1.
Which information is recommended to be included in an Exact Data Matching (EDM) data source?
2.
What must a policy manager do when working with Exact Data Matching (EDM) indexes?
3.
What does Network Monitor use to identify network traffic going to a nonstandard port?
4.
Which detection server can block file transfer protocol (FTP) requests?
5.
Which server encrypts the message when using a Modify SMTP Message response rule?
6.
What must a Data Loss Prevention administrator recycle for Network Monitor filter configuration changes to take effect?

 
7.
What are two available options when accessing the Configure Server page to configure protocol filters? (Select two.)
8.
What should be used to exclude email going to any email address in the partner.com domain?
9.
Which products run on the same detection server?
10.
What is the primary function of Endpoint Prevent?