DLP 9.4 - MA0-103 Flashcards

1
Q

Name the 5 tabs of the Classification page. C MC RD WT D

A

Classification Manual Classification Registered Documents Whitelist Text Definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the first 5 Client configuration policy options, A-C. AC AFAP CP CT CC

A

Advanced configuration Application File Access Protection Clipboard Protection Content Tracking Corporate Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the DLPe Agent file name.

A

fcag.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the DLPe Endpoint Service file name.

A

fcags.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the DLPe Endpoint Service WatchDog file name.

A

fcagswd.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name the DLPe Text Extractor file name.

A

fcagte.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the DLPe Email Storage Crawler file name.

A

fcpst.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the 6 definition types for DLP Discover. What x2? Where x2? When? How?

A

Data: —File Extensions —File Information Other: —Credentials —Scheduler Repository: —File Server (CIFS) —Share Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the 5 tabs found on Menu | Data Protection | DLP Discover page. DS SO DA DI D

A

Discover Servers Scan Operations Data Analytics Data Inventory Definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the 2 Endpoint Discovery Rules.

A

Local File System Local Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the 2 Network Discovery Rules.

A

SharePoint File Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the 6 Device Control Rules. CXDR FHDR PaPDR RSDR RSFAR TDR

A

Citrix XenApp Device Rule Fixed Hard Drive Rule Plug and Play device Rule Removable Storage Device Rule Removable Storage File Access Rule TrueCrypt Device Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the 9 Data Protection Rules. AFAP CP CP EP NCP NSP PP RSP WP

A

Application File Access Protection Clipboard Protection Cloud Protection Email Protection Network Communication Protection Network Share Protection Printer Protection Removable Storage Protection Web Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name 3 rule types that Allow for justification to be requested.

A

Cloud Protection Printing Protection Web Host Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name 3 locations that are used to store persistent tagging data.

A

Alternate data streams Extended file attributes ODB$ folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Discovery Scan General Steps

A

Create and Define Classification Create and define Discovery Rule Schedule Definitions Setup scan Parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where do you define email destinations in DLP 9.4?

A

Policy Manager | Definitions | Source/Destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name the 5 tabs in the Incident Manager. E R C AL C

A

Evidence Rules Classifications Audit Log Comments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which processes can trigger an automated memory dump if selected in the policy?

A

DLP Agent Email Storage Crawler Text Extractor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name the 4 license options for DLP?

A

Device Control for Enterprise Full Data Loss Prevention Enterprise Data Loss Prevention Discovery Device Control for Small to Medium Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Where is the maximum memory used per process setting found in DLP 9.4?

A

Policy Catalog | Client Configuration | Content Tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Name the 4 tabs of the fully configured DLPe Client Interface

A

Discovery Events History About Tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Default max number of files linked to an event in the database?

24
Q

What 2 tabs are in each operational event?

A

Comments Audit Log

25
Q

Tags can be applied based on what criteria?

A

Location Web Application Application

26
Q

Where do you generate client bypass keys?

A

Help Desk Actions

27
Q

How many people are required to release redacted data when using Best Practices and why?

A

2 to prevent misuse of redacted data

28
Q

Which ePO user interface contains definitions?

A

Classifications DLP Policy Manager Discovery

29
Q

Name the first 7 reactions available. A RM P B C E M NA Q

A

Apply RM Policy Block Copy Encrypt Move No Action Quarantine

30
Q

Name the 4 process strategies. What type of application?

A

Editor Explorer Trusted Archiver

31
Q

Name the Classification > Definitions > Data category. AP D DP FE FI TFT

A

Advanced Pattern Dicitonary Document Properties File Extension File Information True File Type

32
Q

Name the Classification Definations Source/Destination Category

A

Application Template End-user group Network Share URL list

33
Q

Name the middle 5 Client configuration policy options, D-O. D and L D EP ECS OM and M

A

Debugging and Logging Discovery Email Protection Evidence Copy Service Operational Mode and Modules

34
Q

Name the last 6 Client configuration policy options, P-W. PP Q RSP SC UI WP

A

Printing Protection Quarantine Removable Storage protection Screen Capture User Interface Web Protection

35
Q

Name the last 7 reactions available. RO RI RJ S S T UN

A

Read-Only Report Incident Request Justification Show File in DLPe Console Store Original File Tag User Notification

36
Q

What actions can be taken by a Discovery Scan?

