1.
How should a DLP administrator exclude a custom endpoint application named "custom_app.exe" from being monitoring by Application File Access Control?
2.
A software company wants to protect its source code, including new source code created between scheduled indexing runs. Which detection method should the company use to meet this requirement?
3.
What detection server is used for Network Discover, Network Protect, and Cloud Storage?
4.
Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?
5.
Which detection method depends on "training sets"?
6.
What is the default fallback option for the Endpoint Prevent Encrypt response rule?
7.
Which channel does Endpoint Prevent protect using Device Control?
8.
A divisional executive requests a report of all incidents generated by a particular region, summarized by department. What does the DLP administrator need to configure to generate this report?
9.
A DLP administrator needs to stop the PacketCapture process on a detection server. Upon inspection of the Server Detail page, the administrator discovers that all processes are missing from the display. What are the processes missing from the Server Detail page display?
10.
What detection technology supports partial contents matching?