Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CyberArk Exam EPM-DEF Topic 1 Question 22 Discussion

Actual exam question for CyberArk's EPM-DEF exam
Question #: 22
Topic #: 1
[All EPM-DEF Questions]

How does a Trusted Source policy affect an application?

Show Suggested Answer Hide Answer
Suggested Answer: A, B

Contribute your Thoughts:

Tracey
20 days ago
Option D is the way to go. Configuring trusted apps individually is the only way to ensure proper control and security. Plus, it's probably the most secure choice, unlike that 'run everything elevated' nonsense.
upvoted 0 times
...
Cordie
29 days ago
Ha! Running everything in elevated mode, that's just asking for trouble. I'll go with D - sounds like the most flexible and secure option.
upvoted 0 times
Janey
3 days ago
D is definitely the way to go. It allows for more control and flexibility in defining run and elevation parameters.
upvoted 0 times
...
Leslee
19 days ago
I agree, running everything in elevated mode is risky. D does seem like the best option for security.
upvoted 0 times
...
...
Cory
1 months ago
C is tempting, but I'm not sure if always running in elevated mode is the best approach for a Trusted Source policy. Seems like it might introduce unnecessary risk.
upvoted 0 times
Mirta
16 days ago
B) Applications will be allowed to run and will inherit the process token from the EPM agent.
upvoted 0 times
...
Lai
26 days ago
A) Applications will be allowed to run and will only elevate if required.
upvoted 0 times
...
...
Dorothy
1 months ago
I'm leaning towards B. The process token inheritance from the EPM agent sounds like a sensible way to handle trusted applications.
upvoted 0 times
...
Tiara
2 months ago
Option D seems the most comprehensive and accurate. It allows for granular control over trusted applications and their run/elevation settings.
upvoted 0 times
Jolanda
2 days ago
I always prefer to have specific configurations for each application to minimize risks.
upvoted 0 times
...
Dacia
15 days ago
Definitely, it helps ensure that only trusted applications are running with the necessary permissions.
upvoted 0 times
...
Danilo
28 days ago
It's important to have that level of granularity when it comes to security.
upvoted 0 times
...
Katina
1 months ago
Yes, it's important to have that level of granularity when it comes to security settings.
upvoted 0 times
...
Luisa
1 months ago
I agree, option D provides the most control over trusted applications.
upvoted 0 times
...
Anastacia
1 months ago
I agree, option D provides the most control over trusted applications.
upvoted 0 times
...
...
Gertude
2 months ago
I agree with Hoa, it's important to configure trusted sources for application security.
upvoted 0 times
...
Hoa
2 months ago
Yes, I believe it allows applications to run and only elevate if necessary.
upvoted 0 times
...
Jacquline
2 months ago
I think a Trusted Source policy affects how applications run.
upvoted 0 times
...

Save Cancel