Exam Code : 050-CSEDLPS
Exam Name : CSE RSA Data Loss Prevention 6.0
Vendor Name :
"RSA"
050-CSEDLPS Dumps
050-CSEDLPS Braindumps 050-CSEDLPS Real Questions 050-CSEDLPS Practice Test
050-CSEDLPS Actual Questions
killexams.com
CSE RSA Data Loss Prevention 6.0
https://killexams.com/pass4sure/exam-detail/050-CSEDLPS
What is the maximum peak traffic that the DLP Network Sensor can handle?
150 Mbps
200 Mbps
250 Mbps
350 Mbps
Fred is a member of the Incident Review Group. All incidents are assigned automatically to the Incident Review Group. Fred is told that there are several hundred incidents currently in the incident review queue. Fred logs on to the Enterprise Manager using his account. What will be displayed on his screen when he selects the incident tab?
Only Events that have been assigned to Fred
Only incidents that have been assigned to Fred
All the open events assigned to the Incident Review Group
All the open incidents assigned to the Incident Review Group
A sensitive word processing document is fingerprinted and added to an existing policy. Which of the following can NOT be detected by a policy that uses the document's fingerprint?
Only the first two paragraphs of the document.
The exact document being attached to an email
A PDF file containing the content of the fingerprinted document on an end user's computer.
The contents of the fingerprinted document pasted into the middle of another document that is emailed to someone outside your network.
Which is of the following is NOT an option that is configured in a policy?
Escalation Rules
Notification Rules
Incident Validity Rules
Incident Handling Rules
Which of the following is NOT true about the RSA DLP Suite?
RSA DLP Policies can be exported
RSA DLP Policies can be imported
The DLP Network Appliances run the Centos Linux operating system
The Endpoint Enforce Component requires the Network Controller Appliance
Sensitive documents that violate policies are found in RSA DLP Datacenter grid scan on the corporate network. Incidents have been created by these violations. Which of the following is NOT a remedial action that can be performed on the sensitive documents?
The documents can be deleted.
The documents can be blocked
The ACL of the documents may be changed.
The documents can be moved to a secure location
Which one of the following is NOT an option in rule grouping for described content?
May occur
Must occur
Should occur
Should not occur
Which of the following endpoint actions can NOT be blocked by the DLP Endpoint Enforce when sensitive information is detected?
Screen capture
Printing to a printer
Copying to a floppy disk
Copying to a USB storage device
The RSA DLP Suite requires a database. Which of the following databases can be used? (Choose two)
MySQL Version 2 and higher
Oracle 10g or higher on the DLP Network Controller
PostgreSQL pre-installed on the DLP Network Controller
Microsoft SQL 2005 on a server supplied by the customer
Sybase 12 or higher on a server supplied by the customer