A manufacturing organization needs to protect the transfer of sensitive design documents by prohibiting write access to USB devices. They do not want to limit their employee's ability to read files from these devices. To meet the organization's requirement, which type of rule can be implemented?
A. Plug and Play Device Rule
B. Removable Storage Protection Rule
C. Removable Storage Device Rule (supports Mac)
D. Removable Storage File Access Rule
DLPe application strategies, in order of decreasing security, are:
A. Editor, Explorer, Trusted, Archiver
B. Trusted, Explorer, Editor, Archiver
C. Editor, Explorer, Archiver, Trusted
D. Secure, Trusted, Editor, Allow
What is the hierarchy used to resolve potential conflicts between application strategies?
A. Archiver > Trusted > Editor > Explorer (Explorer has the lowest ranking)
B. Archiver > Trusted > Explorer > Editor (Editor has the lowest ranking)
C. Archiver > Explorer > Editor > Trusted (Trusted has the lowest ranking)
D. Archiver > Editor > Explorer > Trusted ^Trusted has the lowest ranking)
How can the use of USB drives be identified?
A. Enable plug and play device rule to monitor USB plugs
B. Enable unmanageable device classes to monitor USB plugs
C. Enable fixed hard drive rule to monitor USB plugs
D. Enable removable file storage access to monitor USB plugs
The DLP End point administrator needs to prevent sensitive data from being transmitted over FTP. Which Rule can be configured to meet this requirement?
A. File System Protection Rule
B. Cloud Protection Rule
C. Application File Access Protection Rule
D. Network Communication Protection Rule
What rule is used to block transfer of protected files sent via Google Chrome Browser?
A. Application Based Tagging Rule
B. Network Communication Protection Rule
C. File System Protection Rule
D. Web Post Protection Rule
Before upgrading to a newer version, which of the following steps should be followed?
A. Back up the ePO policy catalog for DLP
B. Uninstall management extensions
C. Uninstall current DLPe client
D. Disable unused modules
What rule is used to monitor protected file transfer to network shares?
A. Network Communication Protection Rule
B. Network Share Protection Rule
C. File System Protection Rule
D. File System Discovery Rule
Which of the following proactively helps prevent data loss?
Removable Storage Devices with a file system, when connected to a computer
A. notify the user of potential data loss.
B. send an email to the user's manager.
C. generate an incident that is reported to the security team.
D. are blocked.
How can incident data be exported?
A. Select specific events in DLP manager to export incident data
B. Run reports or queries to generate specific report and export incident data
C. Use database administration to export incident data
D. Run incident task manager to export incident data
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only McAfee exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MA0-103 exam preparations and McAfee certification application, do not hesitate to visit our Vcedump.com to find your solutions here.