To meet specific requirements for managed systems in four different regions, an organization has customized several values within DLPE Agent Configuration policies. The four different Agent Configuration policies have been applied to objects in the ePO System Tree. Prior to an upgrade the four different Agent Configuration policies can be backed up through which of the following methods?
A. The DLP Policy, File, Save as feature
B. The DLP Policy, File, Export Policy to HTML feature
C. The DLP Policy, File, Synchronize Templates feature
D. The McAfee ePolicy Orchestrator Policy Catalog feature
Which of the following statements is TRUE about Network Communication Protection Rules?
A. Protects files on specific file servers or mass storage devices
B. Interacts with Internet Protocol 6 (IPv6)
C. Blocks SMB connections
D. Terminates the connection
How would internal users be prohibited from accessing local drives?
A. Enable fixed hard drive device rule
B. Enable blocking of local drives
C. Enable cloud protection rule
D. Enable monitoring and protection rule for all local drives
What rule is used to monitor protected file transfer to network shares?
A. Network Communication Protection Rule
B. Network Share Protection Rule
C. File System Protection Rule
D. File System Discovery Rule
Before upgrading to a newer version, which of the following steps should be followed?
A. Back up the ePO policy catalog for DLP
B. Uninstall management extensions
C. Uninstall current DLPe client
D. Disable unused modules
DLPe application strategies, in order of decreasing security, are:
A. Editor, Explorer, Trusted, Archiver
B. Trusted, Explorer, Editor, Archiver
C. Editor, Explorer, Archiver, Trusted
D. Secure, Trusted, Editor, Allow
An organization's security policy prohibits the use of Internet based file sharing and storage applications. To monitor violation of this policy, which rule can the DLP Endpoint administrator configure?
A. Email Protection Rule
B. File System Protection Rule
C. Application File Access Protection Rule
D. Cloud Protection Rule
Which of the following is used to control the ability to modify policies in DLPe for non ePO Global Admins?
A. An Active Directory GPO
B. An ePO Permission Set
C. Restricted access to the Evidence Share
D. Restricted access to the Whitelist Share
Notifying the Manager of a User that triggered an alert is handled by which of the following types of task?
A. Deployment Task
B. Product Update
C. Client Task
D. Incident Task
Which of the following ePO server tasks schedules and runs tasks setup in DLP incident manager?
A. DLP Incident Tasks Runner
B. DLP Incident Tasks Executer
C. DLP Policy Push Task
D. DLP Incident Reporting Tasks Runner