Exam : RSA 050-V60X-CSEDLPS Title : CSE RSA Data Loss Prevention 6.0 Version : R6.1
Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go to 2.Click on Member zone/log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@prepking.com.
1. Which of the following components is required to monitor/block HTTPS traffic in DLP Network? A. Span Port B. Bluecoat Proxy C. Network Sensor D. Network Controller 2. Incidents that are created as the result of RSA DLP agent scan on an end user's computer will be categorized as Datacenter Incidents. 3. RSA DLP Endpoint Enforce uses the same infrastructure as RSA DLP Endpoint Discovery. 4. Any ICAP client Proxy server can communicate with the ICAPserver by default. Which configuration file is used to limit which Client proxy can connect to the ICAPserver appliance? A. ICAP.cnf B. ICAP.conf C. proxy.conf D. c-icap.conf 5. Which of the following is NOT a component of the RSA DLP Suite? A. Network B. Endpoint C. Filesystem
D. Datacenter Answer: C 6. The RBC Company is performing datacenter scans on file shares within the corporate network. The scans are permanent scans. Which of the following would require clearing the results of the previous scan and performing a new complete scan? A. New Grid Workers B. New Grid Scan Group C. New content blade in policy D. Change of Operating System Answer: C 7. A Linux based version of the DLP Enterprise Coordinator is installed on the RSA DLP Network controller. 8. Which of the following is NOT available as an option in Incident handling rules for DLP Network or Datacenter? A. Quarantine end user action B. Assign Incident to User or Group C. Set incident severity to a different setting D. Automatically close an incident if severity level is low 9. Which appliance can be set in scan and tag mode A. Network Sensor B. Network Controller C. Network Interceptor D. Network ICAPserver
Answer: C 10. DLP network can decompress files that are compressed and analyze the contents of compressed files. What is the maximum number of times, a file can be compressed before the e system cannot handle the decompression/analysis of an attachment or transmission. A. 20 levels of compression B. 50 levels of compression C. 75 levels of compression D. 100 level of compression 11. Documents that contain sensitive information that violate policy are detected on an end user computer are classified as what type of events/incidents? A. DLP incidents and events B. Network incidents and events C. Endpoint incidents and events D. Datacenter incidents and events 12. Which of the following is NOT a troubleshooting program that comes with the DLP Network? A. Subnets B. ICAPstats C. checkrelay D. checkreply 13. The RSA DLP Network Sensor has to have access to an entire TCP transmission. If only a partial transmission is captured, the session is not analyzed.
14. Which two RSA DLP network appliances could detect employee posting company confidential information to an online web forum? (Choose two) A. DLP Network Sensor B. Described Information C. DLP Network Controller D. DLP Network ICAPserver E. Company Confidential Content Blade Template D 15. A user can view and modify the Expert content blades that are included with the DLP Suite, to improve their detection capabilities. 16. The Bluecoat proxy server from Bluecoat is an optional component that must be used to monitor http traffic. 17. A single policy can be used to detect the same sensitive information that is transmitted to a source outside the company network, information saved in a.pdf file on a SharePoint on the network file server, and a excel spreadsheet on an end user's laptop.
18. Outlook personal storage files (.PST) can be searched by a RSA Datacenter or Endpoint scan? 19. When you create a new policy (Not from templates) the policy is already configured with content blades and has incident handling and notifications options set appropriately and do not require any configuration. 20. An endpoint scan is run on Dave's laptop. The following is found: 10 occurrences of PII 15 occurrences of company confidential documents 20 customer records that contain credit card numbers or social security numbers. How many incidents will be reported by the DLP Suite? A. 1 B. 10 C. 15 D. 20 E. We cannot determine that from the information provided. It depends on the policy settings. 21. What is the maximum number of Site Coordinators allowed per Enterprise Coordinator? A. 1 B. 50 C. 1000 D. 2000
22. Which of the following is NOT a component of the RSA DLP Network? A. Sensor B. Controller C. Interceptor D. ICAPserver E. Enterprise Coordinator Answer: E 23. Which of the following can NOT be detected by a properly configured policy using RSA DLP suite? A. Employee Medical records on a network file share B. Customer names and credit cards on an employee's home computer C. An employee emailing confidential corporate financial records through Yahoo web mail D. Transmission of customer names, and social security numbers through AIM instant messenger 24. What is the best definition of "Precision" as it relates to creating DLP Policies? A. Precision is identifying all content in a category B. Precision is identifying only the relevant content in a category C. Precision involves correctly finding who sent the transmission D. Precision involves notifying only the appropriate personnel on creation of an incident 25. Which of the following are not used for detecting sensitive content? (Choose two) A. Entities B. Dictionaries C. End user Fingerprint D. Regular Expressions E. File Security Manager Answer: CE
26. Which Component of RSA DLP would generate an incident that contained client and server MAC addresses? A. DLP Sensor B. DLP Controller C. DLP Interceptor D. DLP ICAPserver 27. Which of the following is not a supported implementation of the DLP SUITE? A. DLP Interceptor and Endpoint B. DLP Endpoint and DLP Datacenter C. DLP Network and DLP Datacenter D. DLP Network and DLP Endpoint Enforce 28. Which of the following is NOT a factor when creating content rules? A. Counts B. Weighting C. Exclusion Rules D. Correct Spelling and Grammar 29. How close to each other must the matches occur in a document is the definition of: A. Weights B. Proximity C. Rule thresholds D. Score Thresholds 30. Which of the RSA DLP Network Appliances can have quarantine as an available policy action?
A. RSA Datacenter gridworker B. RSA DLP Network Interceptor C. RSA DLP Network ICAPserver D. RSA DLP Enterprise Manager 31. What is external cache as it relates to the RSA DLP SUITE? A. The results from the last scan of a target file share or endpoint B. Area of memory that holds fingerprinted documents. This speeds up the process of scanning C. A holding area on the interceptor appliance that holds the most frequently used email attachments D. An optional add-on hardware option for the Sensor appliance to enable it speed up content analysis 32. A user attempts an action with a sensitive document that violates RSA DLP Policy. Which of the following actions could NOT be blocked by RSA DLP Endpoint Enforce? A. User prints the document B. User copies file to MP3 player C. User copies document to a floppy drive D. User transmits file to another device via Bluetooth 33. Which of the following is NOT an action that can be used on incidents in the incidents queue? A. Start B. Close C. Assign D. Suspend 34. X-Headers are added to web page requesting going through the ICAPserver. These X-headers can be used for troubleshooting by looking at the source of a web page that has gone through the ICAPserver.
100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/050-v60x-csedlps.htm