Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

What are the predefined application groups?

A.

Developer group, Administrator group

B.

Run as Administrator, Run as Developer, Block

C.

Elevate, Allow, Block, Developer Applications

D.

Block Only

Full Access
Question # 5

Which policy can be used to improve endpoint performance for applications commonly used for software development?

A.

Developer Applications

B.

Trusted Application

C.

Trusted Source

D.

Software Updater

Full Access
Question # 6

An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?

A.

Elevate Application Group

B.

Developer Applications Application Group

C.

Elevate Trusted Applications If Necessary Advanced Policy

D.

Elevate MacOS Policy

Full Access
Question # 7

An EPM Administrator would like to include a particular file extension to be monitored and protected under Ransomware Protection. What setting should the EPM Administrator configure to add the extension?

A.

Authorized Applications (Ransomware Protection)

B.

Files to be Ignored Always

C.

Anti-tampering Protection

D.

Default Policies

Full Access
Question # 8

What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection, without whitelisting the application launch?

A.

Trusted Sources

B.

Authorized Applications (Ransomware Protection)

C.

Threat Intelligence

D.

Policy Recommendations

Full Access
Question # 9

A particular user in company ABC requires the ability to run any application with administrative privileges every day that they log in to their systems for a total duration of 5 working days.

What is the correct solution that an EPM admin can implement?

A.

An EPM admin can generate a JIT access and elevation policy with temporary access timeframe set to 120 hours

B.

An EPM admin can generate a JIT access and elevation policy with temporary access timeframe set to 120 hours and Terminate administrative processes when the policy expires option unchecked

C.

An EPM admin can create an authorization token for each application needed by running: EPMOPAGtool.exe -command gentoken -targetUser -filehash -timeLimit 120 -action run

D.

An EPM admin can create a secure token for the end user's computer and instruct the end user to open an administrative command prompt and run the command vfagent.exe -UseToken

Full Access