: RSA 050-V60X-CSEDLPS. : CSE RSA Data Loss Prevention 6.0. Version : R6.1



Similar documents
: IBM Tivoli Identity Manager V4.5 Implenentation

: HP HP Version : R6.1

A Buyer's Guide to Data Loss Protection Solutions

: HP HP0-M28. : Implementing HP Asset Manager Software. Version : R6.1

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Exam : IBM : Iseries Linux Soluton Sales v5r3

: Test 217, WebSphere Commerce V6.0. Application Development

: SDI SD0-302 : SDI - SERVICE DESK MANAGER QUALIFICATION. Version : R6.1

: HP HP0-X02. : Designing & Implementing HP Enterprise Backup Solutions. Version : R6.1

EE Easy CramBible Lab DEMO ONLY VERSION EE F5 Big-Ip v9 Local Traffic Management

Five Tips to Ensure Data Loss Prevention Success

Government of Canada Managed Security Service (GCMSS) Annex A-6: Statement of Work - Data Loss Prevention (DLP)

Information Risk Management. Alvin Ow Director, Technology Consulting Asia Pacific & Japan RSA, The Security Division of EMC

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Print Audit Facilities Manager Technical Overview

TRITON - Data Security Help

PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

A Guide to New Features in Propalms OneGate 4.0

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

Practical DLP Deployment

Exam : IBM : IBM NEDC Technical Leader. Version : R6.1

Understanding and Selecting a DLP Solution. Rich Mogull Securosis

McAfee Host Data Loss Prevention Best Practices: Protecting against data loss from external devices

RSA, The Security Division of EMC RSA Data Loss Prevention Suite v6.5. Security Target

Kaseya Server Instal ation User Guide June 6, 2008

GLS Support Guide Tips and Tricks

McAfee Data Loss Prevention 9.3.0

CA Technologies Data Protection

Enterprise Site Manager (ESM) & Administrator Console Installation / Uninstall

Easy CramBible Lab DEMO ONLY VERSION Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

Using WhatsUp IP Address Manager 1.0

Citrix 1Y0-911 Citrix Resource Manager CCEA. Version 1.0

Barracuda IM Firewall Administrator s Guide

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

BITDEFENDER SECURITY FOR AMAZON WEB SERVICES

Lync for Mac 2011 Deployment Guide

Citrix Access Gateway Plug-in for Windows User Guide

Deployment Guide. Websense TRITON AP-DATA Gateway and Discover. v8.0.x

ReadyNAS Remote Troubleshooting Guide NETGEAR

McAfee Data Protection Solutions

Installing and Configuring vcenter Support Assistant

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Network Configuration Settings

Symantec DLP Overview. Jonathan Jesse ITS Partners

Trend Micro OfficeScan Best Practice Guide for Malware

F-SECURE MESSAGING SECURITY GATEWAY

Websense Data Security Solutions

W H I T E P A P E R : T E C H N I C A L. Understanding and Configuring Symantec Endpoint Protection Group Update Providers

Trend Micro Worry- Free Business Security st time setup Tips & Tricks

vcloud Director User's Guide

Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a

CLEARPASS ONGUARD CONFIGURATION GUIDE

Data Loss Prevention. R77 Versions. Administration Guide. 5 May Classification: [Protected]

Barracuda Spam Firewall User s Guide

VMware vcenter Log Insight Getting Started Guide

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

THE EXECUTIVE GUIDE TO DATA LOSS PREVENTION. Technology Overview, Business Justification, and Resource Requirements

MICROSOFT OFFICE 365 MIGRATION 2013/05/13

Barracuda Spam Firewall

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Web Filter. SurfControl Web Filter 5.0 Installation Guide. The World s #1 Web & Filtering Company

