When enabling Threat Protection policies, what should an EPM Administrator consider? (Choose two.)
Which EPM reporting tool provides a comprehensive view of threat detection activity?
What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?
Which user or group will not be removed as part of CyberArk EPM ' s Remove Local Administrators feature?
When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)
After a clean installation of the EPM agent, the local administrator password is not being changed on macOS and the old password can still be used to log in.
What is a possible cause?
What EPM component is responsible for communicating password changes in credential rotation?
Which of the following application options can be used when defining trusted sources?
A particular user in company ABC requires the ability to run any application with administrative privileges every day that they log in to their systems for a total duration of 5 working days.
What is the correct solution that an EPM admin can implement?
How does CyberArk EPM ' s Ransomware Protection feature monitor for Ransomware Attacks?
What feature is designed to exclude applications from CyberArk EPM ' s Ransomware Protection, without whitelisting the application launch?
An end user is reporting that an application that needs administrative rights is crashing when selecting a certain option menu item. The Application is part of an advanced elevate policy and is working correctly except when using that menu item.
What could be the EPM cause of the error?
Which setting in the agent configuration controls how often the agent sends events to the EPM Server?