Managed McAfee DLPe clients receive the Global Policy through which of the following?
A. Active Directory Group Policy.
B. McAfee Agent ASCI.
C. Shared Folder defined in the local registry.
D. Internal Software Distribution Tool.
Which of the following is NOT a DLPe incident task?
A. Mail notification task
B. Purge task
C. Set reviewer task
D. Purge client task
How can incident data be exported?
A. Select specific events in DLP manager to export incident data
B. Run reports or queries to generate specific report and export incident data
C. Use database administration to export incident data
D. Run incident task manager to export incident data
The DLP End point administrator needs to prevent sensitive data from being transmitted over FTP. Which Rule can be configured to meet this requirement?
A. File System Protection Rule
B. Cloud Protection Rule
C. Application File Access Protection Rule
D. Network Communication Protection Rule
What is the hierarchy used to resolve potential conflicts between application strategies?
A. Archiver > Trusted > Editor > Explorer (Explorer has the lowest ranking)
B. Archiver > Trusted > Explorer > Editor (Editor has the lowest ranking)
C. Archiver > Explorer > Editor > Trusted (Trusted has the lowest ranking)
D. Archiver > Editor > Explorer > Trusted ^Trusted has the lowest ranking)
Which of the following is NOT a proactive approach to preventing performance issues?
A. Adding exclusions for security and indexing software
B. Removing unnecessary applications and application definitions from the policy
C. Disabling unused modules in Agent Configuration
D. Running a File System Discovery Scan
How can users be prohibited from transferring sensitive files to attached storage devices?
A. Configure a digital rights management policy
B. Configure a Removable Storage Protection rule
C. Configure a Clipboard Protection rule
D. Notify users that sensitive files should not be copied
Which of the following is an authorized method to remove the McAfee DLPe Agent?
A. ePO product deployment task
B. Agent override
C. Add the computer to a privileged user group
D. ePO server task
An organization's security policy prohibits the use of Internet based file sharing and storage applications. To monitor violation of this policy, which rule can the DLP Endpoint administrator configure?
A. Email Protection Rule
B. File System Protection Rule
C. Application File Access Protection Rule
D. Cloud Protection Rule
McAfee DLP Agent functionality in Windows Safe Mode is controlled by which of the following?
A. DLP Agent Configuration policy
B. ePO Server Settings Page
C. Agent watchdog
D. DLP Global Policy