Logo Passei Direto
Buscar
7.How does EPM help streamline security compliance and reporting?

Use of automated distribution of reports to the security team.
Provides reports in standard formats such as PDF, Word and Excel.
Print reports.
Create custom reports.
A. Use of automated distribution of reports to the security team
B. Provides reports in standard formats such as PDF, Word and Excel
C. Print reports
D. Create custom reports
User badge image
Estudando com Questões

há 3 anos

Respostas

User badge image

Ed Verified user icon

há 2 anos

A resposta correta para a pergunta "Como o EPM ajuda a simplificar a conformidade e relatórios de segurança?" é a alternativa A) Uso de distribuição automatizada de relatórios para a equipe de segurança.

Essa resposta te ajudou?

0
Dislike0
left-side-bubbles-backgroundright-side-bubbles-background

Crie sua conta grátis para liberar essa resposta. 🤩

Já tem uma conta?

Ao continuar, você aceita os Termos de Uso e Política de Privacidade

Ainda com dúvidas?

Envie uma pergunta e tenha sua dúvida de estudo respondida!

Essa pergunta também está no material:

Mais perguntas desse material

1.A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?

A policy name should include the policy's creation date.
A policy name should include the target user group.
A policy name should include the creator of the policy.
A policy name should include the policy's set name.
A. Policy creation date
B. Target use group
C. Creator of the policy
D. The policy's Set name

2.For the CyberArk EPM Threat Deception Credential Lure feature, what is the recommendation regarding the username creation?

The username should match to an existing account.
The username should have a strong password associated.
The username should not match to an existing account.
The username should match the built-in local Administrator.
A. The username should match to an existing account.
B. The username should have a strong password associated.
C. The username should not match to an existing account.
D. The username should match the built-in local Administrator.

3.What can you manage by using User Policies?

Just-In-Time endpoint access and elevation, access to removable drives, and Services access.
Access to Windows Services only.
Filesystem and registry access, access to removable drives, and Services access.
Just-In-Time endpoint access and elevation, access to removable drives, filesystem and registry access, Services access, and User account control monitoring.
A. Just-In-Time endpoint access and elevation, access to removable drives, and Services access.
B. Access to Windows Services only.
C. Filesystem and registry access, access to removable drives, and Services access.
D. Just-In-Time endpoint access and elevation, access to removable drives, filesystem and registry access, Services access, and User account control monitoring.

4.When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)

Add trusted software to the Authorized Applications (Ransomware protection) Application Group.
Add trusted software to the Allow Application Group.
Add additional files, folders, and/or file extensions to be included to Ransomware Protection.
Enable Detect privileged unhandled applications under Default Policies.
A. Add trusted software to the Authorized Applications (Ransomware protection) Application Group
B. Add trusted software to the Allow Application Group
C. Add additional files, folders, and/or file extensions to be included to Ransomware Protection
D. Enable Detect privileged unhandled applications under Default Policies

5.An EPM Administrator would like to enable a Threat Protection policy, however, the policy protects an application that is not installed on all endpoints. What should the EPM Administrator do?

Enable the Threat Protection policy and configure the Policy Targets.
Do not enable the Threat Protection policy.
Enable the Threat Protection policy only in Detect mode.
Split up the endpoints in to separate Sets and enable Threat Protection for only one of the Sets.
A. Enable the Threat Protection policy and configure the Policy Targets.
B. Do not enable the Threat Protection policy.
C. Enable the Threat Protection policy only in Detect mode.
D. Split up the endpoints in to separate Sets and enable Threat Protection for only one of the Sets.

6.An EPM Administrator would like to enable CyberArk EPM's Ransomware Protection in Restrict mode. What should the EPM Administrator do?

Set Block unhandled applications to On.
Set Protect Against Ransomware to Restrict.
Set Protect Against Ransomware to Restrict and Set Block unhandled applications to On.
Set Control unhandled applications to Detect.
A. Set Block unhandled applications to On.
B. Set Protect Against Ransomware to Restrict.
C. Set Protect Against Ransomware to Restrict and Set Block unhandled applications to On.
D. Set Control unhandled applications to Detect.

8. What is the CyberArk recommended practice when deploying the EPM agent to non-persistent VDIs?

A separate set.
A VDI advanced policy.
A separate license.
A separate computer group.
A. A separate set
B. a VDI advanced policy
C. a separate license
D. A separate computer group

9.Where can you view CyberArk EPM Credential Lures events?

Application Catalog.
Threat Protection Inbox.
Events Management.
Policy Audit.
A. Application Catalog
B. Threat Protection Inbox
C. Events Management
D. Policy Audit

Mais conteúdos dessa disciplina