Which of the following is an example of un-structured data that may be identified using Dictionaries?
A. Social Security numbers
B. Credit card numbers
C. List of diseases
D. Date of birth
Which of the following DLP features is associated with designating destinations and sources to protect?
A. Text patterns
B. Content Classification
C. Definitions
D. Dictionaries
How can DLP be used to prohibit users from sending confidential files to partners?
A. Create a partner list definition and add to applicable protection rules
B. Create a partner list and apply to device control C, Use protection rules to stop copying of confidential files
C. Prevent confidential files from being used
When detected, which of the following must be categorized with the highest severity?
A. User makes a purchase online with personal credit cards
B. User emails a copy of a spreadsheet with credit card numbers of all customers to personal email to continue work from home
C. User copies a spreadsheet with credit card numbers of all customers to an encrypted device to continue work from home
D. User files an online form and includes their own personally identifiable information
What rule prevents unauthorized executables and potential malware from running directly from Removable Storage Devices?
A. Removable Storage Protection Rule
B. Removable Storage File Access Rule
C. Removable Storage Device Rule
D. Removable Storage File Block Rule
When including local users in User Assignment Groups, are all local users evaluated equally?
A. No, local users are not authenticated with the domain.
B. Yes, permissions are equal for all local users.
C. No, local user accounts must be placed into a separate user assignment group from domain users.
D. Yes, local users must also be defined as domain users.
To meet specific requirements for managed systems in four different regions, an organization has customized several values within DLPE Agent Configuration policies. The four different Agent Configuration policies have been applied to objects in the ePO System Tree. Prior to an upgrade the four different Agent Configuration policies can be backed up through which of the following methods?
A. The DLP Policy, File, Save as feature
B. The DLP Policy, File, Export Policy to HTML feature
C. The DLP Policy, File, Synchronize Templates feature
D. The McAfee ePolicy Orchestrator Policy Catalog feature
Which of the following protocols cannot be blocked or monitored by McAfee DLP 'Network Communication Protection Rules'?
A. Secure FTP (SFTP)
B. Secure Copy (SCP)
C. Server Message Block/NetBIOS (SMB)
D. Secure Shell (SSH)
To determine baseline conditions for DLP implementation, which of the following actions can the DLP End point Administrator perform?
A. Configure database statistics
B. Run the Policy Analyzer
C. Configure backward compatibility
D. Perform testing with various groups
When configuring access controls for the Evidence repository, which of the following minimum advanced security settings need to be applied to the Evidence Folder, subfolders and files?
A. List folder / read data
B. Full control
C. Change
D. Create folders / append data
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only McAfee exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your MA0-103 exam preparations and McAfee certification application, do not hesitate to visit our Vcedump.com to find your solutions here.