050-CSEDLPS Dumps

050-CSEDLPS Braindumps 050-CSEDLPS Real Questions 050-CSEDLPS Practice Test

050-CSEDLPS Actual Questions


killexams.com


RSA


050-CSEDLPS


CSE RSA Data Loss Prevention 6.0


https://killexams.com/pass4sure/exam-detail/050-CSEDLPS


Answer: A


QUESTION: 61

What is the maximum peak traffic that the DLP Network Sensor can handle?


  1. 150 Mbps

  2. 200 Mbps

  3. 250 Mbps

  4. 350 Mbps


Answer: C


QUESTION: 62

Fred is a member of the Incident Review Group. All incidents are assigned automatically to the Incident Review Group. Fred is told that there are several hundred incidents currently in the incident review queue. Fred logs on to the Enterprise Manager using his account. What will be displayed on his screen when he selects the incident tab?


  1. Only Events that have been assigned to Fred

  2. Only incidents that have been assigned to Fred

  3. All the open events assigned to the Incident Review Group

  4. All the open incidents assigned to the Incident Review Group


Answer: B


QUESTION: 63

A sensitive word processing document is fingerprinted and added to an existing policy. Which of the following can NOT be detected by a policy that uses the document's fingerprint?


  1. Only the first two paragraphs of the document.

  2. The exact document being attached to an email

  3. A PDF file containing the content of the fingerprinted document on an end user's computer.

  4. The contents of the fingerprinted document pasted into the middle of another document that is emailed to someone outside your network.


Answer: C


QUESTION: 64

Which is of the following is NOT an option that is configured in a policy?


  1. Escalation Rules

  2. Notification Rules

  3. Incident Validity Rules

  4. Incident Handling Rules


Answer: C


QUESTION: 65

Which of the following is NOT true about the RSA DLP Suite?


  1. RSA DLP Policies can be exported

  2. RSA DLP Policies can be imported

  3. The DLP Network Appliances run the Centos Linux operating system

  4. The Endpoint Enforce Component requires the Network Controller Appliance


Answer: D


QUESTION: 66

Sensitive documents that violate policies are found in RSA DLP Datacenter grid scan on the corporate network. Incidents have been created by these violations. Which of the following is NOT a remedial action that can be performed on the sensitive documents?


  1. The documents can be deleted.

  2. The documents can be blocked

  3. The ACL of the documents may be changed.

  4. The documents can be moved to a secure location


Answer: B


QUESTION: 67

Which one of the following is NOT an option in rule grouping for described content?


  1. May occur

  2. Must occur

  3. Should occur

  4. Should not occur


Answer: C


QUESTION: 68

Which of the following endpoint actions can NOT be blocked by the DLP Endpoint Enforce when sensitive information is detected?


  1. Screen capture

  2. Printing to a printer

  3. Copying to a floppy disk

  4. Copying to a USB storage device


Answer: A


QUESTION: 69

The RSA DLP Suite requires a database. Which of the following databases can be used? (Choose two)


  1. MySQL Version 2 and higher

  2. Oracle 10g or higher on the DLP Network Controller

  3. PostgreSQL pre-installed on the DLP Network Controller

  4. Microsoft SQL 2005 on a server supplied by the customer

  5. Sybase 12 or higher on a server supplied by the customer


Answer: C, D