Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

McAfee MA0-103 - McAfee Certified Product Specialist - DLPE

Page: 1 / 3
Total 70 questions

McAfee DLP Agent functionality in Windows Safe Mode is controlled by which of the following?

A.

DLP Agent Configuration policy

B.

ePO Server Settings Page

C.

Agent watchdog

D.

DLP Global Policy

To meet specific requirements for managed systems in four different regions, an organization has customized several values within DLPE Agent Configuration policies. The four different Agent Configuration policies have been applied to objects in the ePO System Tree. Prior to an upgrade the four different Agent Configuration policies can be backed up through which of the following methods?

A.

The DLP Policy, File, Save as feature

B.

The DLP Policy, File, Export Policy to HTML feature

C.

The DLP Policy, File, Synchronize Templates feature

D.

The McAfee ePolicy Orchestrator Policy Catalog feature

Which of the following is critical for troubleshooting system health?

A.

System log

B.

Administrator log

C.

Agent log

D.

Policy analyzer

An organization wants to prevent sensitive data from being uploaded to unauthorized websites. Which of the following types of protection rule can the DLP Endpoint administrator configure to meet this requirement?

A.

File System Protection Rule

B.

Cloud Protection Rule

C.

Application Protection Rule

D.

Web Post Protection Rule

How can incident data be exported?

A.

Select specific events in DLP manager to export incident data

B.

Run reports or queries to generate specific report and export incident data

C.

Use database administration to export incident data

D.

Run incident task manager to export incident data

To assist with perceived performance issues prior to product installation, the DLP End point Administrator could prepare by

A.

disabling unused modules.

B.

distributing agent override codes.

C.

establishing a system baseline.

D.

enabling the system watch dog service.

Groupings of Applications in McAfee DLP used in rule creation are called

A.

Enterprise Applications List.

B.

Application Inventory.

C.

Application Definitions.

D.

Whitelisted Applications.

How can users be prohibited from transferring sensitive files to attached storage devices?

A.

Configure a digital rights management policy

B.

Configure a Removable Storage Protection rule

C.

Configure a Clipboard Protection rule

D.

Notify users that sensitive files should not be copied

Which of the following ePO server tasks schedules and runs tasks setup in DLP incident manager?

A.

DLP Incident Tasks Runner

B.

DLP Incident Tasks Executer

C.

DLP Policy Push Task

D.

DLP Incident Reporting Tasks Runner

When detected, which of the following must be categorized with the highest severity?

A.

User makes a purchase online with personal credit cards

B.

User emails a copy of a spreadsheet with credit card numbers of all customers to personal email to continue work from home

C.

User copies a spreadsheet with credit card numbers of all customers to an encrypted device to continue work from home

D.

User files an online form and includes their own personally identifiable information