Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CyberArk EPM-DEF Exam - Topic 1 Question 27 Discussion

Actual exam question for CyberArk's EPM-DEF exam
Question #: 27
Topic #: 1
[All EPM-DEF Questions]

An EPM Administrator would like to include a particular file extension to be monitored and protected under Ransomware Protection. What setting should the EPM Administrator configure to add the extension?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Vivan
4 months ago
A is correct! You need to authorize those apps.
upvoted 0 times
...
Rashida
4 months ago
Wait, can you really add extensions under Ransomware Protection like that?
upvoted 0 times
...
Lajuana
4 months ago
A is the only option that makes sense here.
upvoted 0 times
...
Jesus
4 months ago
I think A is right, but what about D?
upvoted 0 times
...
Twana
5 months ago
Definitely go with A for monitoring file extensions.
upvoted 0 times
...
Maia
5 months ago
I’m pretty confident that A is the correct option since it relates directly to authorized applications for ransomware protection.
upvoted 0 times
...
Andrew
5 months ago
I’m leaning towards B because it seems like it would make sense to ignore certain files, but I could be mixing it up with another topic.
upvoted 0 times
...
Cristal
5 months ago
I remember practicing a similar question about file monitoring, and I feel like Default Policies could be the right choice here.
upvoted 0 times
...
Jaime
5 months ago
I think the answer might be A, but I'm not completely sure if that's the right setting for adding file extensions.
upvoted 0 times
...
Verdell
5 months ago
The way I see it, the Authorized Applications (Ransomware Protection) setting is the most likely answer here. That's where you can specify which file extensions to monitor and protect against ransomware.
upvoted 0 times
...
Rolande
5 months ago
I'm a bit confused on this one. Is it possible that the "Files to be Ignored Always" setting could be used to add the file extension? I'll have to review the material again.
upvoted 0 times
...
Buck
5 months ago
Okay, let me see. The question is asking about adding a file extension to be monitored for ransomware, so I'm pretty confident the answer is Authorized Applications (Ransomware Protection).
upvoted 0 times
...
Lorean
5 months ago
Hmm, I'm not sure about this one. I'll have to think it through carefully. Maybe it has something to do with the Anti-tampering Protection setting?
upvoted 0 times
...
Ty
5 months ago
I think the answer is Authorized Applications (Ransomware Protection). That's where you can configure file extensions to be monitored and protected.
upvoted 0 times
...
Odelia
6 months ago
I'm a bit confused on the differences between the redo log, rollback log, and binary log. I'll need to review those concepts before answering.
upvoted 0 times
...
Emeline
6 months ago
This looks like a tricky one. I'll need to carefully read through the options and think about the best approach.
upvoted 0 times
...
Derick
6 months ago
Hmm, I'm a bit unsure about this one. I know the registry stores a lot of system configuration, but I can't quite remember where the file extension mappings are kept. I'll have to think this through carefully.
upvoted 0 times
...
Willodean
6 months ago
I feel pretty confident that the Logic App to Azure Blob storage is the way to go here. That would allow you to quickly ingest the emails and then have other processes handle them, without slowing down the initial response time.
upvoted 0 times
...
Tegan
10 months ago
Who needs EPM when you can just use a trusty roll of duct tape to protect your files? Just tape them shut and call it a day!
upvoted 0 times
Tien
9 months ago
C) Anti-tampering Protection
upvoted 0 times
...
Ilene
9 months ago
B) Files to be Ignored Always
upvoted 0 times
...
Micheline
10 months ago
A) Authorized Applications (Ransomware Protection)
upvoted 0 times
...
...
Na
10 months ago
Nah, I'm going with B. Files to be Ignored Always. That way, the file extension will be completely off the radar, and the ransomware won't even know it's there!
upvoted 0 times
Mi
9 months ago
User 3: I see your points, but I'm sticking with B) Files to be Ignored Always. It seems like the safest option to me.
upvoted 0 times
...
Emilio
9 months ago
User 2: I disagree, I believe C) Anti-tampering Protection is the best choice. It adds an extra layer of security for the extension.
upvoted 0 times
...
Amie
10 months ago
User 1: I think A) Authorized Applications is the way to go. It specifically allows certain extensions to be protected.
upvoted 0 times
...
...
Wilford
10 months ago
Ha! I bet the answer is actually D. Default Policies. That's where all the juicy settings are hidden, right?
upvoted 0 times
...
Salome
10 months ago
Hmm, I'm not sure about that. Maybe C. Anti-tampering Protection could also work, just to be extra safe.
upvoted 0 times
Raylene
9 months ago
C) Anti-tampering Protection sounds like a good option too
upvoted 0 times
...
Sherita
9 months ago
I would go with D) Default Policies to be safe
upvoted 0 times
...
Louis
10 months ago
I think it's A) Authorized Applications (Ransomware Protection)
upvoted 0 times
...
...
Carline
11 months ago
I think the answer is A. Authorized Applications (Ransomware Protection) seems like the logical choice to add a file extension for monitoring and protection.
upvoted 0 times
Suzi
9 months ago
User 3: Yes, that setting would allow the EPM Administrator to monitor and protect the specific file extension.
upvoted 0 times
...
Carmen
9 months ago
User 2: I think so too, it makes sense to configure it that way.
upvoted 0 times
...
Carri
10 months ago
User 1: I agree, A) Authorized Applications (Ransomware Protection) is the setting to add the file extension.
upvoted 0 times
...
...
Misty
11 months ago
I'm not sure, but I think Anti-tampering Protection could also be a setting to consider for adding the file extension.
upvoted 0 times
...
Felicitas
11 months ago
I agree with Renato. By adding the file extension to Authorized Applications, it will be monitored and protected.
upvoted 0 times
...
Renato
12 months ago
I think the EPM Administrator should configure Authorized Applications for Ransomware Protection.
upvoted 0 times
...

Save Cancel