Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the CyberArk Defender EPM-DEF Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam EPM-DEF Premium Access

View all detail and faqs for the EPM-DEF exam


447 Students Passed

95% Average Score

95% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

What is required to configure SAML authentication on EPM?

Options:

A.

OAuth token

B.

Signed Authentication Request

C.

Encrypted Assertion

D.

Signed SAML Response

Questions # 2:

An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?

Options:

A.

Elevate Application Group

B.

Developer Applications Application Group

C.

Elevate Trusted Applications If Necessary Advanced Policy

D.

Elevate MacOS Policy

Questions # 3:

If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?

Options:

A.

vf_agent.exe

B.

epm_agent.exe

C.

vault_agent.exe

D.

db_agent.exe

Questions # 4:

Match the Application Groups policy to their correct description.

Question # 4

Options:

Questions # 5:

An end user is experiencing performance issues on their device after the EPM Agent had been installed on their machine. What should the EPM Administrator do first to help resolve the issue?

Options:

A.

Verify any 3rd party security solutions have been added to EPM's Files To Be Ignored Always configuration and CyberArk EPM has also been excluded from the 3rd party security solutions.

B.

Enable the Default Policy's Privilege Management Control, Unhandled Privileged Applications in Elevate mode.

C.

Rerun the agent installation on the user's machine to repair the installation.

D.

Uninstall or disable any anti-virus software prohibiting the EPM Agent functionalities.

Questions # 6:

CyberArk's Privilege Threat Protection policies are available for which Operating Systems? (Choose two.)

Options:

A.

Windows Workstations

B.

Windows Servers

C.

MacOS

D.

Linux

Questions # 7:

How does EPM help streamline security compliance and reporting?

Options:

A.

Use of automated distribution of reports to the security team

B.

Provides reports in standard formats such as PDF, Word and Excel

C.

Print reports

D.

Create custom reports

Questions # 8:

Where can you view CyberArk EPM Credential Lures events?

Options:

A.

Application Catalog

B.

Threat Protection Inbox

C.

Events Management

D.

Policy Audit

Questions # 9:

A Helpdesk technician needs to provide remote assistance to a user whose laptop cannot connect to the Internet to pull EPM policies. What CyberArk EPM feature should the Helpdesk technician use to allow the user elevation capabilities?

Options:

A.

Offline Policy Authorization Generator

B.

Elevate Trusted Application If Necessary

C.

Just In Time Access and Elevation

D.

Loosely Connected Devices Credential Management

Questions # 10:

When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)

Options:

A.

Add trusted software to the Authorized Applications (Ransomware protection) Application Group

B.

Add trusted software to the Allow Application Group

C.

Add additional files, folders, and/or file extensions to be included to Ransomware Protection

D.

Enable Detect privileged unhandled applications under Default Policies

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.