What is the hierarchy used to resolve potential conflicts between application strategies?
A.
Archiver > Trusted > Editor > Explorer (Explorer has the lowest ranking)
B.
Archiver > Trusted > Explorer > Editor (Editor has the lowest ranking)
C.
Archiver > Explorer > Editor > Trusted (Trusted has the lowest ranking)
D.
Archiver > Editor > Explorer > Trusted ^Trusted has the lowest ranking)
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 2
The DLP End point administrator needs to prevent sensitive data from being transmitted over FTP. Which Rule can be configured to meet this requirement?
A.
File System Protection Rule
B.
Cloud Protection Rule
C.
Application File Access Protection Rule
D.
Network Communication Protection Rule
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
To assist with perceived performance issues prior to product installation, the DLP End point Administrator could prepare by
A.
disabling unused modules.
B.
distributing agent override codes.
C.
establishing a system baseline.
D.
enabling the system watch dog service.
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 4
How can incident data be exported?
A.
Select specific events in DLP manager to export incident data
B.
Run reports or queries to generate specific report and export incident data
C.
Use database administration to export incident data
D.
Run incident task manager to export incident data
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 5
Groupings of Applications in McAfee DLP used in rule creation are called
A.
Enterprise Applications List.
B.
Application Inventory.
C.
Application Definitions.
D.
Whitelisted Applications.
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 6
How can DLP be used to prohibit users from sending confidential files to partners?
A.
Create a partner list definition and add to applicable protection rules
B.
Create a partner list and apply to device control C, Use protection rules to stop copying of confidential files
D.
Prevent confidential files from being used
Answer:
A
User Votes:
A
50%
B
50%
D
50%
Discussions
0/ 1000
Question 7
Before upgrading to a newer version, which of the following steps should be followed?
A.
Back up the ePO policy catalog for DLP
B.
Uninstall management extensions
C.
Uninstall current DLPe client
D.
Disable unused modules
Answer:
A
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
Which of the following is used to control the ability to modify policies in DLPe for non ePO Global Admins?
A.
An Active Directory GPO
B.
An ePO Permission Set
C.
Restricted access to the Evidence Share
D.
Restricted access to the Whitelist Share
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
How does McAfee DLPe classify sensitive content?
A.
Using DLP monitor reaction in rules
B.
Using Tags and Content categories
C.
Using File Extensions
D.
Using Information Protection
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
Which of the following proactively helps prevent data loss? Removable Storage Devices with a file system, when connected to a computer
A.
notify the user of potential data loss.
B.
send an email to the user's manager.
C.
generate an incident that is reported to the security team.
D.
are blocked.
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 11
Which of the following is an example of structured data that may be identified using Regular Expressions?
A.
First and last names
B.
Social Security numbers
C.
Physical addresses
D.
Email domain
Answer:
B
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 12
Which of the following advanced security settings are the minimum required for replicating files to the Evidence folder?
A.
Full control
B.
Read/write
C.
Create files/write data and create folders/append data
D.
List folder/read data
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 13
Which of the following protocols cannot be blocked or monitored by McAfee DLP 'Network Communication Protection Rules'?
A.
Secure FTP (SFTP)
B.
Secure Copy (SCP)
C.
Server Message Block/NetBIOS (SMB)
D.
Secure Shell (SSH)
Answer:
C
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 14
When configuring access controls for the Evidence repository, which of the following minimum advanced security settings need to be applied to the Evidence Folder, subfolders and files?
A.
List folder / read data
B.
Full control
C.
Change
D.
Create folders / append data
Answer:
D
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 15
How can different modules within the DLP agent configuration be enabled?