SiteCount v2.0 Revised: 10/30/2009

How to Optimize MS Outlook Exchange Traffic Over SSL

Aspera Connect User Guide

Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions

Introduction to Endpoint Security

2X Cloud Portal v10.5

F-Secure Messaging Security Gateway. Deployment Guide

Network Agent Quick Start

RSA Event Source Configuration Guide. RSA Data Loss Prevention Suite

SOA Software API Gateway Appliance 7.1.x Administration Guide

Sophos for Microsoft SharePoint startup guide

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, Integration Guide IBM

DEMO ONLY VERSION. Easy CramBible Lab M Magento Front End Developer Certification Exam. ** Single-user License **

How To Install Caarcserve Backup Patch Manager (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

THIS SERVICE LEVEL AGREEMENT DEFINES THE SERVICE LEVELS PROVIDED TO YOU BY THE COMPANY.

RealPresence Platform Director

Comodo MyDLP Software Version 2.0. Administration Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Installation and Setup: Setup Wizard Account Information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

BlackBerry Enterprise Server Express System Requirements

KUMC Spam Firewall: Barracuda Instructions

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

WhatsUpGold. v3.0. WhatsConnected User Guide

SolarWinds. Packet Analysis Sensor Deployment Guide

Web Application Firewall

Best Practice Configurations for OfficeScan (OSCE) 10.6

TRITON - Data Security Help

Detecting rogue systems

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Deploying Virtual Cyberoam Appliance in the Amazon Cloud Version 10

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Transcription:

Exam : RSA 050-V60X-CSEDLPS Title : CSE RSA Data Loss Prevention 6.0 Version : R6.1

Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go to 2.Click on Member zone/log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@prepking.com.

1. Which of the following components is required to monitor/block HTTPS traffic in DLP Network? A. Span Port B. Bluecoat Proxy C. Network Sensor D. Network Controller 2. Incidents that are created as the result of RSA DLP agent scan on an end user's computer will be categorized as Datacenter Incidents. 3. RSA DLP Endpoint Enforce uses the same infrastructure as RSA DLP Endpoint Discovery. 4. Any ICAP client Proxy server can communicate with the ICAPserver by default. Which configuration file is used to limit which Client proxy can connect to the ICAPserver appliance? A. ICAP.cnf B. ICAP.conf C. proxy.conf D. c-icap.conf 5. Which of the following is NOT a component of the RSA DLP Suite? A. Network B. Endpoint C. Filesystem

D. Datacenter Answer: C 6. The RBC Company is performing datacenter scans on file shares within the corporate network. The scans are permanent scans. Which of the following would require clearing the results of the previous scan and performing a new complete scan? A. New Grid Workers B. New Grid Scan Group C. New content blade in policy D. Change of Operating System Answer: C 7. A Linux based version of the DLP Enterprise Coordinator is installed on the RSA DLP Network controller. 8. Which of the following is NOT available as an option in Incident handling rules for DLP Network or Datacenter? A. Quarantine end user action B. Assign Incident to User or Group C. Set incident severity to a different setting D. Automatically close an incident if severity level is low 9. Which appliance can be set in scan and tag mode A. Network Sensor B. Network Controller C. Network Interceptor D. Network ICAPserver

Answer: C 10. DLP network can decompress files that are compressed and analyze the contents of compressed files. What is the maximum number of times, a file can be compressed before the e system cannot handle the decompression/analysis of an attachment or transmission. A. 20 levels of compression B. 50 levels of compression C. 75 levels of compression D. 100 level of compression 11. Documents that contain sensitive information that violate policy are detected on an end user computer are classified as what type of events/incidents? A. DLP incidents and events B. Network incidents and events C. Endpoint incidents and events D. Datacenter incidents and events 12. Which of the following is NOT a troubleshooting program that comes with the DLP Network? A. Subnets B. ICAPstats C. checkrelay D. checkreply 13. The RSA DLP Network Sensor has to have access to an entire TCP transmission. If only a partial transmission is captured, the session is not analyzed.

14. Which two RSA DLP network appliances could detect employee posting company confidential information to an online web forum? (Choose two) A. DLP Network Sensor B. Described Information C. DLP Network Controller D. DLP Network ICAPserver E. Company Confidential Content Blade Template D 15. A user can view and modify the Expert content blades that are included with the DLP Suite, to improve their detection capabilities. 16. The Bluecoat proxy server from Bluecoat is an optional component that must be used to monitor http traffic. 17. A single policy can be used to detect the same sensitive information that is transmitted to a source outside the company network, information saved in a.pdf file on a SharePoint on the network file server, and a excel spreadsheet on an end user's laptop.

18. Outlook personal storage files (.PST) can be searched by a RSA Datacenter or Endpoint scan? 19. When you create a new policy (Not from templates) the policy is already configured with content blades and has incident handling and notifications options set appropriately and do not require any configuration. 20. An endpoint scan is run on Dave's laptop. The following is found: 10 occurrences of PII 15 occurrences of company confidential documents 20 customer records that contain credit card numbers or social security numbers. How many incidents will be reported by the DLP Suite? A. 1 B. 10 C. 15 D. 20 E. We cannot determine that from the information provided. It depends on the policy settings. 21. What is the maximum number of Site Coordinators allowed per Enterprise Coordinator? A. 1 B. 50 C. 1000 D. 2000

22. Which of the following is NOT a component of the RSA DLP Network? A. Sensor B. Controller C. Interceptor D. ICAPserver E. Enterprise Coordinator Answer: E 23. Which of the following can NOT be detected by a properly configured policy using RSA DLP suite? A. Employee Medical records on a network file share B. Customer names and credit cards on an employee's home computer C. An employee emailing confidential corporate financial records through Yahoo web mail D. Transmission of customer names, and social security numbers through AIM instant messenger 24. What is the best definition of "Precision" as it relates to creating DLP Policies? A. Precision is identifying all content in a category B. Precision is identifying only the relevant content in a category C. Precision involves correctly finding who sent the transmission D. Precision involves notifying only the appropriate personnel on creation of an incident 25. Which of the following are not used for detecting sensitive content? (Choose two) A. Entities B. Dictionaries C. End user Fingerprint D. Regular Expressions E. File Security Manager Answer: CE

26. Which Component of RSA DLP would generate an incident that contained client and server MAC addresses? A. DLP Sensor B. DLP Controller C. DLP Interceptor D. DLP ICAPserver 27. Which of the following is not a supported implementation of the DLP SUITE? A. DLP Interceptor and Endpoint B. DLP Endpoint and DLP Datacenter C. DLP Network and DLP Datacenter D. DLP Network and DLP Endpoint Enforce 28. Which of the following is NOT a factor when creating content rules? A. Counts B. Weighting C. Exclusion Rules D. Correct Spelling and Grammar 29. How close to each other must the matches occur in a document is the definition of: A. Weights B. Proximity C. Rule thresholds D. Score Thresholds 30. Which of the RSA DLP Network Appliances can have quarantine as an available policy action?

A. RSA Datacenter gridworker B. RSA DLP Network Interceptor C. RSA DLP Network ICAPserver D. RSA DLP Enterprise Manager 31. What is external cache as it relates to the RSA DLP SUITE? A. The results from the last scan of a target file share or endpoint B. Area of memory that holds fingerprinted documents. This speeds up the process of scanning C. A holding area on the interceptor appliance that holds the most frequently used email attachments D. An optional add-on hardware option for the Sensor appliance to enable it speed up content analysis 32. A user attempts an action with a sensitive document that violates RSA DLP Policy. Which of the following actions could NOT be blocked by RSA DLP Endpoint Enforce? A. User prints the document B. User copies file to MP3 player C. User copies document to a floppy drive D. User transmits file to another device via Bluetooth 33. Which of the following is NOT an action that can be used on incidents in the incidents queue? A. Start B. Close C. Assign D. Suspend 34. X-Headers are added to web page requesting going through the ICAPserver. These X-headers can be used for troubleshooting by looking at the source of a web page that has gone through the ICAPserver.

100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/050-v60x-csedlps.htm