CyberArk epm-def practice test

Exam Title: CyberArk Endpoint Privilege Manager

Last update: Nov 27 ,2025
Question 1

What are Trusted sources for Windows endpoints used for?

  • A. Creating policies that contain trusted sources of applications.
  • B. Defining applications that can be used by the developers.
  • C. Listing all the approved application to the end users.
  • D. Managing groups added by recommendation.
Answer:

C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

CyberArk's Privilege Threat Protection policies are available for which Operating Systems? (Choose
two.)

  • A. Windows Workstations
  • B. Windows Servers
  • C. MacOS
  • D. Linux
Answer:

A, B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

Which threat intelligence source requires the suspect file to be sent externally?

  • A. NSRL
  • B. Palo Alto Wildfire
  • C. VirusTotal
  • D. CyberArk Application Risk Analysis Service (ARA)
Answer:

C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection,
without whitelisting the application launch?

  • A. Trusted Sources
  • B. Authorized Applications (Ransomware Protection)
  • C. Threat Intelligence
  • D. Policy Recommendations
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

An EPM Administrator would like to exclude an application from all Threat Protection modules.
Where should the EPM Administrator make this change?

  • A. Privilege Threat Protection under Policies.
  • B. Authorized Applications under Application Groups.
  • C. Protect Against Ransomware under Default Policies.
  • D. Threat Protection under Agent Configurations.
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

Which EPM reporting tool provides a comprehensive view of threat detection activity?

  • A. Threat Detection Dashboard
  • B. Detected Threats
  • C. Threat Detection Events
  • D. McAfee ePO Reports
Answer:

A


Explanation:
Reference:
https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM-
onprem/Latest/en/Content/EPM/Server%20User%20Guide/Reporting%20Capabilities.htm#:~:text=T
he%20Threat%20Detection%20Dashboard%20provides,select%20Reports%20%3E%20Threat%20Det
ection%20Dashboard

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

What type of user can be created from the Threat Deception LSASS Credential Lures feature?

  • A. It does not create any users
  • B. A standard user
  • C. A local administrator user
  • D. A domain admin user
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

What is a valid step to investigate an EPM agent that is unable to connect to the EPM server?

  • A. On the end point, open a browser session to the URL of the EPM server.
  • B. Ping the endpoint from the EPM server.
  • C. Ping the server from the endpoint.
  • D. Restart the end point
Answer:

C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

Which programming interface enables you to perform activities on EPM objects via a REST Web
Service?

  • A. EPM Web Services SDK
  • B. Application Password SDK
  • C. Mac Credential Provider SDK
  • D. Java password SDK
Answer:

A


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

What are the policy targeting options available for a policy upon creation?

  • A. AD Users and Groups, Computers in AD Security Groups, Servers
  • B. Computers in this set, Computers in AD Security Groups, Users and Groups
  • C. OS Computers, EPM Sets, AD Users
  • D. EPM Sets, Computers in AD Security Groups, AD Users and AD Security Groups
Answer:

D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 5
Viewing questions 1-10 out of 60
Go To
page 2