When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
Answer : A, B
An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?
Answer : C
For Advanced Policies, what can the target operating system users be set to?
Answer : C
In EPM, creation of which user type is required to use SAML?
Answer : D
What are the predefined application groups?
Answer : C
Which EPM reporting tool provides a comprehensive view of threat detection activity?
Answer : A
An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?
Answer : B