Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CyberArk Exam EPM-DEF Topic 3 Question 37 Discussion

Actual exam question for CyberArk's EPM-DEF exam
Question #: 37
Topic #: 3
[All EPM-DEF Questions]

An application has been identified by the LSASS Credentials Harvesting Module.

What is the recommended approach to excluding the application?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Annamae
18 days ago
I'm just gonna solve this problem by turning the computer off and on again. It's the IT version of duct tape and bubble gum!
upvoted 0 times
...
Bonita
22 days ago
D) Add the application to an Advanced Policy or Application Group with an Elevate policy action? Now we're talking! That's like putting a superhero cape on the app.
upvoted 0 times
...
Iluminada
1 months ago
C) Exclude the application within the LSASS Credentials Harvesting module? Hmm, sounds like a lot of work. I'd rather just unplug the computer and call it a day.
upvoted 0 times
Scot
4 days ago
B) Add the application to the Files to be Ignored Always in Agent Configurations.
upvoted 0 times
...
Ma
23 days ago
A) In Agent Configurations, add the application to the Threat Protection Exclusions.
upvoted 0 times
...
...
Jerrod
2 months ago
B) Add the application to the Files to be Ignored Always in Agent Configurations? Nah, that's not gonna work. Might as well just throw the whole computer out the window!
upvoted 0 times
Rory
4 days ago
D) Add the application to an Advanced Policy or Application Group with an Elevate policy action.
upvoted 0 times
...
Jaclyn
10 days ago
B) Add the application to the Files to be Ignored Always in Agent Configurations? Nah, that's not gonna work.
upvoted 0 times
...
Galen
21 days ago
C) Exclude the application within the LSASS Credentials Harvesting module.
upvoted 0 times
...
Rolland
1 months ago
A) In Agent Configurations, add the application to the Threat Protection Exclusions.
upvoted 0 times
...
...
Antonette
2 months ago
A) In Agent Configurations, add the application to the Threat Protection Exclusions? That's the way to go! Easy peasy lemon squeezy.
upvoted 0 times
Virgie
19 days ago
Great, it's a simple solution to prevent the application from being affected.
upvoted 0 times
...
Ciara
22 days ago
Yes, that's the recommended approach. It will exclude the application from being targeted.
upvoted 0 times
...
...
Dorian
2 months ago
But wouldn't adding the application to an Advanced Policy or Application Group with an Elevate policy action be a better option?
upvoted 0 times
...
Hoa
2 months ago
I disagree, I believe we should add the application to the Threat Protection Exclusions in Agent Configurations.
upvoted 0 times
...
Dorian
2 months ago
I think the recommended approach is to exclude the application in the LSASS Credentials Harvesting module.
upvoted 0 times
...

Save Cancel