Which user or group will not be removed as part of CyberArk EPM's Remove Local Administrators feature?
Answer : A
What EPM component is responsible for communicating password changes in credential rotation?
Answer : B
What type of user can be created from the Threat Deception LSASS Credential Lures feature?
Answer : B
Which setting in the agent configuration controls how often the agent sends events to the EPM Server?
Answer : A
An EPM Administrator would like to include a particular file extension to be monitored and protected under Ransomware Protection. What setting should the EPM Administrator configure to add the extension?
Answer : A
What are the predefined application groups?
Answer : C
Which threat intelligence source requires the suspect file to be sent externally?
Answer : C