Question 6 of 70

How should a DLP administrator exclude a custom endpoint application named `custom_app.exe` from being monitoring by Application File Access Control?
Answer

Suggested Answer

The suggested answer is B.

Community Votes

No votes yet

Join the discussion to cast yours

Question 7 of 70

A software company wants to protect its source code, including new source code created between scheduled indexing runs.
Which detection method should the company use to meet this requirement?
Answer

Suggested Answer

The suggested answer is C.

Community Votes

No votes yet

Join the discussion to cast yours

Question 8 of 70

What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.)
Answer

Suggested Answer

The suggested answer is B, D.

Community Votes

No votes yet

Join the discussion to cast yours

Question 9 of 70

What detection server is used for Network Discover, Network Protect, and Cloud Storage?
Answer

Suggested Answer

The suggested answer is B.

Community Votes

No votes yet

Join the discussion to cast yours

Question 10 of 70

Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?
Answer

Suggested Answer

The suggested answer is D.

Community Votes

No votes yet

Join the discussion to cast yours