When enabling Threat Protection policies, what should an EPM Administrator consider? (Choose two.)
What can you manage by using User Policies?
Which programming interface enables you to perform activities on EPM objects via a REST Web Service?
For Advanced Policies, what can the target operating system users be set to?
A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?
An application has been identified by the LSASS Credentials Harvesting Module.
What is the recommended approach to excluding the application?
Which policy can be used to improve endpoint performance for applications commonly used for software development?
An end user is experiencing performance issues on their device after the EPM Agent had been installed on their machine. What should the EPM Administrator do first to help resolve the issue?
How does CyberArk EPM's Ransomware Protection feature monitor for Ransomware Attacks?