Weekend Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

MA0-103 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

MA0-103 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: McAfee Certified Product Specialist - DLPE
  • Last Update: Mar 16, 2025
  • Questions and Answers: 70
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

MA0-103 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

MA0-103 Practice Exam Questions with Answers McAfee Certified Product Specialist - DLPE Certification

Question # 6

How can the use of USB drives be identified?

A.

Enable plug and play device rule to monitor USB plugs

B.

Enable unmanageable device classes to monitor USB plugs

C.

Enable fixed hard drive rule to monitor USB plugs

D.

Enable removable file storage access to monitor USB plugs

Full Access
Question # 7

Which of the following is an indication of potential data loss?

A.

Removable Storage Device rule triggers a lot of incidents for one user

B.

Removable Storage File Access rule triggers a lot of incidents for one user

C.

Discovery rule triggers a lot of incidents for one user

D.

Removable Storage Protection rule triggers a lot of incidents for one user

Full Access
Question # 8

To determine baseline conditions for DLP implementation, which of the following actions can the DLP End point Administrator perform?

A.

Configure database statistics

B.

Run the Policy Analyzer

C.

Configure backward compatibility

D.

Perform testing with various groups

Full Access
Question # 9

An organization's call center uses shared computers for 24x7 operations. Shifts are staffed by employees and contractors. As part of established business processes employees are authorized to use removable storage devices while contractors are prohibited from using these types of devices. To create flexible Removable Storage Device Rules which type of policy assignment can the DLP Endpoint Administrator configure?

A.

Computer Assignment Group policy

B.

Local Users policy

C.

User Assignment Group

D.

Privileged Users policy

Full Access
Question # 10

When including local users in User Assignment Groups, are all local users evaluated equally?

A.

No, local users are not authenticated with the domain.

B.

Yes, permissions are equal for all local users.

C.

No, local user accounts must be placed into a separate user assignment group from domain users.

D.

Yes, local users must also be defined as domain users.

Full Access
Question # 11

Which of the following ePO server tasks schedules and runs tasks setup in DLP incident manager?

A.

DLP Incident Tasks Runner

B.

DLP Incident Tasks Executer

C.

DLP Policy Push Task

D.

DLP Incident Reporting Tasks Runner

Full Access
Question # 12

Which of the following protects the DLP Endpoint client from malicious interferences?

A.

Agent Watchdogs Only

B.

VirusScan Enterprise

C.

Host Intrusion Prevention System

D.

Data Access Protection module and Agent Watchdogs

Full Access
Question # 13

A manufacturing organization needs to protect the transfer of sensitive design documents by prohibiting write access to USB devices. They do not want to limit their employee's ability to read files from these devices. To meet the organization's requirement, which type of rule can be implemented?

A.

Plug and Play Device Rule

B.

Removable Storage Protection Rule

C.

Removable Storage Device Rule (supports Mac)

D.

Removable Storage File Access Rule

Full Access
Question # 14

How can incident data be exported?

A.

Select specific events in DLP manager to export incident data

B.

Run reports or queries to generate specific report and export incident data

C.

Use database administration to export incident data

D.

Run incident task manager to export incident data

Full Access
Question # 15

To remove files from quarantine, which of the following is required?

A.

Quarantine release key

B.

Restore from quarantine

C.

Quarantine purge

D.

Agent bypass Code

Full Access
Question # 16

There is a known virus spreading using removable media. What action should be taken to mitigate this risk?

A.

Monitor all removable media devices

B.

Enable McAfee endpoint encryption controls

C.

Block all removable media devices

D.

Make plug and play devices read only

Full Access
Question # 17

Which of the following McAfee tools are useful to collect McAfee product data from a computer so that the problem can be analyzed and resolved by McAfee Technical Support?

A.

ePO-MVT (McAfee Virtual Technician)

B.

Minimum Escalation Requirements (MER) tools

C.

McAfee Profiler

D.

extra DAT

Full Access
Question # 18

An executive sends merger documents to legal counsel. Policy dictates the documents should be encrypted, but they are being sent in plain text. What is the appropriate action to configure in such a case using DLPe protection rules?

A.

Monitor the activity using a File System Protection Rule, store the evidence and notify the user.

B.

Verify the violation and send an alert to the administrator.

C.

An Email Protection Rule should be used to block the email unless the documents are encrypted.

D.

Do nothing.

Full Access
Question # 19

Which Microsoft product can hinder proper installation of McAfee DLPe components on the ePO server and may need to be disabled until after installation is completed?

A.

.N ET Framework

B.

Active Directory Network permissions

C.

Microsoft Internet Explorer Enhanced Security Configuration

D.

Windows Server 2003 Sharing and Security options in Repository folders

Full Access
Question # 20

Which Corporate Security Policy affects the Evidence Share and ePO Database size and growth?

A.

Acceptable Use Policy

B.

Access Control Policy

C.

Data Retention Policy

D.

Risk Management Framework

Full Access
Question # 21

The DLPe Administrator configures a Web Post Protection rule with a blocking reaction. The administrator does not configure a Web Destination definition. What is the result?

A.

Uploads containing protected information are blocked for both internal and external websites

B.

Uploads containing protected information are blocked only for external websites

C.

Uploads containing protected information are blocked only for internal websites

D.

None of the uploads containing protected information are blocked

Full Access