mcafee ma0-103 practice test

McAfee Data Loss Prevention Endpoint (DLPe)

Last exam update: Nov 18 ,2025
Page 1 out of 5. Viewing questions 1-15 out of 70

Question 1

What is the hierarchy used to resolve potential conflicts between application strategies?

  • A. Archiver > Trusted > Editor > Explorer (Explorer has the lowest ranking)
  • B. Archiver > Trusted > Explorer > Editor (Editor has the lowest ranking)
  • C. Archiver > Explorer > Editor > Trusted (Trusted has the lowest ranking)
  • D. Archiver > Editor > Explorer > Trusted ^Trusted has the lowest ranking)
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

The DLP End point administrator needs to prevent sensitive data from being transmitted over FTP.
Which Rule can be configured to meet this requirement?

  • A. File System Protection Rule
  • B. Cloud Protection Rule
  • C. Application File Access Protection Rule
  • D. Network Communication Protection Rule
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

To assist with perceived performance issues prior to product installation, the DLP End point
Administrator could prepare by

  • A. disabling unused modules.
  • B. distributing agent override codes.
  • C. establishing a system baseline.
  • D. enabling the system watch dog service.
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

How can incident data be exported?

  • A. Select specific events in DLP manager to export incident data
  • B. Run reports or queries to generate specific report and export incident data
  • C. Use database administration to export incident data
  • D. Run incident task manager to export incident data
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

Groupings of Applications in McAfee DLP used in rule creation are called

  • A. Enterprise Applications List.
  • B. Application Inventory.
  • C. Application Definitions.
  • D. Whitelisted Applications.
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

How can DLP be used to prohibit users from sending confidential files to partners?

  • A. Create a partner list definition and add to applicable protection rules
  • B. Create a partner list and apply to device control C, Use protection rules to stop copying of confidential files
  • D. Prevent confidential files from being used
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
D
50%
Discussions
vote your answer:
A
B
D
0 / 1000

Question 7

Before upgrading to a newer version, which of the following steps should be followed?

  • A. Back up the ePO policy catalog for DLP
  • B. Uninstall management extensions
  • C. Uninstall current DLPe client
  • D. Disable unused modules
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Which of the following is used to control the ability to modify policies in DLPe for non ePO Global
Admins?

  • A. An Active Directory GPO
  • B. An ePO Permission Set
  • C. Restricted access to the Evidence Share
  • D. Restricted access to the Whitelist Share
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

How does McAfee DLPe classify sensitive content?

  • A. Using DLP monitor reaction in rules
  • B. Using Tags and Content categories
  • C. Using File Extensions
  • D. Using Information Protection
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following proactively helps prevent data loss?
Removable Storage Devices with a file system, when connected to a computer

  • A. notify the user of potential data loss.
  • B. send an email to the user's manager.
  • C. generate an incident that is reported to the security team.
  • D. are blocked.
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following is an example of structured data that may be identified using Regular
Expressions?

  • A. First and last names
  • B. Social Security numbers
  • C. Physical addresses
  • D. Email domain
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Which of the following advanced security settings are the minimum required for replicating files to
the Evidence folder?

  • A. Full control
  • B. Read/write
  • C. Create files/write data and create folders/append data
  • D. List folder/read data
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

Which of the following protocols cannot be blocked or monitored by McAfee DLP 'Network
Communication Protection Rules'?

  • A. Secure FTP (SFTP)
  • B. Secure Copy (SCP)
  • C. Server Message Block/NetBIOS (SMB)
  • D. Secure Shell (SSH)
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

When configuring access controls for the Evidence repository, which of the following minimum
advanced security settings need to be applied to the Evidence Folder, subfolders and files?

  • A. List folder / read data
  • B. Full control
  • C. Change
  • D. Create folders / append data
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

How can different modules within the DLP agent configuration be enabled?

  • A. Use the miscellaneous section
  • B. Use the advanced configuration section
  • C. Use the application modules section
  • D. Use the user interface service section
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2