When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)

When adding the EPM agent to a pre-existing security stack on workstation, what two steps are CyberArk recommendations. (Choose two.)
A . Add any pre-existing security application to the Files to Be Ignored Always.
B. Add EPM agent to the other security tools exclusions.
C. EPM agent should never be run with any other security tools.
D. Create new advanced policies for each security tool.

Answer: A,B

Latest EPM-DEF Dumps Valid Version with 60 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments