Which setting in the agent configuration controls how often the agent sends events to the EPM Server?
When blocking applications, what is the recommended practice regarding the end-user UI?
When deploying Ransomware Protection, what tasks should be considered before enabling this functionality? (Choose two.)
A policy needs to be created to block particular applications for a specific user group. Based on CyberArk's policy naming best practices, what should be included in the policy's name?
When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
Select the default threat intelligence source that requires additional licensing.