Upload
simon345
View
216
Download
0
Embed Size (px)
Citation preview
8/6/2019 Prepking 050-V60X-CSEDLPS Exam Questions
http://slidepdf.com/reader/full/prepking-050-v60x-csedlps-exam-questions 1/11
www.Prepking.com
Exam : RSA 050-V60X-CSEDLPS
Title : CSE RSA Data Loss
Prevention 6.0
Version : R6.1
8/6/2019 Prepking 050-V60X-CSEDLPS Exam Questions
http://slidepdf.com/reader/full/prepking-050-v60x-csedlps-exam-questions 2/11
www.Prepking.com
Prepking - King of Computer Certification
Important Information, Please Read Carefully
Other Prepking products
A) Offline Testing engine
Use the offline Testing engine product to practice the questions in an exam environment.
B) Study Guide (not available for all exams)
Build a foundation of knowledge which will be useful also after passing the exam.
Latest Version
We are constantly reviewing our products. New material is added and old material is
updated. Free updates are available for 90 days after the purchase. You should check your
member zone at Prepking and update 3-4 days before the scheduled exam date.
Here is the procedure to get the latest version:
1.Go towww.Prepking.com
2.Click on Member zone/Log in (right side)
3. Then click My Account
4.The latest versions of all purchased products are downloadable from here. Just click the
links.
For most updates,it is enough just to print the new questions at the end of the new version, not the whole
document.
Feedback
If you spot a possible improvement then please let us know. We always interested in
improving product quality.
Feedback should be send to [email protected]. You should include the following:
Exam number, version, page number, question number, and your login ID.
Our experts will answer your mail promptly.
Copyright
Each PDF file contains a unique serial number associated with your particular name and
contact information for security purposes. So if we find out that a particular PDF file is
being distributed by you, Prepking reserves the right to take legal action against you
according to the International Copyright Laws.
Explanations
This product does not include explanations at the moment. If you are interested in
providing explanations for this exam, please contact [email protected].
8/6/2019 Prepking 050-V60X-CSEDLPS Exam Questions
http://slidepdf.com/reader/full/prepking-050-v60x-csedlps-exam-questions 3/11
www.Prepking.com
1. Which of the following components is required to monitor/block HTTPS traffic in DLP Network?
A. Span Port
B. Bluecoat Proxy
C. Network Sensor
D. Network Controller
Answer: B
2. Incidents that are created as the result of RSA DLP agent scan on an end user's computer will be
categorized as Datacenter Incidents.
A. True
B. False
Answer:A
3. RSA DLP Endpoint Enforce uses the same infrastructure as RSA DLP Endpoint Discovery.
A. True
B. False
Answer:A
4. Any ICAP client Proxy server can communicate with the ICAPserver by default. Which configuration file
is used to limit which Client proxy can connect to the ICAPserver appliance?
A. ICAP.cnf
B. ICAP.conf
C. proxy.conf
D. c-ICAP.conf
Answer: D
5. Which of the following is NOT a component of the RSA DLP Suite?
A. Network
B. Endpoint
C. Filesystem
8/6/2019 Prepking 050-V60X-CSEDLPS Exam Questions
http://slidepdf.com/reader/full/prepking-050-v60x-csedlps-exam-questions 4/11
www.Prepking.com
D. Datacenter
Answer: C
6. The RBC Company is performing datacenter scans on file shares within the corporate network. The
scans are permanent scans. Which of the following would require clearing the results of the previous scan
and performing a new complete scan?
A. New Grid Workers
B. New Grid Scan Group
C. New content blade in policy
D. Change of Operating System
Answer:C
7. A Linux based version of the DLP Enterprise Coordinator is installed on the RSA DLP Network controller.
A. True
B. False
Answer: B
8. Which of the following is NOT available as an option in Incident handling rules for DLP Network or
Datacenter?
A. Quarantine end user action
B. Assign Incident to User or Group
C. Set incident severity to a different setting
D. Automatically close an incident if severity level is low
Answer:A
9. Which appliance can be set in scan and tag mode
A. Network Sensor
B. Network Controller
C. Network Interceptor
D. Network ICAPserver
8/6/2019 Prepking 050-V60X-CSEDLPS Exam Questions
http://slidepdf.com/reader/full/prepking-050-v60x-csedlps-exam-questions 5/11
www.Prepking.com
Answer: C
10. DLP network can decompress files that are compressed and analyze the contents of compressed files.
What is the maximum number of times, a file can be compressed before the e system cannot handle the
decompression/analysis of an attachment or transmission.
A. 20 levels of compression
B. 50 levels of compression
C. 75 levels of compression
D. 100 level of compression
Answer:A
11. Documents that contain sensitive information that violate policy are detected on an end user computer
are classified as what type of events/incidents?
A. DLP incidents and events
B. Network incidents and events
C. Endpoint incidents and events
D. Datacenter incidents and events
Answer: D
12. Which of the following is NOT a troubleshooting program that comes with the DLP Network?
A. Subnets
B. ICAPstats
C. checkrelay
D. checkreply
Answer: D
13. The RSA DLP Network Sensor has to have access to an entire TCP transmission. If only a partial
transmission is captured, the session is not analyzed.
A. True
B. False
8/6/2019 Prepking 050-V60X-CSEDLPS Exam Questions
http://slidepdf.com/reader/full/prepking-050-v60x-csedlps-exam-questions 6/11
www.Prepking.com
Answer:A
14. Which two RSA DLP network appliances could detect employee posting company confidential
information to an online web forum? (Choose two)
A. DLP Network Sensor
B. Described Information
C. DLP Network Controller
D. DLP Network ICAPserver
E. Company Confidential Content Blade Template
Answer:AD
15. A user can view and modify the Expert content blades that are included with the DLP Suite, to improve
their detection capabilities.
