050-CSEDLPS Dumps 050-CSEDLPS Braindumps 050-CSEDLPS Real Questions 050-CSEDLPS Practice Test 050-CSEDLPS Actual Questions RSA 050-CSEDLPS CSE RSA Data Loss Prevention 6.0 https://killexams.com/pass4sure/exam-detail/050-CSEDLPS Answer: A QUESTION: 61 What is the maximum peak traffic that the DLP Network Sensor can handle? A. 150 Mbps B. 200 Mbps C. 250 Mbps D. 350 Mbps Answer: C QUESTION: 62 Fred is a member of the Incident Review Group. All incidents are assigned automatically to the Incident Review Group. Fred is told that there are several hundred incidents currently in the incident review queue. Fred logs on to the Enterprise Manager using his account. What will be displayed on his screen when he selects the incident tab? A. Only Events that have been assigned to Fred B. Only incidents that have been assigned to Fred C. All the open events assigned to the Incident Review Group D. All the open incidents assigned to the Incident Review Group Answer: B QUESTION: 63 A sensitive word processing document is fingerprinted and added to an existing policy. Which of the following can NOT be detected by a policy that uses the document's fingerprint? A. Only the first two paragraphs of the document. B. The exact document being attached to an email C. A PDF file containing the content of the fingerprinted document on an end user's computer. D. The contents of the fingerprinted document pasted into the middle of another document that is emailed to someone outside your network. Answer: C QUESTION: 64 17 Which is of the following is NOT an option that is configured in a policy? A. Escalation Rules B. Notification Rules C. Incident Validity Rules D. Incident Handling Rules Answer: C QUESTION: 65 Which of the following is NOT true about the RSA DLP Suite? A. RSA DLP Policies can be exported B. RSA DLP Policies can be imported C. The DLP Network Appliances run the Centos Linux operating system D. The Endpoint Enforce Component requires the Network Controller Appliance Answer: D QUESTION: 66 Sensitive documents that violate policies are found in RSA DLP Datacenter grid scan on the corporate network. Incidents have been created by these violations. Which of the following is NOT a remedial action that can be performed on the sensitive documents? A. The documents can be deleted. B. The documents can be blocked C. The ACL of the documents may be changed. D. The documents can be moved to a secure location Answer: B QUESTION: 67 Which one of the following is NOT an option in rule grouping for described content? A. May occur B. Must occur C. Should occur D. Should not occur Answer: C 18 QUESTION: 68 Which of the following endpoint actions can NOT be blocked by the DLP Endpoint Enforce when sensitive information is detected? A. Screen capture B. Printing to a printer C. Copying to a floppy disk D. Copying to a USB storage device Answer: A QUESTION: 69 The RSA DLP Suite requires a database. Which of the following databases can be used? (Choose two) A. MySQL Version 2 and higher B. Oracle 10g or higher on the DLP Network Controller C. PostgreSQL pre-installed on the DLP Network Controller D. Microsoft SQL 2005 on a server supplied by the customer E. Sybase 12 or higher on a server supplied by the customer Answer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