A Helpdesk technician needs to provide remote assistance to a user whose laptop cannot connect to
the Internet to pull EPM policies. What CyberArk EPM feature should the Helpdesk technician use to
allow the user elevation capabilities?
C
Which user or group will not be removed as part of CyberArk EPM's Remove Local Administrators
feature?
A
Explanation:
Reference:
https://docs.cyberark.com/Product-
Doc/OnlineHelp/EPM/21.9/en/Content/EPM/Server%20User%20Guide/ManageLocalAdministrators
.htm
An end user is reporting that an application that needs administrative rights is crashing when
selecting a certain option menu item. The Application is part of an advanced elevate policy and is
working correctly except when using that menu item.
What could be the EPM cause of the error?
C
Which setting in the agent configuration controls how often the agent sends events to the EPM
Server?
A
Which of the following application options can be used when defining trusted sources?
D
What EPM component is responsible for communicating password changes in credential rotation?
B
Explanation:
Reference:
https://docs.cyberark.com/Product-
Doc/OnlineHelp/EPM/Latest/en/Content/Policies/CredentialsRotation-NewUI.htm
An EPM Administrator would like to notify end users whenever the Elevate policy is granting users
elevation for their applications. Where should the EPM Administrator go to enable the end-user
dialog?
D
Explanation:
Reference:
https://docs.cyberark.com/Product-
Doc/OnlineHelp/EPM/Latest/en/Content/EndUser/EndUserDialogs.htm
Which of the following is CyberArk's Recommended FIRST roll out strategy?
B
Explanation:
Reference: https://hkrtrainings.com/what-is-cyberark
An EPM Administrator would like to include a particular file extension to be monitored and protected
under Ransomware Protection. What setting should the EPM Administrator configure to add the
extension?
A
Explanation:
Reference:
https://docs.cyberark.com/Product-
Doc/OnlineHelp/EPM/Latest/en/Content/EPM/Server%20User%20Guide/PrivMgmnt-Ransomware-
NewUI.htm
When deploying EPM and in the Privilege Management phase what is the purpose of Discovery?
C
What are Trusted sources for Windows endpoints used for?
C
CyberArk's Privilege Threat Protection policies are available for which Operating Systems? (Choose
two.)
A, B
Which threat intelligence source requires the suspect file to be sent externally?
C
What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection,
without whitelisting the application launch?
B
An EPM Administrator would like to exclude an application from all Threat Protection modules.
Where should the EPM Administrator make this change?
B