To meet specific requirements for managed systems in four different regions, an organization has customized several values within DLPE Agent Configuration policies. The four different Agent Configuration policies have been applied to objects in the ePO System Tree. Prior to an upgrade the four different Agent Configuration policies can be backed up through which of the following methods?
A. The DLP Policy, File, Save as feature
B. The DLP Policy, File, Export Policy to HTML feature
C. The DLP Policy, File, Synchronize Templates feature
D. The McAfee ePolicy Orchestrator Policy Catalog feature
When detected, which of the following must be categorized with the highest severity?
A. User makes a purchase online with personal credit cards
B. User emails a copy of a spreadsheet with credit card numbers of all customers to personal email to continue work from home
C. User copies a spreadsheet with credit card numbers of all customers to an encrypted device to continue work from home
D. User files an online form and includes their own personally identifiable information
How can DLP be used to prohibit users from sending confidential files to partners?
A. Create a partner list definition and add to applicable protection rules
B. Create a partner list and apply to device control C, Use protection rules to stop copying of confidential files
C. Prevent confidential files from being used
Which of the following DLP features is associated with designating destinations and sources to protect?
A. Text patterns
B. Content Classification
C. Definitions
D. Dictionaries
Which of the following McAfee tools are useful to collect McAfee product data from a computer so that the problem can be analyzed and resolved by McAfee Technical Support?
A. ePO-MVT (McAfee Virtual Technician)
B. Minimum Escalation Requirements (MER) tools
C. McAfee Profiler
D. extra DAT
The DLP End point administrator needs to prevent sensitive data from being transmitted over FTP. Which Rule can be configured to meet this requirement?
A. File System Protection Rule
B. Cloud Protection Rule
C. Application File Access Protection Rule
D. Network Communication Protection Rule
A manufacturing organization needs to protect the transfer of sensitive design documents by prohibiting write access to USB devices. They do not want to limit their employee's ability to read files from these devices. To meet the organization's requirement, which type of rule can be implemented?
A. Plug and Play Device Rule
B. Removable Storage Protection Rule
C. Removable Storage Device Rule (supports Mac)
D. Removable Storage File Access Rule
Which of the following is critical for troubleshooting system health?
A. System log
B. Administrator log
C. Agent log
D. Policy analyzer
Which of the following is a potential indicator of an issue with the DLP Endpoint client?
A. Multiple FCAGTE processes are present in the Task Manager
B. Multiple FCAG processes are present in the Task Manager
C. FCAGSD process is present in the Task Manager
D. FCAGTE is running as a user instead of the System account in the Task Manager
Which of the following must be restarted after upgrading the ePO extensions for DLPe?
A. McAfee Framework Service
B. ePO Event Parser
C. ePO Application Server
D. ePO Server Service