View Mode
Q: 1
An end user is experiencing performance issues on their device after the EPM Agent had been installed on their machine. What should the EPM Administrator do first to help resolve the issue?
Options
Q: 2
Which setting in the agent configuration controls how often the agent sends events to the EPM Server?
Options
Q: 3
Which of the following application options can be used when defining trusted sources?
Options
Q: 4
Which of the following is CyberArk's Recommended FIRST roll out strategy?
Options
Q: 5
What are valid policy options for JIT and elevation policies?
Options
Q: 6
CyberArk EPM's Ransomware Protection comes with file types to be protected out of the box. If an EPM Administrator would like to remove a file type from Ransomware Protection, where can this be done?
Options
Q: 7
CyberArk's Privilege Threat Protection policies are available for which Operating Systems? (Choose two.)
Options
Q: 8
A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?
Options
Q: 9
If you want to diagnose agent EPM agent connectivity issues, what is the agent executable that can be used from the command line?
Options
Question 1 of 20 · Page 1 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE