Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

EPM-DEF CyberArk Defender - EPM Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CyberArk EPM-DEF CyberArk Defender - EPM certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 60 questions

Before enabling Ransomware Protection, what should the EPM Administrator do first?

A.

Enable the Privilege Management Inbox in Elevate mode.

B.

Enable the Control Applications Downloaded From The Internet feature in Restrict mode.

C.

Review the Authorized Applications (Ransomware Protection) group and update if necessary.

D.

Enable Threat Protection and Threat Intelligence modules.

Which of the following application options can be used when defining trusted sources?

A.

Publisher, Product, Size, URL

B.

Publisher, Name, Size, URI

C.

Product, URL, Machine, Package

D.

Product, Publisher, User/Group, Installation Package

Match the Application Groups policy to their correct description.

Which user or group will not be removed as part of CyberArk EPM's Remove Local Administrators feature?

A.

Built-in Local Administrator

B.

Domain Users

C.

Admin Users

D.

Power Users

A company is looking to manage their Windows Servers and Desktops with CyberArk EPM. Management would like to define different default policies between the Windows Servers and Windows Desktops.

What should the EPM Administrator do?

A.

In the Default Policies, exclude either the Windows Servers or the Windows Desktops.

B.

Create Advanced Policies to apply different policies between Windows Servers and Windows Desktops.

C.

CyberArk does not recommend installing EPM Agents on Windows Servers.

D.

Create a separate Set for Windows Servers and Windows Desktops.

For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?

A.

The username should match to an existing account.

B.

The username should have a strong password associated.

C.

The username should not match to an existing account.

D.

The username should match the built-in local Administrator.

What is a valid step to investigate an EPM agent that is unable to connect to the EPM server?

A.

On the end point, open a browser session to the URL of the EPM server.

B.

Ping the endpoint from the EPM server.

C.

Ping the server from the endpoint.

D.

Restart the end point

A particular user in company ABC requires the ability to run any application with administrative privileges every day that they log in to their systems for a total duration of 5 working days.

What is the correct solution that an EPM admin can implement?

A.

An EPM admin can generate a JIT access and elevation policy with temporary access timeframe set to 120 hours

B.

An EPM admin can generate a JIT access and elevation policy with temporary access timeframe set to 120 hours and Terminate administrative processes when the policy expires option unchecked

C.

An EPM admin can create an authorization token for each application needed by running: EPMOPAGtool.exe -command gentoken -targetUser -filehash -timeLimit 120 -action run

D.

An EPM admin can create a secure token for the end user's computer and instruct the end user to open an administrative command prompt and run the command vfagent.exe -UseToken

Match the Trusted Source to its correct definition:

CyberArk EPM's Ransomware Protection comes with file types to be protected out of the box. If an EPM Administrator would like to remove a file type from Ransomware Protection, where can this be done?

A.

Policy Scope within Protect Against Ransomware

B.

Authorized Applications (Ransomware Protection) within Application Groups

C.

Set Security Permissions within Advanced Policies

D.

Protected Files within Agent Configurations

An application has been identified by the LSASS Credentials Harvesting Module.

What is the recommended approach to excluding the application?

A.

In Agent Configurations, add the application to the Threat Protection Exclusions

B.

Add the application to the Files to be Ignored Always in Agent Configurations.

C.

Exclude the application within the LSASS Credentials Harvesting module.

D.

Add the application to an Advanced Policy or Application Group with an Elevate policy action.

Select the default threat intelligence source that requires additional licensing.

A.

VirusTotal

B.

Palo Alto WildFire

C.

CyberArk Application Risk Analysis Service

D.

NSRL

When blocking applications, what is the recommended practice regarding the end-user UI?

A.

Show a block prompt for blocked applications.

B.

Show no prompts for blocked applications.

C.

Hide the CyberArk EPM Agent icon in the system tray.

D.

Enable the Default Deny policy.

An end user is experiencing performance issues on their device after the EPM Agent had been installed on their machine. What should the EPM Administrator do first to help resolve the issue?

A.

Verify any 3rd party security solutions have been added to EPM's Files To Be Ignored Always configuration and CyberArk EPM has also been excluded from the 3rd party security solutions.

B.

Enable the Default Policy's Privilege Management Control, Unhandled Privileged Applications in Elevate mode.

C.

Rerun the agent installation on the user's machine to repair the installation.

D.

Uninstall or disable any anti-virus software prohibiting the EPM Agent functionalities.

Where would an EPM admin configure an application policy that depends on a script returning true for an end user's machine being connected to an open (no password protection) Wi-Fi?

A.

Advanced Policy - Application Control - Check Wi-Fi security

B.

Advanced Policy - Options: Conditional enforcement - Apply Policy according to Script execution result

C.

Default policies - Check if network access is secure

D.

Advanced Policy - Access - Specify permissions to be set for Wi-Fi network security

Where can you view CyberArk EPM Credential Lures events?

A.

Application Catalog

B.

Threat Protection Inbox

C.

Events Management

D.

Policy Audit

An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?

A.

Privilege Threat Protection under Policies.

B.

Authorized Applications under Application Groups.

C.

Protect Against Ransomware under Default Policies.

D.

Threat Protection under Agent Configurations.

What are Trusted sources for Windows endpoints used for?

A.

Creating policies that contain trusted sources of applications.

B.

Defining applications that can be used by the developers.

C.

Listing all the approved application to the end users.

D.

Managing groups added by recommendation.

Page: 1 / 1
Total 60 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved