Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which setting on an ICAP server would specify to allow transmissions after a server time out?

A.

Audit

B.

Allow

C.

Fail Open

D.

Fail Closed

What is the minimum number of credential sets required to complete the RSA DLP Datacenter configuration?

A.

0

B.

1

C.

2

D.

4

Which statement is correct concerning the default search behavior of the RSA DLP Enterprise Manager when displaying incidents and events?

A.

By default, the Enterprise Manager displays only DLP Network incidents

B.

By default, the Enterprise Manager does not display any incidents or events

C.

By default, the Enterprise Manager displays all incidents and events, regardless of login ID

D.

By default, the Enterprise Manager only displays incidents and events that are assigned to the login ID of the user currently logged in

Credentials allow an RSA DLP user to store authentication information, removing the need to re-enter the same login and password multiple times within the RSA DLP Enterprise Manager. What parameter is used to identify who can use a particular credential?

A.

The role(s) assigned to the credential

B.

The user ID assigned to the credential

C.

The login ID assigned to the credential

D.

The group ID assigned to the credential

Where should an RSA DLP Network Interceptor be deployed within the network?

A.

Between each DMZ

B.

Outside of the firewall

C.

At each network egress point

D.

The next hop after a corporate mail server

Which RSA DLP component is used to manage and update the appliances within a DLP Network deployment?

A.

Sensor

B.

Interceptor

C.

Network Controller

D.

Enterprise Coordinator

Which of the following is correct concerning the initial design of an RSA DLP Datacenter deployment?

A.

Start by scanning all file shares and potential computers

B.

Only involve the customer once the design has been completed

C.

Start with a single file share or small group of computers to scan as a test

D.

Only engage the customer once the final design has been fully tested and deployed

Based on the fact that remediation actions for RSA DLP Datacenter are handled by the Enterprise Coordinator, what would be the first step to take if remediation actions are failing for a grid scan?

A.

Reboot the Site Coordinator

B.

Reboot the Enterprise Coordinator

C.

Restart the RSA DLP Enterprise Manager services

D.

Verify that the Enterprise Coordinator has the same access and permissions to the files being scanned as the Site Coordinator

Which RSA DLP Endpoint remediation action will prompt the user to explain an action that triggered a violation?

A.

Audit

B.

Block and audit

C.

Notify and audit

D.

Justify and audit

Which RSA DLP component is installed at network boundaries to passively monitor network traffic?

A.

Sensor

B.

Controller

C.

Interceptor

D.

ICAP server