Questions for the EPM-DEF were updated on : Dec 01 ,2025
Page 1 out of 4. Viewing questions 1-15 out of 60
Question 1
What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?
A. A separate set
B. a VDI advanced policy
C. a separate license
D. A separate computer group
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?
A. It compares known ransomware signatures retrieved from virus databases.
B. It sandboxes the suspected ransomware and applies heuristics.
C. It monitors for any unauthorized access to specified files.
D. It performs a lookup of file signatures against VirusTotal's database.
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
If Privilege Management is not working on an endpoint, what is the most likely cause that can be verified in the EPM Agent Log Files?
A. Behavior of the elevation prompt for administrators in Admin Approval Mode is set to “Prompt for Consent for non-Windows binaries”.
B. Agent version is incompatible.
C. UAC policy Admin Approval for the Built-in Administrator Account is set to “Disabled”.
D. UAC policy Run all administrators in Admin Approval Mode is set to “Enabled”.
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
A. Add any pre-existing security application to the Files to Be Ignored Always.
B. Add EPM agent to the other security tools exclusions.
C. EPM agent should never be run with any other security tools.
D. Create new advanced policies for each security tool.
Answer:
A, B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?
A. The username should match to an existing account.
B. The username should have a strong password associated.
C. The username should not match to an existing account.
D. The username should match the built-in local Administrator.
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
An EPM Administrator needs to create a policy to allow the MacOS developers elevation to an application. What type of policy should be used?
A. Elevate Application Group
B. Developer Applications Application Group
C. Elevate Trusted Applications If Necessary Advanced Policy
D. Elevate MacOS Policy
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
CyberArk EPM's Ransomware Protection comes with file types to be protected out of the box. If an EPM Administrator would like to remove a file type from Ransomware Protection, where can this be done?
A. Policy Scope within Protect Against Ransomware
B. Authorized Applications (Ransomware Protection) within Application Groups
C. Set Security Permissions within Advanced Policies
D. Protected Files within Agent Configurations
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
DRAG DROP Match the Application Groups policy to their correct description.
Answer:
None
User Votes:
Explanation:
Discussions
0/ 1000
Question 9
Where can you view CyberArk EPM Credential Lures events?
When blocking applications, what is the recommended practice regarding the end-user UI?
A. Show a block prompt for blocked applications.
B. Show no prompts for blocked applications.
C. Hide the CyberArk EPM Agent icon in the system tray.
D. Enable the Default Deny policy.
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 11
A company is looking to manage their Windows Servers and Desktops with CyberArk EPM. Management would like to define different default policies between the Windows Servers and Windows Desktops. What should the EPM Administrator do?
A. In the Default Policies, exclude either the Windows Servers or the Windows Desktops.
B. Create Advanced Policies to apply different policies between Windows Servers and Windows Desktops.
C. CyberArk does not recommend installing EPM Agents on Windows Servers.
D. Create a separate Set for Windows Servers and Windows Desktops.
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 12
Can the EPM Set Administrator configure Audit Dialog Pop-ups for the Record Audit Video option?
A. Yes, when Audit Video recording started, when Audit Video recording stopped, and when Audit Recording video reached size limit.
B. Yes, when Audit Video recording started, when not enough disk space to start the video recording, and when video recording is initializing.
C. Yes, when Audit Video recording started, when Audit Video recording is uploaded to the EPM server, and when audit recording cannot be initialized.
D. No, Audit Video is only available without the possibility of having End-User dialog pop-ups.
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 13
What is required to configure SAML authentication on EPM?
A. OAuth token
B. Signed Authentication Request
C. Encrypted Assertion
D. Signed SAML Response
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 14
An EPM Administrator is looking to enable the Threat Deception feature, under what section should the EPM Administrator go to enable this feature?
A. Threat Protection Inbox
B. Policies
C. Threat Intelligence
D. Policy Audit
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 15
On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?
A. Privilege Escalation, Privilege Management, Application Management
B. Privilege Management, Application Control, Threat analysis
C. Privilege Management, Threat Protection, Application Escalation Control
D. Privilege Management, Privilege Threat Protection, Local Privileged Accounts Management