Which programming interface enables you to perform activities on EPM objects via a REST Web Service?
Answer : A
What is a valid step to investigate an EPM agent that is unable to connect to the EPM server?
Answer : C
What are the policy targeting options available for a policy upon creation?
Answer : D
How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?
Answer : B
What are Trusted sources for Windows endpoints used for?
Answer : C
An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?
Answer : B
An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?
Answer : C