When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
Answer : A, B
Before enabling Ransomware Protection, what should the EPM Administrator do first?
Answer : C
An end user is experiencing performance issues on their device after the EPM Agent had been installed on their machine. What should the EPM Administrator do first to help resolve the issue?
Answer : D
What can you manage by using User Policies?
Answer : D
When working with credential rotation/loosely connected devices, what additional CyberArk components are required?
Answer : C
When enabling Threat Protection policies, what should an EPM Administrator consider? (Choose two.)
Answer : A, B
What are the policy targeting options available for a policy upon creation?
Answer : D