Question 6 of 70How should a DLP administrator exclude a custom endpoint application named `custom_app.exe` from being monitoring by Application File Access Control?
Correct Answer: B
Question 7 of 70A software company wants to protect its source code, including new source code created between scheduled indexing runs. Which detection method should the company use to meet this requirement?
Correct Answer: C
Question 8 of 70What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)
Correct Answer: B, D
Question 9 of 70What detection server is used for Network Discover, Network Protect, and Cloud Storage?
Correct Answer: B
Question 10 of 70Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?