Question 6 of 70
How should a DLP administrator exclude a custom endpoint application named `custom_app.exe` from being monitoring by Application File Access Control?
Correct Answer: B

Question 7 of 70
A software company wants to protect its source code, including new source code created between scheduled indexing runs.
Which detection method should the company use to meet this requirement?
Correct Answer: C

Question 8 of 70
What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)
Correct Answer: B, D

Question 9 of 70
What detection server is used for Network Discover, Network Protect, and Cloud Storage?
Correct Answer: B

Question 10 of 70
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?
Correct Answer: D