Question 6 of 70How should a DLP administrator exclude a custom endpoint application named `custom_app.exe` from being monitoring by Application File Access Control? Question 7 of 70A software company wants to protect its source code, including new source code created between scheduled indexing runs. Which detection method should the company use to meet this requirement? Question 8 of 70What are two reasons an administrator should utilize a manual configuration to determine the endpoint location? (Choose two.) Question 9 of 70What detection server is used for Network Discover, Network Protect, and Cloud Storage? Question 10 of 70Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?