Testking Rsa 050-Csedlps

download Testking Rsa 050-Csedlps

of 4

Transcript of Testking Rsa 050-Csedlps

  • 8/2/2019 Testking Rsa 050-Csedlps

    1/4

    BeITC

    ertifie

    d.com

    Exam Name: CSE RSA Data Loss Prevention 6.0

    Exam Type: RSA

    Exam Code: 050-CSEDLPS Total Questions: 106

    Page 1 of 21

    Question: 1Which of the following components is required to monitor/block HTTPS traffic in DLP Network?

    A. Span PortB. Bluecoat ProxyC. Network SensorD. Network Controller

    Answer: B

    Question: 2Incidents that are created as the result of RSA DLP agent scan on an end user's computer will becategorized as Datacenter Incidents.

    A. TrueB. False

    Answer: A

    Question: 3RSA DLP Endpoint Enforce uses the same infrastructure as RSA DLP Endpoint Discovery.

    A. TrueB. False

    Answer: A

    Question: 4Any ICAP client Proxy server can communicate with the ICAPserver by default. Whichconfiguration file is used to limit which Client proxy can connect to the ICAPserver appliance?

    A. ICAP.cnf

    B. ICAP.confC. proxy.confD. c-ICAP.conf

    Answer: D

    Question: 5Which of the following is NOT a component of the RSA DLP Suite?

    A. NetworkB. EndpointC. FilesystemD. Datacenter

    Answer: C

    Question: 6The RBC Company is performing datacenter scans on file shares within the corporate network.The scans are permanent scans. Which of the following would require clearing the results of theprevious scan and performing a new complete scan?

    A. New Grid WorkersB. New Grid Scan Group

  • 8/2/2019 Testking Rsa 050-Csedlps

    2/4

    BeITC

    ertifie

    d.com

    Exam Name: CSE RSA Data Loss Prevention 6.0

    Exam Type: RSA

    Exam Code: 050-CSEDLPS Total Questions: 106

    Page 2 of 21

    C. New content blade in policyD. Change of Operating System

    Answer: C

    Question: 7A Linux based version of the DLP Enterprise Coordinator is installed on the RSA DLP Networkcontroller.

    A. TrueB. False

    Answer: B

    Question: 8Which of the following is NOT available as an option in Incident handling rules for DLP Network orDatacenter?

    A. Quarantine end user action

    B. Assign Incident to User or GroupC. Set incident severity to a different settingD. Automatically close an incident if severity level is low

    Answer: A

    Question: 9Which appliance can be set in scan and tag mode

    A. Network SensorB. Network ControllerC. Network InterceptorD. Network ICAPserver

    Answer: C

    Question: 10DLP network can decompress files that are compressed and analyze the contents of compressedfiles. What is the maximum number of times, a file can be compressed before the e systemcannot handle the decompression/analysis of an attachment or transmission.

    A. 20 levels of compressionB. 50 levels of compressionC. 75 levels of compressionD. 100 level of compression

    Answer: A

    Question: 11Documents that contain sensitive information that violate policy are detected on an end usercomputer are classified as what type of events/incidents?

    A. DLP incidents and eventsB. Network incidents and eventsC. Endpoint incidents and eventsD. Datacenter incidents and events

  • 8/2/2019 Testking Rsa 050-Csedlps

    3/4

    BeITC

    ertifie

    d.com

    Exam Name: CSE RSA Data Loss Prevention 6.0

    Exam Type: RSA

    Exam Code: 050-CSEDLPS Total Questions: 106

    Page 3 of 21

    Answer: D

    Question: 12Which of the following is NOT a troubleshooting program that comes with the DLP Network?

    A. SubnetsB. ICAPstatsC. checkrelayD. checkreply

    Answer: D

    Question: 13The RSA DLP Network Sensor has to have access to an entire TCP transmission. If only a partialtransmission is captured, the session is not analyzed.

    A. TrueB. False

    Answer: A

    Question: 14Which two RSA DLP network appliances could detect employee posting company confidentialinformation to an online web forum? (Choose two)

    A. DLP Network SensorB. Described InformationC. DLP Network ControllerD. DLP Network ICAPserverE. Company Confidential Content Blade Template

    Answer: A, D

    Question: 15A user can view and modify the Expert content blades that are included with the DLP Suite, toimprove their detection capabilities.

    A. TrueB. False

    Answer: B

    Question: 16The Bluecoat proxy server from Bluecoat is an optional component that must be used to monitor

    http traffic.

    A. TrueB. False

    Answer: B

    Question: 17

  • 8/2/2019 Testking Rsa 050-Csedlps

    4/4

    BeITC

    ertifie

    d.com

    Exam Name: CSE RSA Data Loss Prevention 6.0

    Exam Type: RSA

    Exam Code: 050-CSEDLPS Total Questions: 106

    Page 4 of 21

    A single policy can be used to detect the same sensitive information that is transmitted to asource outside the company network, information saved in a .PDF file on a SharePoint on thenetwork file server, and a excel spreadsheet on an end user's laptop.

    A. TrueB. False

    Answer: A

    Question: 18Outlook personal storage files (.PST) can be searched by a RSA Datacenter or Endpoint scan?

    A. TrueB. False

    Answer: A

    Question: 19When you create a new policy (Not from templates) the policy is already configured with content

    blades and has incident handling and notifications options set appropriately and do not requireany configuration.

    A. TrueB. False

    Answer: B

    Question: 20An endpoint scan is run on Dave's laptop. The following is found:

    10 occurrences of PII15 occurrences of company confidential documents

    20 customer records that contain credit card numbers or social security numbers.

    How many incidents will be reported by the DLP Suite?

    A. 1B. 10C. 15D. 20E. We cannot determine that from the information provided. It depends on the policy settings.

    Answer: A

    Question: 21

    What is the maximum number of Site Coordinators allowed per Enterprise Coordinator?

    A. 1B. 50C. 1000D. 2000

    Answer: B

    Question: 22