What are Trusted sources for Windows endpoints used for?
C
CyberArk's Privilege Threat Protection policies are available for which Operating Systems? (Choose
two.)
A, B
Which threat intelligence source requires the suspect file to be sent externally?
C
What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection,
without whitelisting the application launch?
B
An EPM Administrator would like to exclude an application from all Threat Protection modules.
Where should the EPM Administrator make this change?
B
Which EPM reporting tool provides a comprehensive view of threat detection activity?
A
Explanation:
Reference:
https://docs.cyberark.com/Product-Doc/OnlineHelp/EPM-
onprem/Latest/en/Content/EPM/Server%20User%20Guide/Reporting%20Capabilities.htm#:~:text=T
he%20Threat%20Detection%20Dashboard%20provides,select%20Reports%20%3E%20Threat%20Det
ection%20Dashboard
What type of user can be created from the Threat Deception LSASS Credential Lures feature?
B
What is a valid step to investigate an EPM agent that is unable to connect to the EPM server?
C
Which programming interface enables you to perform activities on EPM objects via a REST Web
Service?
A
What are the policy targeting options available for a policy upon creation?
D