CyberArk Related Exams
EPM-DEF Exam
Select the default threat intelligence source that requires additional licensing.
A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?
What are valid policy options for JIT and elevation policies?