CyberArk EPM-DEF CyberArk Defender - EPM Exam Practice Test

Page: 1 / 14
Total 60 questions
Question 1

How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?



Answer : B


Question 2

What are the policy targeting options available for a policy upon creation?



Answer : D


Question 3

Which programming interface enables you to perform activities on EPM objects via a REST Web Service?



Answer : A


Question 4

What is a valid step to investigate an EPM agent that is unable to connect to the EPM server?



Answer : C


Question 5

What type of user can be created from the Threat Deception LSASS Credential Lures feature?



Answer : B


Question 6

What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection, without whitelisting the application launch?



Answer : B


Question 7

Which threat intelligence source requires the suspect file to be sent externally?



Answer : C


Page:    1 / 14   
Total 60 questions