1.
To which file system folder does PacketCapture write reconstructed SMTP messages?
2.
What is the sequence of message processing for Network Monitor?
3.
Which component has an obfuscated (hidden) log?
4.
By default, which port does the Enforce Server use to communicate with all detection servers?
5.
Where should the Network Discover detection server be placed in a typical corporate network architecture?
6.
The data loss prevention team needs to scan file shares that are located in Atlanta, Los Angeles, and Brazil. What is the most effective plan for identifying confidential and sensitive information on these files shares?
7.
Which situation can be monitored by both Network Monitor and Endpoint Prevent?
8.
By default, which application or destination are selected for endpoint monitoring?
9.
Where can a Data Loss Prevention administrator configure the throttling option for a DLP Agent?
10.
When installing a Network Monitor, which third-party application needs to be installed for it to function properly?