exam questions

Exam EPM-DEF All Questions

View all questions & answers for the EPM-DEF exam

Exam EPM-DEF topic 1 question 14 discussion

Actual exam question from CyberArk's EPM-DEF
Question #: 14
Topic #: 1
[All EPM-DEF Questions]

What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection, without whitelisting the application launch?

  • A. Trusted Sources
  • B. Authorized Applications (Ransomware Protection)
  • C. Threat Intelligence
  • D. Policy Recommendations
Show Suggested Answer Hide Answer
Suggested Answer: B 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Hyper
Highly Voted 1 year, 5 months ago
is the option B. https://docs.cyberark.com/EPM/Latest/en/Content/EPM/Server%20User%20Guide/PrivMgmnt-Ransomware-NewUI.htm Authorized Applications (Ransomware protection) A group of applications that is automatically excluded from the Protect against Ransomware policy.
upvoted 5 times
...
Takumi
Most Recent 10 months, 4 weeks ago
Selected Answer: B
The answer is B. https://docs.cyberark.com/epm/24.3.0/en/Content/EPM/Server%20User%20Guide/PrivMgmnt-Ransomware-NewUI.htm
upvoted 3 times
...
CurryMuncher
1 year, 9 months ago
The correct answer is A. Trusted Sources. The Trusted Sources feature in CyberArk EPM (Endpoint Privilege Manager) is designed to exclude applications from the ransomware protection feature without requiring the application to be whitelisted for launch. This feature enables organizations to define trusted sources of software and exclude applications from the ransomware protection policy if they originate from those trusted sources. Authorized Applications is a feature in CyberArk EPM that allows organizations to create policies for specific applications and grant privileges to those applications based on the policies. Threat Intelligence is a feature in CyberArk EPM that provides real-time threat intelligence feeds to help organizations detect and respond to cyber threats. Policy Recommendations is a feature in CyberArk EPM that suggests policies based on best practices and industry standards to help organizations improve their security posture.
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...