A. True
B. False
Answer: B
16. The Bluecoat proxy server from Bluecoat is an optional component that must be used to monitor http
traffic.
A. True
B. False
Answer: B
17. A single policy can be used to detect the same sensitive information that is transmitted to a source
outside the company network, information saved in a .PDF file on a SharePoint on the network file server,
and a excel spreadsheet on an end user's laptop.
A. True
B. False
Answer:A
8/6/2019 Prepking 050-V60X-CSEDLPS Exam Questions
http://slidepdf.com/reader/full/prepking-050-v60x-csedlps-exam-questions 7/11
www.Prepking.com
18. Outlook personal storage files (.PST) can be searched by a RSA Datacenter or Endpoint scan?
A. True
B. False
Answer:A
19. When you create a new policy (Not from templates) the policy is already configured with content blades
and has incident handling and notifications options set appropriately and do not require any configuration.
A. True
B. False
Answer: B
20. An endpoint scan is run on Dave's laptop. The following is found:
10 occurrences of PII
15 occurrences of company confidential documents
20 customer records that contain credit card numbers or social security numbers.
How many incidents will be reported by the DLP Suite?
A. 1
B. 10
C. 15
D. 20
E. We cannot determine that from the information provided. It depends on the policy settings.
Answer:A
21. What is the maximum number of Site Coordinators allowed per Enterprise Coordinator?
A. 1
B. 50
C. 1000
D. 2000
Answer: B
8/6/2019 Prepking 050-V60X-CSEDLPS Exam Questions
http://slidepdf.com/reader/full/prepking-050-v60x-csedlps-exam-questions 8/11
www.Prepking.com
22. Which of the following is NOT a component of the RSA DLP Network?
A. Sensor
B. Controller
C. Interceptor
D. ICAPserver
E. Enterprise Coordinator
Answer: E
23. Which of the following can NOT be detected by a properly configured policy using RSA DLP suite?
A. Employee Medical records on a network file share
B. Customer names and credit cards on an employee's home computer
C. An employee emailing confidential corporate financial records through Yahoo web mail
D. Transmission of customer names, and social security numbers through AIM instant messenger
Answer: B
24. What is the best definition of "Precision" as it relates to creating DLP Policies?
A. Precision is identifying all content in a category
B. Precision is identifying only the relevant content in a category
C. Precision involves correctly finding who sent the transmission
D. Precision involves notifying only the appropriate personnel on creation of an incident
Answer: B
25. Which of the following are not used for detecting sensitive content? (Choose two)
A. Entities
B. Dictionaries
C. End user Fingerprint
D. Regular Expressions
E. File Security Manager
Answer: CE
8/6/2019 Prepking 050-V60X-CSEDLPS Exam Questions
http://slidepdf.com/reader/full/prepking-050-v60x-csedlps-exam-questions 9/11
www.Prepking.com
26. Which Component of RSA DLP would generate an incident that contained client and server MAC
addresses?
A. DLP Sensor
B. DLP Controller
C. DLP Interceptor
D. DLP ICAPserver
Answer:A
27. Which of the following is not a supported implementation of the DLP SUITE?
A. DLP Interceptor and Endpoint
B. DLP Endpoint and DLP Datacenter
C. DLP Network and DLP Datacenter
D. DLP Network and DLP Endpoint Enforce
Answer:A
28. Which of the following is NOT a factor when creating content rules?
A. Counts
B. Weighting
C. Exclusion Rules
D. Correct Spelling and Grammar
Answer: D
29. How close to each other must the matches occur in a document is the definition of:
A. Weights
B. Proximity
C. Rule thresholds
D. Score Thresholds
Answer: B
30. Which of the RSA DLP Network Appliances can have quarantine as an available policy action?
8/6/2019 Prepking 050-V60X-CSEDLPS Exam Questions
http://slidepdf.com/reader/full/prepking-050-v60x-csedlps-exam-questions 10/11
www.Prepking.com
A. RSA Datacenter gridworker
B. RSA DLP Network Interceptor
C. RSA DLP Network ICAPserver
D. RSA DLP Enterprise Manager
Answer: B
31. What is external cache as it relates to the RSA DLP SUITE?
A. The results from the last scan of a target file share or endpoint
B. Area of memory that holds fingerprinted documents. This speeds up the process of scanning
C. A holding area on the interceptor appliance that holds the most frequently used email attachments
D. An optional add-on hardware option for the Sensor appliance to enable it speed up content analysis
Answer:A
32. A user attempts an action with a sensitive document that violates RSA DLP Policy. Which of the
following actions could NOT be blocked by RSA DLP Endpoint Enforce?
A. User prints the document
B. User copies file to MP3 player
C. User copies document to a floppy drive
D. User transmits file to another device via Bluetooth
Answer: D
33. Which of the following is NOT an action that can be used on incidents in the incidents queue?
A. Start
B. Close
C. Assign
D. Suspend
Answer: D
34. X-Headers are added to web page requesting going through the ICAPserver. These X-headers can be
used for troubleshooting by looking at the source of a web page that has gone through the ICAPserver.
8/6/2019 Prepking 050-V60X-CSEDLPS Exam Questions
http://slidepdf.com/reader/full/prepking-050-v60x-csedlps-exam-questions 11/11
100% Pass Guaranteed or Full Refund Word to Word Real Exam Questions from Real Test
Buy full version of exam from this link below http://www.prepking.com/050-V60X-CSEDLPS.htm