How can the use of USB drives be identified?
Answer : A
Following production deployment the DLP Endpoint Administrator begins to receive an increasing number of calls related to credit card number content detection false positives.
Which of the following can the administrator do to reduce false positives?
Answer : D
Which of the following proactively helps prevent data loss?
Removable Storage Devices with a file system, when connected to a computer
Answer : D
Which of the following is used to control the ability to modify policies in DLPe for non ePO
Global Admins?
Answer : B
Which of the following DLP features could be used to target suspicious activity during the first phase of an attack at the hardware layer?
Answer : A
There is a known virus spreading using removable media. What action should be taken to mitigate this risk?
Answer : C
Which of the following is NOT a DLPe incident task?
Answer : D
An executive sends merger documents to legal counsel. Policy dictates the documents should be encrypted, but they are being sent in plain text. What is the appropriate action to configure in such a case using DLPe protection rules?
Answer : C
What is the recommended rule to block Removable Storage Devices?
Answer : B
How long must the operational events be stored in the ePO database before purging?
Answer : D
A manufacturing organization needs to protect the transfer of sensitive design documents by prohibiting write access to USB devices. They do not want to limit their employee's ability to read files from these devices. To meet the organization's requirement, which type of rule can be implemented?
Answer : C
Which of the following is an indication of potential data loss?
Answer : D
An employee attempts to upload company data in violation of corporate security policy using a secure HTTPS connection. The DLPe Administrator has configured rules with a blocking reaction and Content Classification. Can the data be prevented from being uploaded over HTTPS?
Answer : C
Which encryption type is NOT available when creating a file system discovery rule?
Answer : A