A

Encrypt Quarantine Tag

37
Q

Where are justifications configured?

A

Policy Manager > Definitions

38
Q

Where are privileged users defined?

A

Policy Catalog > DLP Policy

39
Q

What rules can be configured to block as a reaction? EP NSP PP RS

A

Email Protection Network Share Protection Printing Protection Removable storage Web post protection

40
Q

Which rules have the ability to perform a block action added in dlpe?

A

Cloud Protection Rules Plug and Play device Rules for iPhone 4 or later Application File Access Protection Rules

41
Q

What placeholder is used to display the classifications that triggered the event?

42
Q

What placeholder is used to display the rule set that triggered the event?

43
Q

What placeholder is used to display the vector (email protection, web protection, and so forth) that triggered the event?

44
Q

What placeholder is used to display the action that triggered the event?

45
Q

What placeholder is used to display the string value?

47
Q
  1. You want to prevent unauthorized distribution of tagged data. Which DLPe rule type best meets your requirements?
    A Classification rule
    B Data rule
    C Protection rule
    D Tagging rule
A

C Protection rule

48
Q
  1. Which of the following are valid actions for managing content that is no longer relevant?
    A Add content to the evidence folder
    B Add content to the data-at-rest folder
    C Add content to the data-at-motion folder
    D Add content to the whitelist folder
A

D Add content to the whitelist folder

49
Q
  1. Which of the following DLP components protects removable media and storage devices?
    A DLP Endpoint Agent
    B DLP Device Control
    C DLP Incident Manager
    D DLP Service WatchDog
A

B DLP Device Control

50
Q
  1. To configure the client software for full protection in Safe Mode, set the functionality in the Agent Configuration:
    A On the Miscellaneous tab
    B On the Security tab
    C On the Advanced Configuration tab
    D On the File Tracking tab
A

C On the Advanced Configuration tab

51
Q
  1. Which of the following steps is necessary to configure the DLP client software for full protection?
    A Enable On-the-Go protection
    B Enable Safe Mode option
    C Enable Universal protection
    D Enable WatchDog service
A

B Enable Safe Mode option

52
Q
  1. To display the McAfee DLP icon in Microsoft Outlook, the Show Release from Quarantine Controls in Outlook option must be
    enabled in the Agent Configuration:
    A On the Miscellaneous tab
    B On the Security tab
    C On the Advanced Configuration

D On the File Tracking tab

A

A On the Miscellaneous tab

53
Q
  1. Which of the following features lets you temporarily suspend of blocking rules?
    A Agent bypass
    B Master release
    C Override key
    D Quarantine release
A

A Agent bypass

54
Q
  1. Which of the following definitions are turned off (unavailable) in McAfee DLP Device Control software? Select two.
    A All Removable Storage Devices
    B Content encrypted by McAfee Endpoint Encryption
    C McAfee Encrypted USB
    D Rights Management
    E Web Destinations
A

D Rights Management
E Web Destinations

55
Q
  1. Which of the following folder paths and names are recommended initially for use as repository folders? Select all that apply.
    A c:\dlp_resources\
    B c:\dlp_resources\evidence
    C c:\dlp_resources\blacklist
    D c:\dlp_resources\whitelist
A

A c:\dlp_resources\

B c:\dlp_resources\evidence

D c:\dlp_resources\whitelist

56
Q
  1. Which of the following are characteristics of Dictionary Matching? Select all that apply.
    A Case-sensitive
    B Can match phrases
    C Can match substrings
    D Supports UTF-8
A

B Can match phrases
C Can match substrings
D Supports UTF-8