To determine baseline conditions for DLP implementation, which of the following actions can the DLP End point Administrator perform?
A. Configure database statistics
B. Run the Policy Analyzer
C. Configure backward compatibility
D. Perform testing with various groups
Applications in which of the following groups will NOT have their Disk Activity scanned for sensitive data?
A. Editor
B. Archiver
C. Installer
D. Trusted
Which of the following DLP features could be used to target suspicious activity during the first phase of an attack at the hardware layer?
A. Removable Storage device rules
B. Unmanageable device class
C. File system protection rules
D. Network communication protection rules
Which of the following is NOT a DLPe incident task?
A. Mail notification task
B. Purge task
C. Set reviewer task
D. Purge client task
The DLPe Administrator configures a Web Post Protection rule with a blocking reaction. The administrator does not configure a Web Destination definition. What is the result?
A. Uploads containing protected information are blocked for both internal and external websites
B. Uploads containing protected information are blocked only for external websites
C. Uploads containing protected information are blocked only for internal websites
D. None of the uploads containing protected information are blocked
Which Corporate Security Policy affects the Evidence Share and ePO Database size and growth?
A. Acceptable Use Policy
B. Access Control Policy
C. Data Retention Policy
D. Risk Management Framework
Following production deployment the DLP Endpoint Administrator begins to receive an increasing number of calls related to credit card number content detection false positives. Which of the following can the administrator do to reduce false positives?
A. Turn on verbose logging
B. Increase dictionary weights
C. Increase text pattern thresholds
D. Use regular expression validators
Which encryption type is NOT available when creating a file system discovery rule?
A. Oracle Digital Rights Management
B. McAfee Endpoint Encryption
C. Adobe LiveCycle Rights Management Encryption
D. Not encrypted
Prior to editing the production DLP Endpoint Policy a backup copy should be taken as a precaution. Which method can the DLP Administrator use to backup rules based on User Assignment Groups?
A. The DLP Policy, File, Export Policy to HTML feature
B. The DLP Policy, File, Synchronize Templates feature
C. The McAfee ePolicy Orchestrator Policy Catalog feature
D. The DLP Policy, File, Save as feature
McAfee DLP Agent functionality in Windows Safe Mode is controlled by which of the following?
A. DLP Agent Configuration policy
B. ePO Server Settings Page
C. Agent watchdog
D. DLP Global Policy