthorized change can CyberArk EPM Ransomware Protection prevent?
A. Windows Registry Keys
B. Website Data
C. Local Administrator Passwords
D. Certificates in the Certificate Store
Before enabling Ransomware Protection, what should the EPM Administrator do first?
A. Enable the Privilege Management Inbox in Elevate mode.
B. Enable the Control Applications Downloaded From The Internet feature in Restrict mode.
C. Review the Authorized Applications (Ransomware Protection) group and update if necessary.
D. Enable Threat Protection and Threat Intelligence modules.
How does EPM help streamline security compliance and reporting?
A. Use of automated distribution of reports to the security team
B. Provides reports in standard formats such as PDF, Word and Excel
C. Print reports
D. Create custom reports
After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in.
What is a possible cause?
A. Secure Token on macOS endpoint is not enabled.
B. EPM agent is not able to connect to the EPM server.
C. After installation, Full Disk Access for the macOS agent to support EPM policies was not approved.
D. Endpoint password policy is too restrictive.
An end user is reporting that an application that needs administrative rights is crashing when selecting a certain option menu item. The Application is part of an advanced elevate policy and is working correctly except when using that menu item.
What could be the EPM cause of the error?
A. The Users defined in the advanced policy do not include the end user running the application.
B. The Advanced: Time options are not set correctly to include the time that the user is running the application at.
C. The Elevate Child Processes option is not enabled.
D. The Specify permissions to be set for selected Services on End-user Computers is set to Allow Start/Stop
If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?
A. vf_agent.exe
B. epm_agent.exe
C. vault_agent.exe
D. db_agent.exe
Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option?
A. Yes, when Audit Video recording started, when Audit Video recording stopped, and when Audit Recording video reached size limit.
B. Yes, when Audit Video recording started, when not enough disk space to start the video recording, and when video recording is initializing.
C. Yes, when Audit Video recording started, when Audit Video recording is uploaded to the EPM server, and when audit recording cannot be initialized.
D. No, Audit Video is only available without the possibility of having End-User dialog pop- ups.
Which EPM reporting tool provides a comprehensive view of threat detection activity?
A. Threat Detection Dashboard
B. Detected Threats
C. Threat Detection Events
D. McAfee ePO Reports
What is the CyberArk recommended practice when deploying the EPM agent to non- persistent VDIs?
A. A separate set
B. a VDI advanced policy
C. a separate license
D. A separate computer group