Test Online Free CyberArk EPM-DEF Exam Questions and Answers

The questions for EPM-DEF were last updated On May.19 2023

Get EPM-DEF Full Access
 / 1

Question No : 1
Which user or group will not be removed as part of CyberArk EPM's Remove Local Administrators feature?

Answer:
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM/21.9/en/Content/EPM/Server%20User%20Guide/ManageLocalAdmin istrators.htm

Question No : 2
When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)

Answer:

Question No : 3
Before enabling Ransomware Protection, what should the EPM Administrator do first?

Answer:

Question No : 4
What EPM component is responsible for communicating password changes in credential rotation?

Answer:
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM/Latest/en/Content/Policies/CredentialsRotation-NewUI.htm

Question No : 5
Which EPM reporting tool provides a comprehensive view of threat detection activity?

Answer:
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM-onprem/Latest/en/Content/EPM/Server%20User%20Guide/Reporting%20Capabilities.htm#:~:text=The%20Threat%20Detection%20Dashboard%20provides,select%20Reports%20% 3E%20Threat%20Detection%20Dashboard

Question No : 6
Where can you view CyberArk EPM Credential Lures events?

Answer:
Explanation:
Reference: https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM/21.7/en/Content/EPM/Server%20User%20Guide/Threat%20Detection%20Events.htm#:~:text=View%20events&text=You%20can%20filter%20the%20list,event %20and%20display%20more%20details

Question No : 7
In EPM, creation of which user type is required to use SAML?

Answer:

Question No : 8
After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in.
What is a possible cause?

Answer:

Question No : 9
When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)

Answer:

Question No : 10
When working with credential rotation/loosely connected devices, what additional CyberArk components are required?

Answer:

 / 1
  TOP 50 Exam Questions
Exam