DLP 9.4 - MA0-103 Flashcards

1
Q

Name the 5 tabs of the Classification page. C MC RD WT D

A

Classification Manual Classification Registered Documents Whitelist Text Definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the first 5 Client configuration policy options, A-C. AC AFAP CP CT CC

A

Advanced configuration Application File Access Protection Clipboard Protection Content Tracking Corporate Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name the DLPe Agent file name.

A

fcag.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name the DLPe Endpoint Service file name.

A

fcags.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name the DLPe Endpoint Service WatchDog file name.

A

fcagswd.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name the DLPe Text Extractor file name.

A

fcagte.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name the DLPe Email Storage Crawler file name.

A

fcpst.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the 6 definition types for DLP Discover. What x2? Where x2? When? How?

A

Data: —File Extensions —File Information Other: —Credentials —Scheduler Repository: —File Server (CIFS) —Share Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Name the 5 tabs found on Menu | Data Protection | DLP Discover page. DS SO DA DI D

A

Discover Servers Scan Operations Data Analytics Data Inventory Definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name the 2 Endpoint Discovery Rules.

A

Local File System Local Email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name the 2 Network Discovery Rules.

A

SharePoint File Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name the 6 Device Control Rules. CXDR FHDR PaPDR RSDR RSFAR TDR

A

Citrix XenApp Device Rule Fixed Hard Drive Rule Plug and Play device Rule Removable Storage Device Rule Removable Storage File Access Rule TrueCrypt Device Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the 9 Data Protection Rules. AFAP CP CP EP NCP NSP PP RSP WP

A

Application File Access Protection Clipboard Protection Cloud Protection Email Protection Network Communication Protection Network Share Protection Printer Protection Removable Storage Protection Web Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Name 3 rule types that Allow for justification to be requested.

A

Cloud Protection Printing Protection Web Host Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name 3 locations that are used to store persistent tagging data.

A

Alternate data streams Extended file attributes ODB$ folder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Discovery Scan General Steps

A

Create and Define Classification Create and define Discovery Rule Schedule Definitions Setup scan Parameters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where do you define email destinations in DLP 9.4?

A

Policy Manager | Definitions | Source/Destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name the 5 tabs in the Incident Manager. E R C AL C

A

Evidence Rules Classifications Audit Log Comments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which processes can trigger an automated memory dump if selected in the policy?

A

DLP Agent Email Storage Crawler Text Extractor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Name the 4 license options for DLP?

A

Device Control for Enterprise Full Data Loss Prevention Enterprise Data Loss Prevention Discovery Device Control for Small to Medium Business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Where is the maximum memory used per process setting found in DLP 9.4?

A

Policy Catalog | Client Configuration | Content Tracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Name the 4 tabs of the fully configured DLPe Client Interface

A

Discovery Events History About Tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Default max number of files linked to an event in the database?

24
Q

What 2 tabs are in each operational event?

A

Comments Audit Log

25
Tags can be applied based on what criteria?
Location Web Application Application
26
Where do you generate client bypass keys?
Help Desk Actions
27
How many people are required to release redacted data when using Best Practices and why?
2 to prevent misuse of redacted data
28
Which ePO user interface contains definitions?
Classifications DLP Policy Manager Discovery
29
Name the first 7 reactions available. A RM P B C E M NA Q
Apply RM Policy Block Copy Encrypt Move No Action Quarantine
30
Name the 4 process strategies. What type of application?
Editor Explorer Trusted Archiver
31
Name the Classification \> Definitions \> Data category. AP D DP FE FI TFT
Advanced Pattern Dicitonary Document Properties File Extension File Information True File Type
32
Name the Classification Definations Source/Destination Category
Application Template End-user group Network Share URL list
33
Name the middle 5 Client configuration policy options, D-O. D and L D EP ECS OM and M
Debugging and Logging Discovery Email Protection Evidence Copy Service Operational Mode and Modules
34
Name the last 6 Client configuration policy options, P-W. PP Q RSP SC UI WP
Printing Protection Quarantine Removable Storage protection Screen Capture User Interface Web Protection
35
Name the last 7 reactions available. RO RI RJ S S T UN
Read-Only Report Incident Request Justification Show File in DLPe Console Store Original File Tag User Notification
36
What actions can be taken by a Discovery Scan?
Encrypt Quarantine Tag
37
Where are justifications configured?
Policy Manager \> Definitions
38
Where are privileged users defined?
Policy Catalog \> DLP Policy
39
What rules can be configured to block as a reaction? EP NSP PP RS
Email Protection Network Share Protection Printing Protection Removable storage Web post protection
40
Which rules have the ability to perform a block action added in dlpe?
Cloud Protection Rules Plug and Play device Rules for iPhone 4 or later Application File Access Protection Rules
41
What placeholder is used to display the classifications that triggered the event?
%c
42
What placeholder is used to display the rule set that triggered the event?
%r
43
What placeholder is used to display the vector (email protection, web protection, and so forth) that triggered the event?
%v
44
What placeholder is used to display the action that triggered the event?
%a
45
What placeholder is used to display the string value?
%s
46
47
1. You want to prevent unauthorized distribution of tagged data. Which DLPe rule type best meets your requirements? A Classification rule B Data rule C Protection rule D Tagging rule
C Protection rule
48
2. Which of the following are valid actions for managing content that is no longer relevant? A Add content to the evidence folder B Add content to the data-at-rest folder C Add content to the data-at-motion folder D Add content to the whitelist folder
D Add content to the whitelist folder
49
3. Which of the following DLP components protects removable media and storage devices? A DLP Endpoint Agent B DLP Device Control C DLP Incident Manager D DLP Service WatchDog
B DLP Device Control
50
4. To configure the client software for full protection in Safe Mode, set the functionality in the Agent Configuration: A On the Miscellaneous tab B On the Security tab C On the Advanced Configuration tab D On the File Tracking tab
C On the Advanced Configuration tab
51
5. Which of the following steps is necessary to configure the DLP client software for full protection? A Enable On-the-Go protection B Enable Safe Mode option C Enable Universal protection D Enable WatchDog service
B Enable Safe Mode option
52
6. To display the McAfee DLP icon in Microsoft Outlook, the Show Release from Quarantine Controls in Outlook option must be enabled in the Agent Configuration: A On the Miscellaneous tab B On the Security tab C On the Advanced Configuration D On the File Tracking tab
A On the Miscellaneous tab
53
7. Which of the following features lets you temporarily suspend of blocking rules? A Agent bypass B Master release C Override key D Quarantine release
A Agent bypass
54
8. Which of the following definitions are turned off (unavailable) in McAfee DLP Device Control software? Select two. A All Removable Storage Devices B Content encrypted by McAfee Endpoint Encryption C McAfee Encrypted USB D Rights Management E Web Destinations
D Rights Management E Web Destinations
55
9. Which of the following folder paths and names are recommended initially for use as repository folders? Select all that apply. A c:\dlp\_resources\ B c:\dlp\_resources\evidence C c:\dlp\_resources\blacklist D c:\dlp\_resources\whitelist
A c:\dlp\_resources\ B c:\dlp\_resources\evidence D c:\dlp\_resources\whitelist
56
10. Which of the following are characteristics of Dictionary Matching? Select all that apply. A Case-sensitive B Can match phrases C Can match substrings D Supports UTF-8
B Can match phrases C Can match substrings D Supports UTF-8