CyberArk Defender - EPM Sample Questions:
1. When working with credential rotation/loosely connected devices, what additional CyberArk components are required?
A) PTA
B)
C) DAP
D) PVWA
2. In EPM, creation of which user type is required to use SAML?
A) Azure AD User
B) Local CyberArk EPM User
C) SQL User
D) AD User
3. An application has been identified by the LSASS Credentials Harvesting Module.
What is the recommended approach to excluding the application?
A) Exclude the application within the LSASS Credentials Harvesting module.
B) In Agent Configurations, add the application to the Threat Protection Exclusions
C) Add the application to an Advanced Policy or Application Group with an Elevate policy action.
D) Add the application to the Files to be Ignored Always in Agent Configurations.
4. For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?
A) The username should match to an existing account.
B) The username should have a strong password associated.
C) The username should not match to an existing account.
D) The username should match the built-in local Administrator.
5. Which of the following is CyberArk's Recommended FIRST roll out strategy?
A) Implement Ransomware Protection
B) Implement Application Control
C) Implement Threat Detection
D) Implement Privilege Management
Solutions:
Question # 1 Answer: D | Question # 2 Answer: A | Question # 3 Answer: B | Question # 4 Answer: C | Question # 5 Answer: D |