What are Trusted sources for Windows endpoints used for?
A. Creating policies that contain trusted sources of applications.
B. Defining applications that can be used by the developers.
C. Listing all the approved application to the end users.
D. Managing groups added by recommendation.
Which policy can be used to improve endpoint performance for applications commonly used for software development?
A. Developer Applications
B. Trusted Application
C. Trusted Source
D. Software Updater
On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?
A. Privilege Escalation, Privilege Management, Application Management
B. Privilege Management, Application Control, Threat analysis
C. Privilege Management, Threat Protection, Application Escalation Control
D. Privilege Management, Privilege Threat Protection, Local Privileged Accounts Management
What unauthorized change can CyberArk EPM Ransomware Protection prevent?
A. Windows Registry Keys
B. Website Data
C. Local Administrator Passwords
D. Certificates in the Certificate Store
What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection, without whitelisting the application launch?
A. Trusted Sources
B. Authorized Applications (Ransomware Protection)
C. Threat Intelligence
D. Policy Recommendations
In EPM, creation of which user type is required to use SAML?
A. Local CyberArk EPM User
B. AD User
C. SQL User
D. Azure AD User
CyberArk's Privilege Threat Protection policies are available for which Operating Systems? (Choose two.)
A. Windows Workstations
B. Windows Servers
C. MacOS
D. Linux
A company is looking to manage their Windows Servers and Desktops with CyberArk EPM. Management would like to define different default policies between the Windows Servers and Windows Desktops.
What should the EPM Administrator do?
A. In the Default Policies, exclude either the Windows Servers or the Windows Desktops.
B. Create Advanced Policies to apply different policies between Windows Servers and Windows Desktops.
C. CyberArk does not recommend installing EPM Agents on Windows Servers.
D. Create a separate Set for Windows Servers and Windows Desktops.
When working with credential rotation/loosely connected devices, what additional CyberArk components are required?
A. PTA
B. OPM
C. PVWA
D. DAP
An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?
A. Privilege Threat Protection under Policies.
B. Authorized Applications under Application Groups.
C. Protect Against Ransomware under Default Policies.
D. Threat Protection under Agent Configurations.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your EPM-DEF exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.