1.
How can a user monitor compliance to policies?
2.
When approving an exception, which field requires input from the approver?
3.
How are Reconciliation Rules processed?
4.
How is a policy applied to Network Discover scans?
5.
A Data Loss Prevention administrator needs to modify a Network Discover scan that has already started. For the remaining shares, files larger than 100 MB need to be ignored. How should this be accomplished?
6.
With respect to the entitlements workflow, what is the first step that is performed?
7.
To run a bv-Control query targeting Microsoft SQL Server 2005, which Microsoft component is required on the information server?
8.
When should Network Discover Scanners be used?
9.
A company needs to scan all of its file shares on a weekly basis to make sure sensitive data is being stored correctly. The total volume of data on the file servers is greater than 1 TB. Which approach will allow the company to quickly scan all of this data on a weekly basis?
10.
In the context of IT compliance, what are standards?