You are on page 1of 11

Exam Title :

: RSA 050-V60X-CSEDLPS CSE RSA Data Loss Prevention 6.0

Version : R6.1

www.Prepking.com

Prepking - King of Computer Certification Important Information, Please Read Carefully


Other Prepking products A) Offline Testing engine Use the offline Testing engine product to practice the questions in an exam environment. B) Study Guide (not available for all exams) Build a foundation of knowledge which will be useful also after passing the exam. Latest Version We are constantly reviewing our products. New material is added and old material is updated. Free updates are available for 90 days after the purchase. You should check your member zone at Prepking and update 3-4 days before the scheduled exam date. Here is the procedure to get the latest version: 1.Go towww.Prepking.com 2.Click on Member zone/Log in (right side) 3. Then click My Account 4.The latest versions of all purchased products are downloadable from here. Just click the links. For most updates,it is enough just to print the new questions at the end of the new version, not the whole document. Feedback If you spot a possible improvement then please let us know. We always interested in improving product quality. Feedback should be send to feedback@Prepking.com. You should include the following: Exam number, version, page number, question number, and your login ID. Our experts will answer your mail promptly. Copyright Each PDF file contains a unique serial number associated with your particular name and contact information for security purposes. So if we find out that a particular PDF file is being distributed by you, Prepking reserves the right to take legal action against you according to the International Copyright Laws. Explanations This product does not include explanations at the moment. If you are interested in providing explanations for this exam, please contact feedback@Prepking.com.

www.Prepking.com

1. Which of the following components is required to monitor/block HTTPS traffic in DLP Network? A. Span Port B. Bluecoat Proxy C. Network Sensor D. Network Controller Answer: B

2. Incidents that are created as the result of RSA DLP agent scan on an end user's computer will be categorized as Datacenter Incidents. A. True B. False Answer: A

3. RSA DLP Endpoint Enforce uses the same infrastructure as RSA DLP Endpoint Discovery. A. True B. False Answer: A

4. Any ICAP client Proxy server can communicate with the ICAPserver by default. Which configuration file is used to limit which Client proxy can connect to the ICAPserver appliance? A. ICAP.cnf B. ICAP.conf C. proxy.conf D. c-ICAP.conf Answer: D

5. Which of the following is NOT a component of the RSA DLP Suite? A. Network B. Endpoint C. Filesystem

www.Prepking.com

D. Datacenter Answer: C

6. The RBC Company is performing datacenter scans on file shares within the corporate network. The scans are permanent scans. Which of the following would require clearing the results of the previous scan

and performing a new complete scan? A. New Grid Workers B. New Grid Scan Group C. New content blade in policy D. Change of Operating System Answer: C

7. A Linux based version of the DLP Enterprise Coordinator is installed on the RSA DLP Network controller. A. True B. False Answer: B

8. Which of the following is NOT available as an option in Incident handling rules for DLP Network or Datacenter? A. Quarantine end user action B. Assign Incident to User or Group C. Set incident severity to a different setting D. Automatically close an incident if severity level is low Answer: A

9. Which appliance can be set in scan and tag mode A. Network Sensor B. Network Controller C. Network Interceptor D. Network ICAPserver

www.Prepking.com

Answer: C

10. DLP network can decompress files that are compressed and analyze the contents of compressed files. What is the maximum number of times, a file can be compressed before the e system cannot handle the decompression/analysis of an attachment or transmission. A. 20 levels of compression B. 50 levels of compression C. 75 levels of compression D. 100 level of compression Answer: A

11. Documents that contain sensitive information that violate policy are detected on an end user computer are classified as what type of events/incidents? A. DLP incidents and events B. Network incidents and events C. Endpoint incidents and events D. Datacenter incidents and events Answer: D

12. Which of the following is NOT a troubleshooting program that comes with the DLP Network? A. Subnets B. ICAPstats C. checkrelay D. checkreply Answer: D

13. The RSA DLP Network Sensor has to have access to an entire TCP transmission. transmission is captured, the session is not analyzed. A. True B. False

If only a partial

www.Prepking.com

Answer: A

14. Which two RSA DLP network appliances could detect employee posting company confidential information to an online web forum? A. DLP Network Sensor B. Described Information C. DLP Network Controller D. DLP Network ICAPserver E. Company Confidential Content Blade Template Answer: AD (Choose two)

15. A user can view and modify the Expert content blades that are included with the DLP Suite, to improve their detection capabilities. A. True B. False Answer: B

16. The Bluecoat proxy server from Bluecoat is an optional component that must be used to monitor http traffic. A. True B. False Answer: B

17. A single policy can be used to detect the same sensitive information that is transmitted to a source outside the company network, information saved in a .PDF file on a SharePoint on the network file server, and a excel spreadsheet on an end user's laptop. A. True B. False Answer: A

www.Prepking.com

18. Outlook personal storage files (.PST) can be searched by a RSA Datacenter or Endpoint scan? A. True B. False Answer: A

19. When you create a new policy (Not from templates) the policy is already configured with content blades and has incident handling and notifications options set appropriately and do not require any configuration. A. True B. False Answer: B

20. An endpoint scan is run on Dave's laptop. The following is found: 10 occurrences of PII 15 occurrences of company confidential documents 20 customer records that contain credit card numbers or social security numbers. How many incidents will be reported by the DLP Suite? A. 1 B. 10 C. 15 D. 20 E. We cannot determine that from the information provided. It depends on the policy settings. Answer: A

21. What is the maximum number of Site Coordinators allowed per Enterprise Coordinator? A. 1 B. 50 C. 1000 D. 2000 Answer: B

www.Prepking.com

22. Which of the following is NOT a component of the RSA DLP Network? A. Sensor B. Controller C. Interceptor D. ICAPserver E. Enterprise Coordinator Answer: E

23. Which of the following can NOT be detected by a properly configured policy using RSA DLP suite? A. Employee Medical records on a network file share B. Customer names and credit cards on an employee's home computer C. An employee emailing confidential corporate financial records through Yahoo web mail D. Transmission of customer names, and social security numbers through AIM instant messenger Answer: B

24. What is the best definition of "Precision" as it relates to creating DLP Policies? A. Precision is identifying all content in a category B. Precision is identifying only the relevant content in a category C. Precision involves correctly finding who sent the transmission D. Precision involves notifying only the appropriate personnel on creation of an incident Answer: B

25. Which of the following are not used for detecting sensitive content? A. Entities B. Dictionaries C. End user Fingerprint D. Regular Expressions E. File Security Manager Answer: CE

(Choose two)

www.Prepking.com

26. Which Component of RSA DLP would generate an incident that contained client and server MAC addresses? A. DLP Sensor B. DLP Controller C. DLP Interceptor D. DLP ICAPserver Answer: A

27. Which of the following is not a supported implementation of the DLP SUITE? A. DLP Interceptor and Endpoint B. DLP Endpoint and DLP Datacenter C. DLP Network and DLP Datacenter D. DLP Network and DLP Endpoint Enforce Answer: A

28. Which of the following is NOT a factor when creating content rules? A. Counts B. Weighting C. Exclusion Rules D. Correct Spelling and Grammar Answer: D

29. How close to each other must the matches occur in a document is the definition of: A. Weights B. Proximity C. Rule thresholds D. Score Thresholds Answer: B

30. Which of the RSA DLP Network Appliances can have quarantine as an available policy action?

www.Prepking.com

A. RSA Datacenter gridworker B. RSA DLP Network Interceptor C. RSA DLP Network ICAPserver D. RSA DLP Enterprise Manager Answer: B

31. What is external cache as it relates to the RSA DLP SUITE? A. The results from the last scan of a target file share or endpoint B. Area of memory that holds fingerprinted documents. This speeds up the process of scanning C. A holding area on the interceptor appliance that holds the most frequently used email attachments D. An optional add-on hardware option for the Sensor appliance to enable it speed up content analysis Answer: A

32. A user attempts an action with a sensitive document that violates RSA DLP Policy. Which of the following actions could NOT be blocked by RSA DLP Endpoint Enforce? A. User prints the document B. User copies file to MP3 player C. User copies document to a floppy drive D. User transmits file to another device via Bluetooth Answer: D

33. Which of the following is NOT an action that can be used on incidents in the incidents queue? A. Start B. Close C. Assign D. Suspend Answer: D

34. X-Headers are added to web page requesting going through the ICAPserver.

These X-headers can be

used for troubleshooting by looking at the source of a web page that has gone through the ICAPserver.

www.Prepking.com

100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test Buy full version of exam from this link below http://www.prepking.com/050-V60X-CSEDLPS.htm

You might also like