최신 CyberArk Defender EPM-DEF 무료샘플문제:
1. What type of user can be created from the Threat Deception LSASS Credential Lures feature?
A) It does not create any users
B) A local administrator user
C) A standard user
D) A domain admin user
2. When enabling Threat Protection policies, what should an EPM Administrator consider? (Choose two.)
A) Threat Protection policies requires an additional agent to be installed.
B) Some Threat Protection policies are applicable only for Windows Servers as opposed to Workstations.
C) Certain Threat Protection policies apply for specific applications not found on all machines
D) Threat Protection features are not available in all regions.
3. An EPM Administrator is looking to enable the Threat Deception feature, under what section should the EPM Administrator go to enable this feature?
A) Policy Audit
B) Threat Protection Inbox
C) Policies
D) Threat Intelligence
4. When deploying Ransomware Protection, what tasks should be considered before enabling this functionality?
(Choose two.)
A) Enable Detect privileged unhandled applications under Default Policies
B) Add trusted software to the Authorized Applications (Ransomware protection) Application Group
C) Add trusted software to the Allow Application Group
D) Add additional files, folders, and/or file extensions to be included to Ransomware Protection
5. What feature is designed to exclude applications from CyberArk EPM's Ransomware Protection, without whitelisting the application launch?
A) Authorized Applications (Ransomware Protection)
B) Trusted Sources
C) Threat Intelligence
D) Policy Recommendations
질문과 대답:
질문 # 1 정답: C | 질문 # 2 정답: B,C | 질문 # 3 정답: C | 질문 # 4 정답: B,D | 질문 # 5 정답: A |