1.
How should a DLP administrator exclude a custom endpoint application named "custom_app.exe" from being monitoring by Application File Access Control?
2.
A software company wants to protect its source code, including new source code created between scheduled indexing runs. Which detection method should the company use to meet this requirement?
3.
What detection server is used for Network Discover, Network Protect, and Cloud Storage?
4.
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?
5.
Which detection method depends on "training sets"?