Testking Rsa 050-Csedlps
-
Upload
chandu-nsa -
Category
Documents
-
view
218 -
download
0
Transcript of Testking Rsa 050-Csedlps
-
8/2/2019 Testking Rsa 050-Csedlps
1/4
BeITC
ertifie
d.com
Exam Name: CSE RSA Data Loss Prevention 6.0
Exam Type: RSA
Exam Code: 050-CSEDLPS Total Questions: 106
Page 1 of 21
Question: 1Which of the following components is required to monitor/block HTTPS traffic in DLP Network?
A. Span PortB. Bluecoat ProxyC. Network SensorD. Network Controller
Answer: B
Question: 2Incidents that are created as the result of RSA DLP agent scan on an end user's computer will becategorized as Datacenter Incidents.
A. TrueB. False
Answer: A
Question: 3RSA DLP Endpoint Enforce uses the same infrastructure as RSA DLP Endpoint Discovery.
A. TrueB. False
Answer: A
Question: 4Any ICAP client Proxy server can communicate with the ICAPserver by default. Whichconfiguration file is used to limit which Client proxy can connect to the ICAPserver appliance?
A. ICAP.cnf
B. ICAP.confC. proxy.confD. c-ICAP.conf
Answer: D
Question: 5Which of the following is NOT a component of the RSA DLP Suite?
A. NetworkB. EndpointC. FilesystemD. Datacenter
Answer: C
Question: 6The RBC Company is performing datacenter scans on file shares within the corporate network.The scans are permanent scans. Which of the following would require clearing the results of theprevious scan and performing a new complete scan?
A. New Grid WorkersB. New Grid Scan Group
-
8/2/2019 Testking Rsa 050-Csedlps
2/4
BeITC
ertifie
d.com
Exam Name: CSE RSA Data Loss Prevention 6.0
Exam Type: RSA
Exam Code: 050-CSEDLPS Total Questions: 106
Page 2 of 21
C. New content blade in policyD. Change of Operating System
Answer: C
Question: 7A Linux based version of the DLP Enterprise Coordinator is installed on the RSA DLP Networkcontroller.
A. TrueB. False
Answer: B
Question: 8Which of the following is NOT available as an option in Incident handling rules for DLP Network orDatacenter?
A. Quarantine end user action
B. Assign Incident to User or GroupC. Set incident severity to a different settingD. Automatically close an incident if severity level is low
Answer: A
Question: 9Which appliance can be set in scan and tag mode
A. Network SensorB. Network ControllerC. Network InterceptorD. Network ICAPserver
Answer: C
Question: 10DLP network can decompress files that are compressed and analyze the contents of compressedfiles. What is the maximum number of times, a file can be compressed before the e systemcannot handle the decompression/analysis of an attachment or transmission.
A. 20 levels of compressionB. 50 levels of compressionC. 75 levels of compressionD. 100 level of compression
Answer: A
Question: 11Documents that contain sensitive information that violate policy are detected on an end usercomputer are classified as what type of events/incidents?
A. DLP incidents and eventsB. Network incidents and eventsC. Endpoint incidents and eventsD. Datacenter incidents and events
-
8/2/2019 Testking Rsa 050-Csedlps
3/4
BeITC
ertifie
d.com
Exam Name: CSE RSA Data Loss Prevention 6.0
Exam Type: RSA
Exam Code: 050-CSEDLPS Total Questions: 106
Page 3 of 21
Answer: D
Question: 12Which of the following is NOT a troubleshooting program that comes with the DLP Network?
A. SubnetsB. ICAPstatsC. checkrelayD. checkreply
Answer: D
Question: 13The RSA DLP Network Sensor has to have access to an entire TCP transmission. If only a partialtransmission is captured, the session is not analyzed.
A. TrueB. False
Answer: A
Question: 14Which two RSA DLP network appliances could detect employee posting company confidentialinformation to an online web forum? (Choose two)
A. DLP Network SensorB. Described InformationC. DLP Network ControllerD. DLP Network ICAPserverE. Company Confidential Content Blade Template
Answer: A, D
Question: 15A user can view and modify the Expert content blades that are included with the DLP Suite, toimprove their detection capabilities.
A. TrueB. False
Answer: B
Question: 16The Bluecoat proxy server from Bluecoat is an optional component that must be used to monitor
http traffic.
A. TrueB. False
Answer: B
Question: 17
-
8/2/2019 Testking Rsa 050-Csedlps
4/4
BeITC
ertifie
d.com
Exam Name: CSE RSA Data Loss Prevention 6.0
Exam Type: RSA
Exam Code: 050-CSEDLPS Total Questions: 106
Page 4 of 21
A single policy can be used to detect the same sensitive information that is transmitted to asource outside the company network, information saved in a .PDF file on a SharePoint on thenetwork file server, and a excel spreadsheet on an end user's laptop.
A. TrueB. False
Answer: A
Question: 18Outlook personal storage files (.PST) can be searched by a RSA Datacenter or Endpoint scan?
A. TrueB. False
Answer: A
Question: 19When you create a new policy (Not from templates) the policy is already configured with content
blades and has incident handling and notifications options set appropriately and do not requireany configuration.
A. TrueB. False
Answer: B
Question: 20An endpoint scan is run on Dave's laptop. The following is found:
10 occurrences of PII15 occurrences of company confidential documents
20 customer records that contain credit card numbers or social security numbers.
How many incidents will be reported by the DLP Suite?
A. 1B. 10C. 15D. 20E. We cannot determine that from the information provided. It depends on the policy settings.
Answer: A
Question: 21
What is the maximum number of Site Coordinators allowed per Enterprise Coordinator?
A. 1B. 50C. 1000D. 2000
Answer: B
Question: 22