exam questions

Exam EPM-DEF All Questions

View all questions & answers for the EPM-DEF exam

Exam EPM-DEF topic 1 question 46 discussion

Actual exam question from CyberArk's EPM-DEF
Question #: 46
Topic #: 1
[All EPM-DEF Questions]

On the Default Policies page, what are the names of policies that can be set as soon as EPM is deployed?

  • A. Privilege Escalation, Privilege Management, Application Management
  • B. Privilege Management, Application Control, Threat analysis
  • C. Privilege Management, Threat Protection, Application Escalation Control
  • D. Privilege Management, Privilege Threat Protection, Local Privileged Accounts Management
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Hyper
Highly Voted 1 year, 5 months ago
D is correct https://docs.cyberark.com/EPM/Latest/en/Content/Policies/DefaultPolicies-NewUI.htm#:~:text=Set%20default%20policies,the%20default%20policies%20to%20apply.
upvoted 7 times
...
Takumi
Highly Voted 11 months ago
Selected Answer: D
The answer is D. https://docs.cyberark.com/EPM/Latest/en/Content/Policies/DefaultPolicies-NewUI.htm
upvoted 5 times
...
Souvik0730
Most Recent 1 year, 2 months ago
D is correct. For the new version of EPM, there is nothing to set up for Threat Analysis.
upvoted 4 times
...
pathomas1971
1 year, 5 months ago
Selected Answer: B
B. Privilege Management, Application Control, Threat analysis On the Default Policies page in CyberArk Endpoint Privilege Manager (EPM), the names of policies that can be set as soon as EPM is deployed include: Privilege Management: This policy involves managing and controlling privileges on endpoints to ensure that users have appropriate access levels and permissions. Application Control: This policy involves controlling which applications can be executed on endpoints to prevent the execution of unauthorized or malicious applications. Threat analysis: This policy is aimed at analyzing and mitigating potential threats by monitoring and responding to suspicious or malicious activities on endpoints. These default policies provide foundational security and management capabilities for endpoints as soon as EPM is deployed.
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...