What type of user can be created from the Threat Deception LSASS Credential Lures feature?
A. It does not create any users
B. A standard user
C. A local administrator user
D. A domain admin user
When enabling Threat Protection policies, what should an EPM Administrator consider? (Choose two.)
A. Some Threat Protection policies are applicable only for Windows Servers as opposed to Workstations.
B. Certain Threat Protection policies apply for specific applications not found on all machines
C. Threat Protection policies requires an additional agent to be installed.
D. Threat Protection features are not available in all regions.
Where can you view CyberArk EPM Credential Lures events?
A. Application Catalog
B. Threat Protection Inbox
C. Events Management
D. Policy Audit
How does EPM help streamline security compliance and reporting?
A. Use of automated distribution of reports to the security team
B. Provides reports in standard formats such as PDF, Word and Excel
C. Print reports
D. Create custom reports
After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in.
What is a possible cause?
A. Secure Token on macOS endpoint is not enabled.
B. EPM agent is not able to connect to the EPM server.
C. After installation, Full Disk Access for the macOS agent to support EPM policies was not approved.
D. Endpoint password policy is too restrictive.
An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?
A. Elevate Application Group
B. Developer Applications Application Group
C. Elevate Trusted Applications If Necessary Advanced Policy
D. Elevate MacOS Policy
An end user is reporting that an application that needs administrative rights is crashing when selecting a certain option menu item. The Application is part of an advanced elevate policy and is working correctly except when using that menu item.
What could be the EPM cause of the error?
A. The Users defined in the advanced policy do not include the end user running the application.
B. The Advanced: Time options are not set correctly to include the time that the user is running the application at.
C. The Elevate Child Processes option is not enabled.
D. The Specify permissions to be set for selected Services on End-user Computers is set to Allow Start/Stop
Which user or group will not be removed as part of CyberArk EPM's Remove Local Administrators feature?
A. Built-in Local Administrator
B. Domain Users
C. Admin Users
D. Power Users
If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?
A. vf_agent.exe
B. epm_agent.exe
C. vault_agent.exe
D. db_agent.exe
When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
A. Add any pre-existing security application to the Files to Be Ignored Always.
B. Add EPM agent to the other security tools exclusions.
C. EPM agent should never be run with any other security tools.
D. Create new advanced policies for each security tool.
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CyberArk exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your EPM-DEF exam preparations and CyberArk certification application, do not hesitate to visit our Vcedump.com to find your solutions here.