CyberArk EPM-DEF CyberArk Defender - EPM Exam Practice Test

Page: 1 / 14
Total 60 questions
Question 1

Which programming interface enables you to perform activities on EPM objects via a REST Web Service?



Answer : A


Question 2

What is a valid step to investigate an EPM agent that is unable to connect to the EPM server?



Answer : C


Question 3

What are the policy targeting options available for a policy upon creation?



Answer : D


Question 4

How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?



Answer : B


Question 5

What are Trusted sources for Windows endpoints used for?



Answer : C


Question 6

An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?



Answer : B


Question 7

An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?



Answer : C


Page:    1 / 14   
Total 60 questions