Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

CyberArk Exam EPM-DEF Topic 5 Question 48 Discussion

Actual exam question for CyberArk's EPM-DEF exam
Question #: 48
Topic #: 5
[All EPM-DEF Questions]

An EPM Administrator would like to exclude an application from all Threat Protection modules. Where should the EPM Administrator make this change?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

Louis
18 days ago
I'd just unplug the whole system and call it a day. No more threats if there's no computer, right? Kidding, kidding... I think B is the way to go.
upvoted 0 times
...
Amalia
19 days ago
B. Authorized Applications under Application Groups - that's my final answer! Gotta love these multiple-choice questions, am I right?
upvoted 0 times
...
Wynell
25 days ago
Hmm, I'm feeling confident about C. Protect Against Ransomware under Default Policies. Sounds like the right place to make that change.
upvoted 0 times
Lisbeth
7 days ago
I'm not so sure, I would go with D. Threat Protection under Agent Configurations.
upvoted 0 times
...
Britt
8 days ago
I think C is the right choice too. Protect Against Ransomware under Default Policies.
upvoted 0 times
...
...
Maxima
1 months ago
Ooh, this one's tricky. I'm leaning towards D. Threat Protection under Agent Configurations, but I'm not 100% sure.
upvoted 0 times
Carline
19 days ago
I think it might be B. Authorized Applications under Application Groups.
upvoted 0 times
...
...
Bettina
2 months ago
I think the answer is B. Authorized Applications under Application Groups. That's where I would go to exclude an application from Threat Protection.
upvoted 0 times
Macy
12 days ago
I think you're right. B is the right choice for excluding an application from Threat Protection.
upvoted 0 times
...
Tanesha
1 months ago
I agree, B is the correct answer. That's where you can exclude an application from Threat Protection.
upvoted 0 times
...
...
Kattie
2 months ago
But wouldn't excluding the application from Threat Protection modules be more related to Authorized Applications?
upvoted 0 times
...
Frank
2 months ago
I disagree, I believe the change should be made in Threat Protection under Agent Configurations.
upvoted 0 times
...
Kattie
2 months ago
I think the EPM Administrator should make this change in Authorized Applications under Application Groups.
upvoted 0 times
...

Save Cancel