Which of the following is an example of structured data that may be identified using Regular
Expressions?
B
Which of the following advanced security settings are the minimum required for replicating files to
the Evidence folder?
C
Which of the following protocols cannot be blocked or monitored by McAfee DLP 'Network
Communication Protection Rules'?
C
When configuring access controls for the Evidence repository, which of the following minimum
advanced security settings need to be applied to the Evidence Folder, subfolders and files?
D
How can different modules within the DLP agent configuration be enabled?
A
Which of the following is a potential indicator of an issue with the DLP Endpoint client?
B
An organization is concerned that employees are using their personal web based email accounts to
conduct work on internal documents after hours. Which of the following can the DLP Endpoint
Administrator configure to mitigate this risk?
A
Which of the following is NOT a DLPe incident task?
D
Which of the following is an example of un-structured data that may be identified using Dictionaries?
C
Which of the following is an indication of potential data loss?
D