What should the administrator do to work around the password problem?

Correct Answer for the Question – What should the administrator do to work around the password problem? is given below What should the administrator do to work around the password problem? Apply a new global agent uninstall password in the Enforce management console. Manually delete all the Endpoint agent files from the test computer and install … Read more

What could be causing only incident data smaller than 1MB to persist while incidents larger than 1MB change to .BAD files?

Correct Answer for the Question – What could be causing only incident data smaller than 1MB to persist while incidents larger than 1MB change to .BAD files? is given below What could be causing only incident data smaller than 1MB to persist while incidents larger than 1MB change to .BAD files? A corrupted policy was deployed. … Read more

What should an incident responder select in the Enforce management console to remediate multiple incidents simultaneously?

Correct Answer for the Question – What should an incident responder select in the Enforce management console to remediate multiple incidents simultaneously? is given below What should an incident responder select in the Enforce management console to remediate multiple incidents simultaneously? Smart Response on the Incident page Automated Response on the Incident Snapshot page Smart Response … Read more

Which service encrypts the message when using a Modify SMTP Message response rule?

Correct Answer for the Question – Which service encrypts the message when using a Modify SMTP Message response rule? is given below Which service encrypts the message when using a Modify SMTP Message response rule? Network Monitor server SMTP Prevent Enforce server Encryption Gateway Correct Answer The Correct Answer for this Question is Encryption Gateway Explanation … Read more

Where should an administrator set the debug levels for an Endpoint Agent?

Correct Answer for the Question – Where should an administrator set the debug levels for an Endpoint Agent? is given below Where should an administrator set the debug levels for an Endpoint Agent? Setting the log level within the Agent List Advanced configuration within the Agent settings Setting the log level within the Agent Overview Advanced … Read more

How should a DLP administrator exclude a custom endpoint application named “custom_app.exe” from being monitoring by Application File Access Control?

Correct Answer for the Question – How should a DLP administrator exclude a custom endpoint application named “custom_app.exe” from being monitoring by Application File Access Control? is given below How should a DLP administrator exclude a custom endpoint application named “custom_app.exe” from being monitoring by Application File Access Control? Add “custom_app.exe” to the “Application Whitelist” on … Read more

Which feature should a third party component integrate with to provide dynamic reporting, create custom incident remediation processes, or support business processes?

Correct Answer for the Question – Which feature should a third party component integrate with to provide dynamic reporting, create custom incident remediation processes, or support business processes? is given below Which feature should a third party component integrate with to provide dynamic reporting, create custom incident remediation processes, or support business processes? Export incidents using … Read more

What is the default fallback option for the Endpoint Prevent Encrypt response rule?

Correct Answer for the Question – What is the default fallback option for the Endpoint Prevent Encrypt response rule? is given below What is the default fallback option for the Endpoint Prevent Encrypt response rule? Block User Cancel Encrypt Notify Correct Answer The Correct Answer for this Question is Notify Explanation The Question – What is … Read more

Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed?

Correct Answer for the Question – Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was removed? is given below Which product is able to replace a confidential document residing on a file share with a marker file explaining why the document was … Read more

How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has detected a “copy to USB device” operation?

Correct Answer for the Question – How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has detected a “copy to USB device” operation? is given below How should a DLP administrator change a policy so that it retains the original file when an endpoint incident has … Read more